Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Arrival Notice.exe

Overview

General Information

Sample name:Arrival Notice.exe
Analysis ID:1577189
MD5:c3f4606a2dee3f372af2108340951322
SHA1:dad640bb0afeb3f348ef692fe271e7e0ca1eab45
SHA256:7135dd0f5ab3268a874f61397f34be3d83a7e7b4620be22df6ce6fb1c2fffd7b
Tags:exeuser-threatcat_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • Arrival Notice.exe (PID: 6860 cmdline: "C:\Users\user\Desktop\Arrival Notice.exe" MD5: C3F4606A2DEE3F372AF2108340951322)
    • svchost.exe (PID: 6992 cmdline: "C:\Users\user\Desktop\Arrival Notice.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["154.216.17.190:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-3W6OXK", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Arrival Notice.exe.4190000.1.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              0.2.Arrival Notice.exe.4190000.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.2.Arrival Notice.exe.4190000.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.2.Arrival Notice.exe.4190000.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x69ef8:$a1: Remcos restarted by watchdog!
                  • 0x6a470:$a3: %02i:%02i:%02i:%03i
                  0.2.Arrival Notice.exe.4190000.1.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64194:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64110:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64110:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64204:$str_b2: Executing file:
                  • 0x6503c:$str_b3: GetDirectListeningPort
                  • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x64b80:$str_b7: \update.vbs
                  • 0x6422c:$str_b9: Downloaded file:
                  • 0x64218:$str_b10: Downloading file:
                  • 0x642bc:$str_b12: Failed to upload file:
                  • 0x65004:$str_b13: StartForward
                  • 0x65024:$str_b14: StopForward
                  • 0x64ad8:$str_b15: fso.DeleteFile "
                  • 0x64a6c:$str_b16: On Error Resume Next
                  • 0x64b08:$str_b17: fso.DeleteFolder "
                  • 0x642ac:$str_b18: Uploaded file:
                  • 0x6426c:$str_b19: Unable to delete:
                  • 0x64aa0:$str_b20: while fso.FileExists("
                  • 0x64749:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 19 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Arrival Notice.exe", CommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", ParentImage: C:\Users\user\Desktop\Arrival Notice.exe, ParentProcessId: 6860, ParentProcessName: Arrival Notice.exe, ProcessCommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", ProcessId: 6992, ProcessName: svchost.exe
                  Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Arrival Notice.exe", CommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", ParentImage: C:\Users\user\Desktop\Arrival Notice.exe, ParentProcessId: 6860, ParentProcessName: Arrival Notice.exe, ProcessCommandLine: "C:\Users\user\Desktop\Arrival Notice.exe", ProcessId: 6992, ProcessName: svchost.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: C4 22 9D 66 F0 F9 3A 05 E3 75 48 75 45 FC 4C A0 D5 36 0D C1 D9 20 23 7B 59 74 CD 0A 4F F1 61 3C CE F8 6C E0 15 00 7A 14 95 03 62 70 58 45 C6 07 92 FC 50 36 06 E4 A8 F3 51 19 61 A3 A2 DD D3 12 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 6992, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-3W6OXK\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-18T09:03:06.249721+010020365941Malware Command and Control Activity Detected192.168.2.449730154.216.17.1902404TCP
                  2024-12-18T09:03:09.603113+010020365941Malware Command and Control Activity Detected192.168.2.449731154.216.17.1902404TCP
                  2024-12-18T09:03:12.985262+010020365941Malware Command and Control Activity Detected192.168.2.449732154.216.17.1902404TCP
                  2024-12-18T09:03:16.328989+010020365941Malware Command and Control Activity Detected192.168.2.449733154.216.17.1902404TCP
                  2024-12-18T09:03:19.673510+010020365941Malware Command and Control Activity Detected192.168.2.449735154.216.17.1902404TCP
                  2024-12-18T09:03:23.016739+010020365941Malware Command and Control Activity Detected192.168.2.449738154.216.17.1902404TCP
                  2024-12-18T09:03:26.361725+010020365941Malware Command and Control Activity Detected192.168.2.449741154.216.17.1902404TCP
                  2024-12-18T09:03:29.704799+010020365941Malware Command and Control Activity Detected192.168.2.449743154.216.17.1902404TCP
                  2024-12-18T09:03:33.066100+010020365941Malware Command and Control Activity Detected192.168.2.449744154.216.17.1902404TCP
                  2024-12-18T09:03:36.424355+010020365941Malware Command and Control Activity Detected192.168.2.449745154.216.17.1902404TCP
                  2024-12-18T09:03:39.768655+010020365941Malware Command and Control Activity Detected192.168.2.449746154.216.17.1902404TCP
                  2024-12-18T09:03:43.111896+010020365941Malware Command and Control Activity Detected192.168.2.449747154.216.17.1902404TCP
                  2024-12-18T09:03:46.455031+010020365941Malware Command and Control Activity Detected192.168.2.449748154.216.17.1902404TCP
                  2024-12-18T09:03:49.831061+010020365941Malware Command and Control Activity Detected192.168.2.449749154.216.17.1902404TCP
                  2024-12-18T09:03:53.205392+010020365941Malware Command and Control Activity Detected192.168.2.449750154.216.17.1902404TCP
                  2024-12-18T09:03:56.550346+010020365941Malware Command and Control Activity Detected192.168.2.449751154.216.17.1902404TCP
                  2024-12-18T09:03:59.893159+010020365941Malware Command and Control Activity Detected192.168.2.449753154.216.17.1902404TCP
                  2024-12-18T09:04:03.255242+010020365941Malware Command and Control Activity Detected192.168.2.449760154.216.17.1902404TCP
                  2024-12-18T09:04:06.614291+010020365941Malware Command and Control Activity Detected192.168.2.449771154.216.17.1902404TCP
                  2024-12-18T09:04:09.954296+010020365941Malware Command and Control Activity Detected192.168.2.449777154.216.17.1902404TCP
                  2024-12-18T09:04:13.298205+010020365941Malware Command and Control Activity Detected192.168.2.449788154.216.17.1902404TCP
                  2024-12-18T09:04:16.643223+010020365941Malware Command and Control Activity Detected192.168.2.449794154.216.17.1902404TCP
                  2024-12-18T09:04:19.989594+010020365941Malware Command and Control Activity Detected192.168.2.449805154.216.17.1902404TCP
                  2024-12-18T09:04:23.330493+010020365941Malware Command and Control Activity Detected192.168.2.449812154.216.17.1902404TCP
                  2024-12-18T09:04:26.673679+010020365941Malware Command and Control Activity Detected192.168.2.449822154.216.17.1902404TCP
                  2024-12-18T09:04:30.017358+010020365941Malware Command and Control Activity Detected192.168.2.449831154.216.17.1902404TCP
                  2024-12-18T09:04:33.363214+010020365941Malware Command and Control Activity Detected192.168.2.449837154.216.17.1902404TCP
                  2024-12-18T09:04:36.706662+010020365941Malware Command and Control Activity Detected192.168.2.449847154.216.17.1902404TCP
                  2024-12-18T09:04:40.050468+010020365941Malware Command and Control Activity Detected192.168.2.449854154.216.17.1902404TCP
                  2024-12-18T09:04:43.393261+010020365941Malware Command and Control Activity Detected192.168.2.449864154.216.17.1902404TCP
                  2024-12-18T09:04:46.823022+010020365941Malware Command and Control Activity Detected192.168.2.449870154.216.17.1902404TCP
                  2024-12-18T09:04:50.174672+010020365941Malware Command and Control Activity Detected192.168.2.449881154.216.17.1902404TCP
                  2024-12-18T09:04:53.518760+010020365941Malware Command and Control Activity Detected192.168.2.449888154.216.17.1902404TCP
                  2024-12-18T09:04:57.183312+010020365941Malware Command and Control Activity Detected192.168.2.449898154.216.17.1902404TCP
                  2024-12-18T09:05:00.472007+010020365941Malware Command and Control Activity Detected192.168.2.449904154.216.17.1902404TCP
                  2024-12-18T09:05:03.722996+010020365941Malware Command and Control Activity Detected192.168.2.449915154.216.17.1902404TCP
                  2024-12-18T09:05:06.940711+010020365941Malware Command and Control Activity Detected192.168.2.449921154.216.17.1902404TCP
                  2024-12-18T09:05:10.129601+010020365941Malware Command and Control Activity Detected192.168.2.449931154.216.17.1902404TCP
                  2024-12-18T09:05:13.397288+010020365941Malware Command and Control Activity Detected192.168.2.449937154.216.17.1902404TCP
                  2024-12-18T09:05:16.534065+010020365941Malware Command and Control Activity Detected192.168.2.449946154.216.17.1902404TCP
                  2024-12-18T09:05:19.644151+010020365941Malware Command and Control Activity Detected192.168.2.449954154.216.17.1902404TCP
                  2024-12-18T09:05:22.738070+010020365941Malware Command and Control Activity Detected192.168.2.449962154.216.17.1902404TCP
                  2024-12-18T09:05:25.815348+010020365941Malware Command and Control Activity Detected192.168.2.449971154.216.17.1902404TCP
                  2024-12-18T09:05:28.847510+010020365941Malware Command and Control Activity Detected192.168.2.449977154.216.17.1902404TCP
                  2024-12-18T09:05:31.879986+010020365941Malware Command and Control Activity Detected192.168.2.449986154.216.17.1902404TCP
                  2024-12-18T09:05:34.895362+010020365941Malware Command and Control Activity Detected192.168.2.449994154.216.17.1902404TCP
                  2024-12-18T09:05:37.915402+010020365941Malware Command and Control Activity Detected192.168.2.450002154.216.17.1902404TCP
                  2024-12-18T09:05:40.881000+010020365941Malware Command and Control Activity Detected192.168.2.450011154.216.17.1902404TCP
                  2024-12-18T09:05:43.817589+010020365941Malware Command and Control Activity Detected192.168.2.450016154.216.17.1902404TCP
                  2024-12-18T09:05:46.801930+010020365941Malware Command and Control Activity Detected192.168.2.450026154.216.17.1902404TCP
                  2024-12-18T09:05:49.695373+010020365941Malware Command and Control Activity Detected192.168.2.450033154.216.17.1902404TCP
                  2024-12-18T09:05:52.566689+010020365941Malware Command and Control Activity Detected192.168.2.450039154.216.17.1902404TCP
                  2024-12-18T09:05:55.427332+010020365941Malware Command and Control Activity Detected192.168.2.450048154.216.17.1902404TCP
                  2024-12-18T09:05:58.270101+010020365941Malware Command and Control Activity Detected192.168.2.450056154.216.17.1902404TCP
                  2024-12-18T09:06:01.101367+010020365941Malware Command and Control Activity Detected192.168.2.450058154.216.17.1902404TCP
                  2024-12-18T09:06:03.927758+010020365941Malware Command and Control Activity Detected192.168.2.450059154.216.17.1902404TCP
                  2024-12-18T09:06:06.723646+010020365941Malware Command and Control Activity Detected192.168.2.450060154.216.17.1902404TCP
                  2024-12-18T09:06:09.506254+010020365941Malware Command and Control Activity Detected192.168.2.450061154.216.17.1902404TCP
                  2024-12-18T09:06:12.301465+010020365941Malware Command and Control Activity Detected192.168.2.450062154.216.17.1902404TCP
                  2024-12-18T09:06:15.055429+010020365941Malware Command and Control Activity Detected192.168.2.450063154.216.17.1902404TCP
                  2024-12-18T09:06:17.787471+010020365941Malware Command and Control Activity Detected192.168.2.450064154.216.17.1902404TCP
                  2024-12-18T09:06:20.504996+010020365941Malware Command and Control Activity Detected192.168.2.450065154.216.17.1902404TCP
                  2024-12-18T09:06:23.227526+010020365941Malware Command and Control Activity Detected192.168.2.450066154.216.17.1902404TCP
                  2024-12-18T09:06:25.929624+010020365941Malware Command and Control Activity Detected192.168.2.450067154.216.17.1902404TCP
                  2024-12-18T09:06:28.627379+010020365941Malware Command and Control Activity Detected192.168.2.450068154.216.17.1902404TCP
                  2024-12-18T09:06:31.303427+010020365941Malware Command and Control Activity Detected192.168.2.450069154.216.17.1902404TCP
                  2024-12-18T09:06:33.975404+010020365941Malware Command and Control Activity Detected192.168.2.450070154.216.17.1902404TCP
                  2024-12-18T09:06:36.646573+010020365941Malware Command and Control Activity Detected192.168.2.450071154.216.17.1902404TCP
                  2024-12-18T09:06:39.286782+010020365941Malware Command and Control Activity Detected192.168.2.450072154.216.17.1902404TCP
                  2024-12-18T09:06:41.925964+010020365941Malware Command and Control Activity Detected192.168.2.450073154.216.17.1902404TCP
                  2024-12-18T09:06:44.553512+010020365941Malware Command and Control Activity Detected192.168.2.450074154.216.17.1902404TCP
                  2024-12-18T09:06:47.177135+010020365941Malware Command and Control Activity Detected192.168.2.450075154.216.17.1902404TCP
                  2024-12-18T09:06:49.785710+010020365941Malware Command and Control Activity Detected192.168.2.450076154.216.17.1902404TCP
                  2024-12-18T09:06:52.383534+010020365941Malware Command and Control Activity Detected192.168.2.450077154.216.17.1902404TCP
                  2024-12-18T09:06:54.975092+010020365941Malware Command and Control Activity Detected192.168.2.450078154.216.17.1902404TCP
                  2024-12-18T09:06:57.573946+010020365941Malware Command and Control Activity Detected192.168.2.450079154.216.17.1902404TCP
                  2024-12-18T09:07:00.145830+010020365941Malware Command and Control Activity Detected192.168.2.450080154.216.17.1902404TCP
                  2024-12-18T09:07:02.714328+010020365941Malware Command and Control Activity Detected192.168.2.450081154.216.17.1902404TCP
                  2024-12-18T09:07:05.271575+010020365941Malware Command and Control Activity Detected192.168.2.450082154.216.17.1902404TCP
                  2024-12-18T09:07:07.818849+010020365941Malware Command and Control Activity Detected192.168.2.450083154.216.17.1902404TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Arrival Notice.exeAvira: detected
                  Source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["154.216.17.190:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-3W6OXK", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                  Source: Arrival Notice.exeVirustotal: Detection: 31%Perma Link
                  Source: Arrival Notice.exeReversingLabs: Detection: 55%
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Arrival Notice.exeJoe Sandbox ML: detected
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,1_2_0043293A
                  Source: Arrival Notice.exe, 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_ce075aec-7

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406764 _wcslen,CoGetObject,1_2_00406764
                  Source: Arrival Notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: Arrival Notice.exe, 00000000.00000003.1722018408.0000000004210000.00000004.00001000.00020000.00000000.sdmp, Arrival Notice.exe, 00000000.00000003.1722152891.00000000043B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Arrival Notice.exe, 00000000.00000003.1722018408.0000000004210000.00000004.00001000.00020000.00000000.sdmp, Arrival Notice.exe, 00000000.00000003.1722152891.00000000043B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EDDBBE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE68EE FindFirstFileW,FindClose,0_2_00EE68EE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EE698F
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EDD076
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EDD3A9
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EE9642
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EE979D
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EE9B2B
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EE5C97
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0040B335
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,1_2_0041B42F
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0040B53A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,1_2_004089A9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406AC2 FindFirstFileW,FindNextFileW,1_2_00406AC2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,1_2_00407A8C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00418C69
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,1_2_00408DA7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,1_2_00406F06

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49732 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49731 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49730 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49738 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49733 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49741 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49735 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49745 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49746 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49751 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49744 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49748 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49788 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49794 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49805 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49749 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49750 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49831 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49837 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49777 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49847 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49747 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49812 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49870 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49881 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49753 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49822 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49854 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49760 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49864 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49888 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49771 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49743 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49898 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49915 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49904 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49921 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49937 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49946 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49971 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49977 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49986 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49954 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49994 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50002 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49962 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50033 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50016 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50039 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50026 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50059 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50056 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50048 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50058 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50067 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50064 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50062 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50066 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50069 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50072 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50073 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50074 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50082 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50065 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50081 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50071 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50083 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50068 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50079 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50070 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50063 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50075 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50078 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50080 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50061 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50011 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50076 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50077 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50060 -> 154.216.17.190:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49931 -> 154.216.17.190:2404
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 154.216.17.190 2404Jump to behavior
                  Source: Malware configuration extractorIPs: 154.216.17.190
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 154.216.17.190:2404
                  Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.216.17.190
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00EECE44
                  Source: svchost.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: Arrival Notice.exe, 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000001_2_004099E4
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EEEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EEEAFF
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EEED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00EEED6A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_004159C6
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EEEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EEEAFF
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00EDAA57
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00F09576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F09576
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041BB71 SystemParametersInfoW,1_2_0041BB71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041BB77 SystemParametersInfoW,1_2_0041BB77

                  System Summary

                  barindex
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Arrival Notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: Arrival Notice.exe, 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_84192ade-3
                  Source: Arrival Notice.exe, 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_50aebc88-a
                  Source: Arrival Notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_463c2c40-8
                  Source: Arrival Notice.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_97199a36-7
                  Source: initial sampleStatic PE information: Filename: Arrival Notice.exe
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00EDD5EB
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00ED1201
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00EDE8F6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,1_2_004158B9
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E780600_2_00E78060
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE20460_2_00EE2046
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED82980_2_00ED8298
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EAE4FF0_2_00EAE4FF
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EA676B0_2_00EA676B
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00F048730_2_00F04873
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E7CAF00_2_00E7CAF0
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E9CAA00_2_00E9CAA0
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E8CC390_2_00E8CC39
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EA6DD90_2_00EA6DD9
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E8D0630_2_00E8D063
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E791C00_2_00E791C0
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E8B1190_2_00E8B119
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E913940_2_00E91394
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E917060_2_00E91706
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E9781B0_2_00E9781B
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E919B00_2_00E919B0
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E8997D0_2_00E8997D
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E779200_2_00E77920
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E97A4A0_2_00E97A4A
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E97CA70_2_00E97CA7
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E91C770_2_00E91C77
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EA9EEE0_2_00EA9EEE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EFBE440_2_00EFBE44
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E91F320_2_00E91F32
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_019642480_2_01964248
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D0711_2_0041D071
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004520D21_2_004520D2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043D0981_2_0043D098
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004371501_2_00437150
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004361AA1_2_004361AA
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004262541_2_00426254
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004313771_2_00431377
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043651C1_2_0043651C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041E5DF1_2_0041E5DF
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0044C7391_2_0044C739
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004367C61_2_004367C6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004267CB1_2_004267CB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043C9DD1_2_0043C9DD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00432A491_2_00432A49
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00436A8D1_2_00436A8D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043CC0C1_2_0043CC0C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00436D481_2_00436D48
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00434D221_2_00434D22
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00426E731_2_00426E73
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00440E201_2_00440E20
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043CE3B1_2_0043CE3B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00412F451_2_00412F45
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00452F001_2_00452F00
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00426FAD1_2_00426FAD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004020E7 appears 41 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004338A5 appears 41 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00433FB0 appears 55 times
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: String function: 00E90A30 appears 46 times
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: String function: 00E8F9F2 appears 31 times
                  Source: Arrival Notice.exe, 00000000.00000003.1722018408.0000000004333000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Arrival Notice.exe
                  Source: Arrival Notice.exe, 00000000.00000003.1722591808.00000000044DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Arrival Notice.exe
                  Source: Arrival Notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/2@0/1
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE37B5 GetLastError,FormatMessageW,0_2_00EE37B5
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED10BF AdjustTokenPrivileges,CloseHandle,0_2_00ED10BF
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00ED16C3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,1_2_00416AB7
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00EE51CD
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EFA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00EFA67C
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00EE648E
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E742A2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,1_2_00419BC4
                  Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-3W6OXK
                  Source: C:\Users\user\Desktop\Arrival Notice.exeFile created: C:\Users\user\AppData\Local\Temp\autF9A7.tmpJump to behavior
                  Source: Arrival Notice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Arrival Notice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Arrival Notice.exeVirustotal: Detection: 31%
                  Source: Arrival Notice.exeReversingLabs: Detection: 55%
                  Source: unknownProcess created: C:\Users\user\Desktop\Arrival Notice.exe "C:\Users\user\Desktop\Arrival Notice.exe"
                  Source: C:\Users\user\Desktop\Arrival Notice.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Arrival Notice.exe"
                  Source: C:\Users\user\Desktop\Arrival Notice.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Arrival Notice.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: Arrival Notice.exeStatic file information: File size 1407488 > 1048576
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: Arrival Notice.exe, 00000000.00000003.1722018408.0000000004210000.00000004.00001000.00020000.00000000.sdmp, Arrival Notice.exe, 00000000.00000003.1722152891.00000000043B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Arrival Notice.exe, 00000000.00000003.1722018408.0000000004210000.00000004.00001000.00020000.00000000.sdmp, Arrival Notice.exe, 00000000.00000003.1722152891.00000000043B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E742DE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E90A76 push ecx; ret 0_2_00E90A89
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004567E0 push eax; ret 1_2_004567FE
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0045B9DD push esi; ret 1_2_0045B9E6
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00455EAF push ecx; ret 1_2_00455EC2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00433FF6 push ecx; ret 1_2_00434009
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406128 ShellExecuteW,URLDownloadToFileW,1_2_00406128
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,1_2_00419BC4
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E8F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E8F98E
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00F01C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F01C41
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,1_2_0041BCE3
                  Source: C:\Users\user\Desktop\Arrival Notice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E54F Sleep,ExitProcess,1_2_0040E54F
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96186
                  Source: C:\Users\user\Desktop\Arrival Notice.exeAPI/Special instruction interceptor: Address: 1963E6C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,1_2_004198C2
                  Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 4769Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 5181Jump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeAPI coverage: 3.9 %
                  Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 8.8 %
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 3808Thread sleep count: 4769 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 3808Thread sleep time: -14307000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 3808Thread sleep count: 5181 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 3808Thread sleep time: -15543000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EDDBBE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE68EE FindFirstFileW,FindClose,0_2_00EE68EE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EE698F
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EDD076
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EDD3A9
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EE9642
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EE979D
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EE9B2B
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EE5C97
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0040B335
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,1_2_0041B42F
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0040B53A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,1_2_004089A9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406AC2 FindFirstFileW,FindNextFileW,1_2_00406AC2
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,1_2_00407A8C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00418C69
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,1_2_00408DA7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,1_2_00406F06
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E742DE
                  Source: svchost.exe, 00000001.00000002.4156805230.0000000003412000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
                  Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EEEAA2 BlockInput,0_2_00EEEAA2
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EA2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EA2622
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E742DE
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E94CE8 mov eax, dword ptr fs:[00000030h]0_2_00E94CE8
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_01964138 mov eax, dword ptr fs:[00000030h]0_2_01964138
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_019640D8 mov eax, dword ptr fs:[00000030h]0_2_019640D8
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_01962AB8 mov eax, dword ptr fs:[00000030h]0_2_01962AB8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00442554 mov eax, dword ptr fs:[00000030h]1_2_00442554
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00ED0B62
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EA2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EA2622
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E9083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E9083F
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E909D5 SetUnhandledExceptionFilter,0_2_00E909D5
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E90C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E90C21
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00434168
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0043A65D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00433B44
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00433CD7 SetUnhandledExceptionFilter,1_2_00433CD7

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 154.216.17.190 2404Jump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EC4008Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe1_2_00410F36
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00ED1201
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EB2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00EB2BA5
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EDB226 SendInput,keybd_event,0_2_00EDB226
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EF22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00EF22DA
                  Source: C:\Users\user\Desktop\Arrival Notice.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Arrival Notice.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00ED0B62
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ED1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00ED1663
                  Source: Arrival Notice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: Arrival Notice.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E90698 cpuid 0_2_00E90698
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,1_2_004470AE
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,1_2_004510BA
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_004511E3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,1_2_004512EA
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_004513B7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,1_2_00447597
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,1_2_0040E679
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,1_2_00450A7F
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,1_2_00450CF7
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,1_2_00450D42
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,1_2_00450DDD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_00450E6A
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EE8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00EE8195
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00ECD27A GetUserNameW,0_2_00ECD27A
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EABB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00EABB6F
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00E742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E742DE
                  Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data1_2_0040B21B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\1_2_0040B335
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db1_2_0040B335
                  Source: Arrival Notice.exeBinary or memory string: WIN_81
                  Source: Arrival Notice.exeBinary or memory string: WIN_XP
                  Source: Arrival Notice.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: Arrival Notice.exeBinary or memory string: WIN_XPe
                  Source: Arrival Notice.exeBinary or memory string: WIN_VISTA
                  Source: Arrival Notice.exeBinary or memory string: WIN_7
                  Source: Arrival Notice.exeBinary or memory string: WIN_8

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-3W6OXKJump to behavior
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Arrival Notice.exe.4190000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Arrival Notice.exe PID: 6860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6992, type: MEMORYSTR
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe1_2_00405042
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EF1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00EF1204
                  Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00EF1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00EF1806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  11
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol121
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  NTDS2
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                  Access Token Manipulation
                  1
                  Bypass User Account Control
                  LSA Secrets126
                  System Information Discovery
                  SSHKeylogging1
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Windows Service
                  2
                  Valid Accounts
                  Cached Domain Credentials221
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items322
                  Process Injection
                  11
                  Virtualization/Sandbox Evasion
                  DCSync11
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt322
                  Process Injection
                  /etc/passwd and /etc/shadow11
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Arrival Notice.exe31%VirustotalBrowse
                  Arrival Notice.exe55%ReversingLabsWin32.Trojan.AutoitInject
                  Arrival Notice.exe100%AviraHEUR/AGEN.1319493
                  Arrival Notice.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpsvchost.exefalse
                    high
                    http://geoplugin.net/json.gp/CArrival Notice.exe, 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      154.216.17.190
                      unknownSeychelles
                      135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1577189
                      Start date and time:2024-12-18 09:02:06 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 34s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Arrival Notice.exe
                      Detection:MAL
                      Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/2@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 46
                      • Number of non-executed functions: 305
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      TimeTypeDescription
                      03:03:39API Interceptor3852636x Sleep call for process: svchost.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      154.216.17.190Arrival Notice.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SKHT-ASShenzhenKatherineHengTechnologyInformationCojew.ppc.elfGet hashmaliciousUnknownBrowse
                        • 156.230.19.169
                        http://kmaybelsrka.sbs:6793/bab.zipGet hashmaliciousUnknownBrowse
                        • 154.216.17.175
                        https://garfieldthecat.tech/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                        • 154.216.17.175
                        Sublabially.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        • 154.216.18.216
                        ZppxPm0ASs.exeGet hashmaliciousXmrigBrowse
                        • 154.216.20.243
                        RUN.VBS.vbsGet hashmaliciousUnknownBrowse
                        • 154.216.18.89
                        arm4.elfGet hashmaliciousMiraiBrowse
                        • 156.230.19.168
                        h.htmlGet hashmaliciousUnknownBrowse
                        • 154.216.18.69
                        invoice.htmlGet hashmaliciousUnknownBrowse
                        • 154.216.18.89
                        Arrival Notice.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        • 154.216.17.190
                        No context
                        No context
                        Process:C:\Users\user\Desktop\Arrival Notice.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):428882
                        Entropy (8bit):7.987033324803843
                        Encrypted:false
                        SSDEEP:12288:8UPuKDvOhrPzca4KlGN0zYzb3mpSXhJlvmM:PuqmhrlTki8G6/dP
                        MD5:58AD3B46649FA41D6640CAB6E04F3DF7
                        SHA1:64BB5007113AFF1362EC3F98407D7E24A7DC0CFD
                        SHA-256:40CE510CA7A4B3B789C0F27DDEFDDBBB83B95D5D9F2C5974FCCC0D8407F15E84
                        SHA-512:364CE5243D8455BF54D91B02798400CE929C3898EF13489B041473AFAB56DD6A19DDAFA7B3913AE6D3093E533D822CB6AEA9AE5977328593D4188275E4E9581A
                        Malicious:false
                        Reputation:low
                        Preview:EA06........Z.Bi3..(..v..N.S...m".E...Jx..Q...@.\.@.~...H......u....1..5\...3..E7..b..t.S_..d....[_..d.X.f...H$.(.r.L..*gsl..1.....x.h..on....P.....*..N........F..y.l..o.....q...n.q.p..._v..P|..q..=....}.o...~..{....F..o.n0w....d..}7.V.f......91.I~.....KP....x..f2n.D...F.G..h.....I.......R........M. ..E.Tj.jx..M.....L*5...S...-..@.L..'m..N..~b....6.eN.....-......|.......(9..:....i.4...T..*......*.......Xf.*D..T..k..m`.T.U@.p.U.-..0.PerY.D.T..@?1.U........../.J..\.*Oa...~cM..*.j....q..16...EW..=w..R]3.V/..&..Q.C...m.w ..fs@..... ...N...!.Jth.........u..M.@itZ..?_.Q5...Z.......U#C.U...4..G.J..Zu.....!..l.P.V.....s0.Sf.|.n...[h.hN_Gr...p.&..9.V+8I$2...^&.8..[0.{op...)...$:YLN.....{NK.~.\......I...QY.n.l.L!.o.z...vhTzM.[..\fzz%.gQ.ad.O....&Sn..g4.M..$....L.r*3J..R.&a. .u7.I.@..tr.D....6..i..b.......w0..%..M.@...U.eM...L^i..R.....W..i..ju"!...8Hd"..._..i5.G...g..5.......:?b}[.S........?..f....".]t.6..E....z.........Mu.V&2Yl..E.X.s.|w....`4..v.1..$
                        Process:C:\Users\user\Desktop\Arrival Notice.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):493056
                        Entropy (8bit):7.660591572366248
                        Encrypted:false
                        SSDEEP:6144:jHwCtEKIy1dHtX7z5MBxwJA97lRj+0tiCYFs7Vg+4DPUi7VUu5WvUXbXmE9uS+Df:jFcC5Mr9xZ33YFsgsiE6CEovKE7
                        MD5:32B92375643B96D695C4C103D45DB3EA
                        SHA1:3E89EB2AA38A23F6B1EEAF34ED46DC7E172F2922
                        SHA-256:B444097086CD8BC667D10CEED8EAA7CE1DE8E2B07F7A8DCBDB42083FB9963024
                        SHA-512:1FEDE8749F6ED6DDE7AB2437F1141A4E39C077F93C4B941C08AE3E6FDE0C0A0A8D06BB22D6F4C91353DC491F08C56154CD9CFDFC91A9209B71FB3D29D0C6AD55
                        Malicious:false
                        Reputation:low
                        Preview:...EUP43KDG0..FN.NX1MHIE.VP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NP0MHGZ.XP.:.e.1..g.\'+.=:&"77=.P.*)_%u$+.<-_m!'e....^ ".\XLj4NX1MHI.l..{...x.....T.e.....\...W..Y.e.....y......i.Y......n.......v......q...|...}.......{...y..Uo.y..Zdc..|.Wf......1R%....VP43ODG0..FNxO]1&.m"EVP43ODG.QWGE5@H1-MIEgTP43OD}.RUF^4NXAHHIE.VP$3ODE0QPFO4NX1MMIDEVP43O.@0QQFN4NX1OHI.EV@43_DG0QEFN$NX1MHIUEVP43ODG0QUf.2N\0MHI%BV.~3ODG0QUFN4NX1MHIEEV.33..G0A.@N.NX1MHIEEVP43ODG0QUF..HX)MHI..PPt3ODG0QUFN4NXAHH.AEVP43ODG0QUFN4NX1MHIEEVP43a0"H%UFN).]1MXIEE6U43KDG0QUFN4NX1MHIeEV0.A+%3QQUF.5NXAHHI.DVPP6ODG0QUFN4NX1M.IE.x4UG.DG0=.FN4N_1MFIEE.V43ODG0QUFN4NXqMH.k7%"W3OD.zQUF.3NX}MHI.CVP43ODG0QUFN4.X1.f; )9343..G0Q.AN4rX1M.NEEVP43ODG0QUF.4N.1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0QUFN4NX1MHIEEVP43ODG0Q
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.283257995372125
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Arrival Notice.exe
                        File size:1'407'488 bytes
                        MD5:c3f4606a2dee3f372af2108340951322
                        SHA1:dad640bb0afeb3f348ef692fe271e7e0ca1eab45
                        SHA256:7135dd0f5ab3268a874f61397f34be3d83a7e7b4620be22df6ce6fb1c2fffd7b
                        SHA512:6a3d74cbf3697835a2280fe58f815fe7de6d5f23f39290c23a98b63bd8305a602af166598413a1ec2af68a6e30bc8b157f1d7a8fcb9489f1138a95a8c66ee5ba
                        SSDEEP:24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aQmBghvjtOSI7JEGr/m:4TvC/MTQYxsWR7aQIgfOn
                        TLSH:8155D00273C1C062FFAB92334B5AF6515BBC69660123E51F03A81DBABD705B1563E7A3
                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x420577
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x676206BA [Tue Dec 17 23:18:18 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:948cc502fe9226992dce9417f952fce3
                        Instruction
                        call 00007F00315A4253h
                        jmp 00007F00315A3B5Fh
                        push ebp
                        mov ebp, esp
                        push esi
                        push dword ptr [ebp+08h]
                        mov esi, ecx
                        call 00007F00315A3D3Dh
                        mov dword ptr [esi], 0049FDF0h
                        mov eax, esi
                        pop esi
                        pop ebp
                        retn 0004h
                        and dword ptr [ecx+04h], 00000000h
                        mov eax, ecx
                        and dword ptr [ecx+08h], 00000000h
                        mov dword ptr [ecx+04h], 0049FDF8h
                        mov dword ptr [ecx], 0049FDF0h
                        ret
                        push ebp
                        mov ebp, esp
                        push esi
                        push dword ptr [ebp+08h]
                        mov esi, ecx
                        call 00007F00315A3D0Ah
                        mov dword ptr [esi], 0049FE0Ch
                        mov eax, esi
                        pop esi
                        pop ebp
                        retn 0004h
                        and dword ptr [ecx+04h], 00000000h
                        mov eax, ecx
                        and dword ptr [ecx+08h], 00000000h
                        mov dword ptr [ecx+04h], 0049FE14h
                        mov dword ptr [ecx], 0049FE0Ch
                        ret
                        push ebp
                        mov ebp, esp
                        push esi
                        mov esi, ecx
                        lea eax, dword ptr [esi+04h]
                        mov dword ptr [esi], 0049FDD0h
                        and dword ptr [eax], 00000000h
                        and dword ptr [eax+04h], 00000000h
                        push eax
                        mov eax, dword ptr [ebp+08h]
                        add eax, 04h
                        push eax
                        call 00007F00315A68FDh
                        pop ecx
                        pop ecx
                        mov eax, esi
                        pop esi
                        pop ebp
                        retn 0004h
                        lea eax, dword ptr [ecx+04h]
                        mov dword ptr [ecx], 0049FDD0h
                        push eax
                        call 00007F00315A6948h
                        pop ecx
                        ret
                        push ebp
                        mov ebp, esp
                        push esi
                        mov esi, ecx
                        lea eax, dword ptr [esi+04h]
                        mov dword ptr [esi], 0049FDD0h
                        push eax
                        call 00007F00315A6931h
                        test byte ptr [ebp+08h], 00000001h
                        pop ecx
                        Programming Language:
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x80e60.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1550000x7594.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xd40000x80e600x8100034fc3f9d39db12a77439f46edc68473aFalse0.9502255935077519data7.9414521569157595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1550000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                        RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xdc4100x784f7data1.0003267105121645
                        RT_GROUP_ICON0x1549080x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0x1549800x14dataEnglishGreat Britain1.15
                        RT_VERSION0x1549940xdcdataEnglishGreat Britain0.6181818181818182
                        RT_MANIFEST0x154a700x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-12-18T09:03:06.249721+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449730154.216.17.1902404TCP
                        2024-12-18T09:03:09.603113+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449731154.216.17.1902404TCP
                        2024-12-18T09:03:12.985262+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449732154.216.17.1902404TCP
                        2024-12-18T09:03:16.328989+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449733154.216.17.1902404TCP
                        2024-12-18T09:03:19.673510+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449735154.216.17.1902404TCP
                        2024-12-18T09:03:23.016739+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449738154.216.17.1902404TCP
                        2024-12-18T09:03:26.361725+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449741154.216.17.1902404TCP
                        2024-12-18T09:03:29.704799+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449743154.216.17.1902404TCP
                        2024-12-18T09:03:33.066100+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449744154.216.17.1902404TCP
                        2024-12-18T09:03:36.424355+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449745154.216.17.1902404TCP
                        2024-12-18T09:03:39.768655+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449746154.216.17.1902404TCP
                        2024-12-18T09:03:43.111896+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449747154.216.17.1902404TCP
                        2024-12-18T09:03:46.455031+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449748154.216.17.1902404TCP
                        2024-12-18T09:03:49.831061+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449749154.216.17.1902404TCP
                        2024-12-18T09:03:53.205392+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449750154.216.17.1902404TCP
                        2024-12-18T09:03:56.550346+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449751154.216.17.1902404TCP
                        2024-12-18T09:03:59.893159+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449753154.216.17.1902404TCP
                        2024-12-18T09:04:03.255242+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449760154.216.17.1902404TCP
                        2024-12-18T09:04:06.614291+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449771154.216.17.1902404TCP
                        2024-12-18T09:04:09.954296+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449777154.216.17.1902404TCP
                        2024-12-18T09:04:13.298205+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449788154.216.17.1902404TCP
                        2024-12-18T09:04:16.643223+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449794154.216.17.1902404TCP
                        2024-12-18T09:04:19.989594+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449805154.216.17.1902404TCP
                        2024-12-18T09:04:23.330493+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449812154.216.17.1902404TCP
                        2024-12-18T09:04:26.673679+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449822154.216.17.1902404TCP
                        2024-12-18T09:04:30.017358+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449831154.216.17.1902404TCP
                        2024-12-18T09:04:33.363214+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449837154.216.17.1902404TCP
                        2024-12-18T09:04:36.706662+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449847154.216.17.1902404TCP
                        2024-12-18T09:04:40.050468+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449854154.216.17.1902404TCP
                        2024-12-18T09:04:43.393261+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449864154.216.17.1902404TCP
                        2024-12-18T09:04:46.823022+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449870154.216.17.1902404TCP
                        2024-12-18T09:04:50.174672+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449881154.216.17.1902404TCP
                        2024-12-18T09:04:53.518760+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449888154.216.17.1902404TCP
                        2024-12-18T09:04:57.183312+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449898154.216.17.1902404TCP
                        2024-12-18T09:05:00.472007+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449904154.216.17.1902404TCP
                        2024-12-18T09:05:03.722996+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449915154.216.17.1902404TCP
                        2024-12-18T09:05:06.940711+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449921154.216.17.1902404TCP
                        2024-12-18T09:05:10.129601+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449931154.216.17.1902404TCP
                        2024-12-18T09:05:13.397288+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449937154.216.17.1902404TCP
                        2024-12-18T09:05:16.534065+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449946154.216.17.1902404TCP
                        2024-12-18T09:05:19.644151+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449954154.216.17.1902404TCP
                        2024-12-18T09:05:22.738070+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449962154.216.17.1902404TCP
                        2024-12-18T09:05:25.815348+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449971154.216.17.1902404TCP
                        2024-12-18T09:05:28.847510+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449977154.216.17.1902404TCP
                        2024-12-18T09:05:31.879986+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449986154.216.17.1902404TCP
                        2024-12-18T09:05:34.895362+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449994154.216.17.1902404TCP
                        2024-12-18T09:05:37.915402+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450002154.216.17.1902404TCP
                        2024-12-18T09:05:40.881000+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450011154.216.17.1902404TCP
                        2024-12-18T09:05:43.817589+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450016154.216.17.1902404TCP
                        2024-12-18T09:05:46.801930+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450026154.216.17.1902404TCP
                        2024-12-18T09:05:49.695373+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450033154.216.17.1902404TCP
                        2024-12-18T09:05:52.566689+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450039154.216.17.1902404TCP
                        2024-12-18T09:05:55.427332+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450048154.216.17.1902404TCP
                        2024-12-18T09:05:58.270101+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450056154.216.17.1902404TCP
                        2024-12-18T09:06:01.101367+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450058154.216.17.1902404TCP
                        2024-12-18T09:06:03.927758+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450059154.216.17.1902404TCP
                        2024-12-18T09:06:06.723646+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450060154.216.17.1902404TCP
                        2024-12-18T09:06:09.506254+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450061154.216.17.1902404TCP
                        2024-12-18T09:06:12.301465+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450062154.216.17.1902404TCP
                        2024-12-18T09:06:15.055429+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450063154.216.17.1902404TCP
                        2024-12-18T09:06:17.787471+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450064154.216.17.1902404TCP
                        2024-12-18T09:06:20.504996+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450065154.216.17.1902404TCP
                        2024-12-18T09:06:23.227526+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450066154.216.17.1902404TCP
                        2024-12-18T09:06:25.929624+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450067154.216.17.1902404TCP
                        2024-12-18T09:06:28.627379+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450068154.216.17.1902404TCP
                        2024-12-18T09:06:31.303427+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450069154.216.17.1902404TCP
                        2024-12-18T09:06:33.975404+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450070154.216.17.1902404TCP
                        2024-12-18T09:06:36.646573+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450071154.216.17.1902404TCP
                        2024-12-18T09:06:39.286782+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450072154.216.17.1902404TCP
                        2024-12-18T09:06:41.925964+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450073154.216.17.1902404TCP
                        2024-12-18T09:06:44.553512+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450074154.216.17.1902404TCP
                        2024-12-18T09:06:47.177135+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450075154.216.17.1902404TCP
                        2024-12-18T09:06:49.785710+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450076154.216.17.1902404TCP
                        2024-12-18T09:06:52.383534+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450077154.216.17.1902404TCP
                        2024-12-18T09:06:54.975092+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450078154.216.17.1902404TCP
                        2024-12-18T09:06:57.573946+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450079154.216.17.1902404TCP
                        2024-12-18T09:07:00.145830+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450080154.216.17.1902404TCP
                        2024-12-18T09:07:02.714328+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450081154.216.17.1902404TCP
                        2024-12-18T09:07:05.271575+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450082154.216.17.1902404TCP
                        2024-12-18T09:07:07.818849+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450083154.216.17.1902404TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 18, 2024 09:03:03.905909061 CET497302404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:04.025743008 CET240449730154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:04.025818110 CET497302404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:04.033570051 CET497302404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:04.153126955 CET240449730154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:06.249629974 CET240449730154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:06.249721050 CET497302404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:06.249809027 CET497302404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:06.369396925 CET240449730154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:07.256483078 CET497312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:07.376485109 CET240449731154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:07.376682043 CET497312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:07.380311966 CET497312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:07.500297070 CET240449731154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:09.603018045 CET240449731154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:09.603112936 CET497312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:09.603204966 CET497312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:09.726496935 CET240449731154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:10.640069962 CET497322404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:10.760274887 CET240449732154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:10.760489941 CET497322404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:10.765760899 CET497322404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:10.885766029 CET240449732154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:12.985018969 CET240449732154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:12.985261917 CET497322404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:12.985261917 CET497322404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:13.105375051 CET240449732154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:13.990997076 CET497332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:14.110733986 CET240449733154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:14.110856056 CET497332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:14.117665052 CET497332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:14.237179995 CET240449733154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:16.328923941 CET240449733154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:16.328989029 CET497332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:16.329046011 CET497332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:16.448780060 CET240449733154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:17.334465027 CET497352404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:17.454472065 CET240449735154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:17.454560995 CET497352404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:17.458535910 CET497352404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:17.578326941 CET240449735154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:19.673269033 CET240449735154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:19.673510075 CET497352404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:19.673629999 CET497352404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:19.793452024 CET240449735154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:20.678860903 CET497382404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:20.798892975 CET240449738154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:20.799052000 CET497382404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:20.802447081 CET497382404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:20.922987938 CET240449738154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:23.016654015 CET240449738154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:23.016738892 CET497382404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:23.016828060 CET497382404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:23.136902094 CET240449738154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:24.022161961 CET497412404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:24.141832113 CET240449741154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:24.141922951 CET497412404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:24.147041082 CET497412404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:24.266649961 CET240449741154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:26.361665010 CET240449741154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:26.361725092 CET497412404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:26.361790895 CET497412404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:26.481730938 CET240449741154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:27.365911961 CET497432404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:27.485673904 CET240449743154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:27.485763073 CET497432404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:27.489403009 CET497432404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:27.610364914 CET240449743154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:29.704747915 CET240449743154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:29.704798937 CET497432404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:29.708096981 CET497432404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:29.827543974 CET240449743154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:30.709642887 CET497442404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:30.829437017 CET240449744154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:30.829533100 CET497442404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:30.833153963 CET497442404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:30.952801943 CET240449744154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:33.065886021 CET240449744154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:33.066099882 CET497442404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:33.066099882 CET497442404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:33.186134100 CET240449744154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:34.070300102 CET497452404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:34.190406084 CET240449745154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:34.190526962 CET497452404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:34.194794893 CET497452404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:34.314481020 CET240449745154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:36.424254894 CET240449745154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:36.424355030 CET497452404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:36.424446106 CET497452404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:36.543982983 CET240449745154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:37.428510904 CET497462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:37.548408985 CET240449746154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:37.548757076 CET497462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:37.552422047 CET497462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:37.672243118 CET240449746154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:39.768516064 CET240449746154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:39.768655062 CET497462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:39.768743992 CET497462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:39.888619900 CET240449746154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:40.772182941 CET497472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:40.892079115 CET240449747154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:40.892180920 CET497472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:40.895898104 CET497472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:41.015806913 CET240449747154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:43.111798048 CET240449747154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:43.111896038 CET497472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:43.112005949 CET497472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:43.231580973 CET240449747154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:44.116125107 CET497482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:44.236227036 CET240449748154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:44.236309052 CET497482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:44.247250080 CET497482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:44.367733955 CET240449748154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:46.454960108 CET240449748154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:46.455030918 CET497482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:46.455117941 CET497482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:46.574665070 CET240449748154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:47.466703892 CET497492404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:47.586447001 CET240449749154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:47.586538076 CET497492404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:47.590600014 CET497492404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:47.710345030 CET240449749154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:49.830805063 CET240449749154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:49.831060886 CET497492404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:49.841352940 CET497492404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:49.960932016 CET240449749154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:50.850277901 CET497502404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:50.970005989 CET240449750154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:50.971136093 CET497502404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:50.974564075 CET497502404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:51.094418049 CET240449750154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:53.205307961 CET240449750154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:53.205391884 CET497502404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:53.205559015 CET497502404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:53.325068951 CET240449750154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:54.209659100 CET497512404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:54.329700947 CET240449751154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:54.329792023 CET497512404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:54.332804918 CET497512404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:54.452310085 CET240449751154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:56.550195932 CET240449751154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:56.550345898 CET497512404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:56.550347090 CET497512404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:56.670252085 CET240449751154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:57.554362059 CET497532404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:57.675738096 CET240449753154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:57.675812006 CET497532404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:57.679115057 CET497532404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:57.798979044 CET240449753154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:59.892976999 CET240449753154.216.17.190192.168.2.4
                        Dec 18, 2024 09:03:59.893158913 CET497532404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:03:59.893158913 CET497532404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:00.012907982 CET240449753154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:00.897397995 CET497602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:01.017033100 CET240449760154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:01.017144918 CET497602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:01.020215034 CET497602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:01.142770052 CET240449760154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:03.252208948 CET240449760154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:03.255242109 CET497602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:03.255242109 CET497602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:03.374943018 CET240449760154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:04.272283077 CET497712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:04.392106056 CET240449771154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:04.392518044 CET497712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:04.395838022 CET497712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:04.515491962 CET240449771154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:06.612658978 CET240449771154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:06.614290953 CET497712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:06.614377022 CET497712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:06.733935118 CET240449771154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:07.616182089 CET497772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:07.735837936 CET240449777154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:07.735964060 CET497772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:07.741080999 CET497772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:07.860596895 CET240449777154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:09.954238892 CET240449777154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:09.954296112 CET497772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:09.954361916 CET497772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:10.073971033 CET240449777154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:10.960011959 CET497882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:11.079760075 CET240449788154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:11.080013990 CET497882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:11.091195107 CET497882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:11.210727930 CET240449788154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:13.298090935 CET240449788154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:13.298204899 CET497882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:13.298279047 CET497882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:13.417787075 CET240449788154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:14.303833008 CET497942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:14.423444986 CET240449794154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:14.423690081 CET497942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:14.427748919 CET497942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:14.547261953 CET240449794154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:16.643146992 CET240449794154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:16.643223047 CET497942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:16.643352985 CET497942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:16.763681889 CET240449794154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:17.647140980 CET498052404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:17.767733097 CET240449805154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:17.767824888 CET498052404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:17.777793884 CET498052404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:17.897325993 CET240449805154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:19.986792088 CET240449805154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:19.989593983 CET498052404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:19.989667892 CET498052404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:20.109565020 CET240449805154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:20.990839005 CET498122404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:21.110407114 CET240449812154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:21.110496044 CET498122404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:21.114304066 CET498122404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:21.233761072 CET240449812154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:23.330430984 CET240449812154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:23.330492973 CET498122404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:23.330544949 CET498122404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:23.449997902 CET240449812154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:24.334929943 CET498222404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:24.454839945 CET240449822154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:24.454906940 CET498222404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:24.463485003 CET498222404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:24.582943916 CET240449822154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:26.673614979 CET240449822154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:26.673679113 CET498222404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:26.673737049 CET498222404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:26.793179989 CET240449822154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:27.678455114 CET498312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:27.797924995 CET240449831154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:27.798062086 CET498312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:27.801871061 CET498312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:27.923172951 CET240449831154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:30.017270088 CET240449831154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:30.017358065 CET498312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:30.017549992 CET498312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:30.137219906 CET240449831154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:31.022238970 CET498372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:31.142208099 CET240449837154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:31.143199921 CET498372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:31.156663895 CET498372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:31.276165009 CET240449837154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:33.362097025 CET240449837154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:33.363214016 CET498372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:33.363267899 CET498372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:33.482723951 CET240449837154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:34.366451979 CET498472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:34.486100912 CET240449847154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:34.487227917 CET498472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:34.491065979 CET498472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:34.610589027 CET240449847154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:36.706522942 CET240449847154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:36.706661940 CET498472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:36.706662893 CET498472404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:36.826297045 CET240449847154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:37.709665060 CET498542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:37.829320908 CET240449854154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:37.829518080 CET498542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:37.832997084 CET498542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:37.952610016 CET240449854154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:40.050360918 CET240449854154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:40.050467968 CET498542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:40.050538063 CET498542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:40.170026064 CET240449854154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:41.053613901 CET498642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:41.174806118 CET240449864154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:41.177799940 CET498642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:41.194516897 CET498642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:41.313990116 CET240449864154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:43.393122911 CET240449864154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:43.393260956 CET498642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:43.393260956 CET498642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:43.512774944 CET240449864154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:44.397459984 CET498702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:44.516983986 CET240449870154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:44.517827988 CET498702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:44.523037910 CET498702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:44.642586946 CET240449870154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:46.822829008 CET240449870154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:46.823021889 CET498702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:46.823160887 CET498702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:46.945036888 CET240449870154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:47.835504055 CET498812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:47.955005884 CET240449881154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:47.955101967 CET498812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:47.962960958 CET498812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:48.082432985 CET240449881154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:50.174555063 CET240449881154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:50.174671888 CET498812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:50.174750090 CET498812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:50.294567108 CET240449881154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:51.178972006 CET498882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:51.298439026 CET240449888154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:51.298532009 CET498882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:51.302407980 CET498882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:51.423106909 CET240449888154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:53.518515110 CET240449888154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:53.518759966 CET498882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:53.518759966 CET498882404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:53.638516903 CET240449888154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:54.616914988 CET498982404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:54.736444950 CET240449898154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:54.737473965 CET498982404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:54.741050959 CET498982404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:54.860505104 CET240449898154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:57.182100058 CET240449898154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:57.183311939 CET498982404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:57.183526993 CET498982404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:57.302964926 CET240449898154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:58.132750034 CET499042404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:58.252444029 CET240449904154.216.17.190192.168.2.4
                        Dec 18, 2024 09:04:58.255331993 CET499042404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:58.259102106 CET499042404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:04:58.378783941 CET240449904154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:00.471867085 CET240449904154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:00.472007036 CET499042404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:00.472101927 CET499042404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:00.591489077 CET240449904154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:01.383145094 CET499152404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:01.502718925 CET240449915154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:01.503361940 CET499152404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:01.533205032 CET499152404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:01.652700901 CET240449915154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:03.722913027 CET240449915154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:03.722995996 CET499152404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:03.723077059 CET499152404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:03.842466116 CET240449915154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:04.600600004 CET499212404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:04.720202923 CET240449921154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:04.721605062 CET499212404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:04.725431919 CET499212404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:04.845006943 CET240449921154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:06.940622091 CET240449921154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:06.940711021 CET499212404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:06.940781116 CET499212404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:07.060333014 CET240449921154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:07.788116932 CET499312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:07.907762051 CET240449931154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:07.907965899 CET499312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:07.912147045 CET499312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:08.031763077 CET240449931154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:10.127465010 CET240449931154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:10.129601002 CET499312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:10.129684925 CET499312404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:10.249144077 CET240449931154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:10.960134029 CET499372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:11.172657967 CET240449937154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:11.173360109 CET499372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:11.177074909 CET499372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:11.299791098 CET240449937154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:13.395670891 CET240449937154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:13.397288084 CET499372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:13.397341967 CET499372404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:13.516877890 CET240449937154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:14.194252968 CET499462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:14.313812017 CET240449946154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:14.314065933 CET499462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:14.317888021 CET499462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:14.437352896 CET240449946154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:16.533925056 CET240449946154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:16.534065008 CET499462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:16.534228086 CET499462404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:16.653628111 CET240449946154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:17.303776979 CET499542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:17.423273087 CET240449954154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:17.425666094 CET499542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:17.429435015 CET499542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:17.548923969 CET240449954154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:19.644013882 CET240449954154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:19.644150972 CET499542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:19.644206047 CET499542404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:19.763637066 CET240449954154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:20.399116039 CET499622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:20.518716097 CET240449962154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:20.518840075 CET499622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:20.537826061 CET499622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:20.657377958 CET240449962154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:22.737818003 CET240449962154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:22.738070011 CET499622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:22.738145113 CET499622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:22.857780933 CET240449962154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:23.474127054 CET499712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:23.593708038 CET240449971154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:23.597047091 CET499712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:23.615041971 CET499712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:23.734602928 CET240449971154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:25.815030098 CET240449971154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:25.815347910 CET499712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:25.815443993 CET499712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:25.935456991 CET240449971154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:26.507150888 CET499772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:26.626682997 CET240449977154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:26.628165007 CET499772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:26.632309914 CET499772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:26.751852036 CET240449977154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:28.847392082 CET240449977154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:28.847510099 CET499772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:28.847579956 CET499772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:28.967047930 CET240449977154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:29.522382021 CET499862404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:29.649475098 CET240449986154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:29.649795055 CET499862404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:29.656847954 CET499862404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:29.783113956 CET240449986154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:31.879890919 CET240449986154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:31.879986048 CET499862404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:31.880053997 CET499862404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:31.999598980 CET240449986154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:32.554126024 CET499942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:32.673765898 CET240449994154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:32.673871040 CET499942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:32.682017088 CET499942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:32.801493883 CET240449994154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:34.894007921 CET240449994154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:34.895361900 CET499942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:34.895492077 CET499942404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:35.015363932 CET240449994154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:35.571885109 CET500022404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:35.691392899 CET240450002154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:35.694092989 CET500022404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:35.697644949 CET500022404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:35.817158937 CET240450002154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:37.910967112 CET240450002154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:37.915401936 CET500022404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:37.915546894 CET500022404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:38.034961939 CET240450002154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:38.522641897 CET500112404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:38.643306971 CET240450011154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:38.645642996 CET500112404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:38.649435997 CET500112404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:38.769031048 CET240450011154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:40.880928040 CET240450011154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:40.881000042 CET500112404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:40.881227016 CET500112404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:41.000756025 CET240450011154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:41.486344099 CET500162404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:41.605917931 CET240450016154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:41.606021881 CET500162404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:41.613589048 CET500162404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:41.733083963 CET240450016154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:43.815609932 CET240450016154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:43.817589045 CET500162404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:43.885196924 CET500162404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:44.004816055 CET240450016154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:44.460257053 CET500262404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:44.579888105 CET240450026154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:44.580085993 CET500262404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:44.584101915 CET500262404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:44.703650951 CET240450026154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:46.801809072 CET240450026154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:46.801929951 CET500262404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:46.802026987 CET500262404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:46.921557903 CET240450026154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:47.350611925 CET500332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:47.470133066 CET240450033154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:47.471426964 CET500332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:47.474992037 CET500332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:47.594847918 CET240450033154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:49.692578077 CET240450033154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:49.695373058 CET500332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:49.695420980 CET500332404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:49.815363884 CET240450033154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:50.225568056 CET500392404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:50.345434904 CET240450039154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:50.347481966 CET500392404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:50.361978054 CET500392404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:50.481733084 CET240450039154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:52.566529036 CET240450039154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:52.566689014 CET500392404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:52.566689014 CET500392404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:52.686335087 CET240450039154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:53.084758043 CET500482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:53.204488039 CET240450048154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:53.204587936 CET500482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:53.207917929 CET500482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:53.327635050 CET240450048154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:55.426156044 CET240450048154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:55.427331924 CET500482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:55.429358006 CET500482404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:55.548921108 CET240450048154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:55.929018021 CET500562404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:56.048816919 CET240450056154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:56.051422119 CET500562404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:56.059916019 CET500562404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:56.179440975 CET240450056154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:58.270005941 CET240450056154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:58.270101070 CET500562404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:58.270188093 CET500562404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:58.389707088 CET240450056154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:58.756762028 CET500582404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:58.876941919 CET240450058154.216.17.190192.168.2.4
                        Dec 18, 2024 09:05:58.877166986 CET500582404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:58.880651951 CET500582404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:05:59.000880003 CET240450058154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:01.099200010 CET240450058154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:01.101366997 CET500582404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:01.101433992 CET500582404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:01.221035004 CET240450058154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:01.587542057 CET500592404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:01.707401991 CET240450059154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:01.709450006 CET500592404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:01.751322031 CET500592404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:01.871040106 CET240450059154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:03.927515030 CET240450059154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:03.927757978 CET500592404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:03.927830935 CET500592404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:04.048120975 CET240450059154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:04.382210970 CET500602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:04.501913071 CET240450060154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:04.502036095 CET500602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:04.505459070 CET500602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:04.625885010 CET240450060154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:06.723273993 CET240450060154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:06.723645926 CET500602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:06.723645926 CET500602404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:06.843455076 CET240450060154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:07.164397001 CET500612404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:07.284080029 CET240450061154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:07.284189939 CET500612404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:07.288265944 CET500612404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:07.407821894 CET240450061154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:09.503541946 CET240450061154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:09.506253958 CET500612404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:09.506594896 CET500612404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:09.626338959 CET240450061154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:09.929423094 CET500622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:10.049173117 CET240450062154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:10.049259901 CET500622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:10.055489063 CET500622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:10.175208092 CET240450062154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:12.301335096 CET240450062154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:12.301465034 CET500622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:12.301714897 CET500622404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:12.422359943 CET240450062154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:12.711430073 CET500632404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:12.831123114 CET240450063154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:12.831361055 CET500632404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:12.837481022 CET500632404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:12.957020044 CET240450063154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:15.051440001 CET240450063154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:15.055428982 CET500632404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:15.055500031 CET500632404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:15.175451040 CET240450063154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:15.445067883 CET500642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:15.564974070 CET240450064154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:15.567472935 CET500642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:15.573303938 CET500642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:15.694938898 CET240450064154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:17.786751032 CET240450064154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:17.787471056 CET500642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:17.787700891 CET500642404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:17.907224894 CET240450064154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:18.164037943 CET500652404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:18.283598900 CET240450065154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:18.283850908 CET500652404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:18.287386894 CET500652404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:18.406948090 CET240450065154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:20.504853010 CET240450065154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:20.504996061 CET500652404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:20.505131960 CET500652404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:20.624627113 CET240450065154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:20.882015944 CET500662404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:21.002149105 CET240450066154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:21.002448082 CET500662404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:21.007909060 CET500662404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:21.129126072 CET240450066154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:23.223510981 CET240450066154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:23.227525949 CET500662404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:23.227615118 CET500662404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:23.347395897 CET240450066154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:23.585040092 CET500672404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:23.704879045 CET240450067154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:23.705008030 CET500672404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:23.708877087 CET500672404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:23.828490019 CET240450067154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:25.926666021 CET240450067154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:25.929624081 CET500672404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:25.929624081 CET500672404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:26.049324989 CET240450067154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:26.272567034 CET500682404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:26.392400980 CET240450068154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:26.392625093 CET500682404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:26.396265030 CET500682404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:26.515858889 CET240450068154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:28.622448921 CET240450068154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:28.627378941 CET500682404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:28.627424955 CET500682404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:28.747045994 CET240450068154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:28.960196018 CET500692404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:29.081765890 CET240450069154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:29.081866980 CET500692404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:29.089638948 CET500692404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:29.213495016 CET240450069154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:31.300923109 CET240450069154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:31.303426981 CET500692404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:31.303497076 CET500692404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:31.423060894 CET240450069154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:31.631936073 CET500702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:31.751986980 CET240450070154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:31.755459070 CET500702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:31.760435104 CET500702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:31.880028009 CET240450070154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:33.972961903 CET240450070154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:33.975404024 CET500702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:33.975476027 CET500702404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:34.095091105 CET240450070154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:34.288319111 CET500712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:34.408065081 CET240450071154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:34.408170938 CET500712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:34.415394068 CET500712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:34.535087109 CET240450071154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:36.646482944 CET240450071154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:36.646573067 CET500712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:36.646671057 CET500712404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:36.766189098 CET240450071154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:36.944531918 CET500722404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:37.064291954 CET240450072154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:37.065598011 CET500722404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:37.070000887 CET500722404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:37.189604998 CET240450072154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:39.286604881 CET240450072154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:39.286782026 CET500722404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:39.286870003 CET500722404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:39.408374071 CET240450072154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:39.585207939 CET500732404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:39.705075026 CET240450073154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:39.705178022 CET500732404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:39.710303068 CET500732404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:39.829998016 CET240450073154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:41.925877094 CET240450073154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:41.925964117 CET500732404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:41.926031113 CET500732404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:42.045695066 CET240450073154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:42.210283995 CET500742404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:42.329940081 CET240450074154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:42.330050945 CET500742404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:42.334913969 CET500742404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:42.454628944 CET240450074154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:44.551929951 CET240450074154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:44.553512096 CET500742404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:44.553715944 CET500742404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:44.673382044 CET240450074154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:44.838042974 CET500752404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:44.957770109 CET240450075154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:44.958420038 CET500752404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:44.962081909 CET500752404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:45.081887007 CET240450075154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:47.177067995 CET240450075154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:47.177134991 CET500752404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:47.177190065 CET500752404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:47.296936989 CET240450075154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:47.444540977 CET500762404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:47.565313101 CET240450076154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:47.565586090 CET500762404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:47.568531036 CET500762404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:47.688841105 CET240450076154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:49.785624027 CET240450076154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:49.785710096 CET500762404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:49.785809994 CET500762404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:49.905431032 CET240450076154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:50.038187027 CET500772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:50.157871962 CET240450077154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:50.157984972 CET500772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:50.164382935 CET500772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:50.284054041 CET240450077154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:52.379477978 CET240450077154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:52.383533955 CET500772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:52.384731054 CET500772404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:52.504293919 CET240450077154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:52.631978035 CET500782404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:52.751713037 CET240450078154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:52.751817942 CET500782404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:52.756510973 CET500782404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:52.876143932 CET240450078154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:54.974924088 CET240450078154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:54.975091934 CET500782404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:54.975285053 CET500782404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:55.094912052 CET240450078154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:55.210205078 CET500792404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:55.330709934 CET240450079154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:55.334135056 CET500792404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:55.340790033 CET500792404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:55.460427046 CET240450079154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:57.570142984 CET240450079154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:57.573945999 CET500792404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:57.573998928 CET500792404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:57.693703890 CET240450079154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:57.804461956 CET500802404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:57.924213886 CET240450080154.216.17.190192.168.2.4
                        Dec 18, 2024 09:06:57.925677061 CET500802404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:57.932007074 CET500802404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:06:58.052881002 CET240450080154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:00.145708084 CET240450080154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:00.145829916 CET500802404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:00.145941973 CET500802404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:00.266696930 CET240450080154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:00.366347075 CET500812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:00.486083984 CET240450081154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:00.487489939 CET500812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:00.499283075 CET500812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:00.620533943 CET240450081154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:02.710547924 CET240450081154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:02.714328051 CET500812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:02.714329004 CET500812404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:02.834125042 CET240450081154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:02.929199934 CET500822404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:03.048998117 CET240450082154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:03.049732924 CET500822404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:03.054863930 CET500822404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:03.174546003 CET240450082154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:05.271337032 CET240450082154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:05.271574974 CET500822404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:05.271575928 CET500822404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:05.391247034 CET240450082154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:05.479646921 CET500832404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:05.599417925 CET240450083154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:05.600816011 CET500832404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:05.604298115 CET500832404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:05.723958969 CET240450083154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:07.818727016 CET240450083154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:07.818849087 CET500832404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:07.818929911 CET500832404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:07.938973904 CET240450083154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:08.834760904 CET500842404192.168.2.4154.216.17.190
                        Dec 18, 2024 09:07:08.954639912 CET240450084154.216.17.190192.168.2.4
                        Dec 18, 2024 09:07:08.955466986 CET500842404192.168.2.4154.216.17.190

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:03:02:58
                        Start date:18/12/2024
                        Path:C:\Users\user\Desktop\Arrival Notice.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Arrival Notice.exe"
                        Imagebase:0xe70000
                        File size:1'407'488 bytes
                        MD5 hash:C3F4606A2DEE3F372AF2108340951322
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.1725800784.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:03:03:02
                        Start date:18/12/2024
                        Path:C:\Windows\SysWOW64\svchost.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Arrival Notice.exe"
                        Imagebase:0x5f0000
                        File size:46'504 bytes
                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.4156834032.0000000003430000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.4156781052.0000000003400000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000001.00000002.4156451148.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.1%
                          Dynamic/Decrypted Code Coverage:0.9%
                          Signature Coverage:3%
                          Total number of Nodes:1959
                          Total number of Limit Nodes:53
                          execution_graph 95091 e71044 95096 e710f3 95091->95096 95093 e7104a 95132 e900a3 29 API calls __onexit 95093->95132 95095 e71054 95133 e71398 95096->95133 95100 e7116a 95143 e7a961 95100->95143 95103 e7a961 22 API calls 95104 e7117e 95103->95104 95105 e7a961 22 API calls 95104->95105 95106 e71188 95105->95106 95107 e7a961 22 API calls 95106->95107 95108 e711c6 95107->95108 95109 e7a961 22 API calls 95108->95109 95110 e71292 95109->95110 95148 e7171c 95110->95148 95114 e712c4 95115 e7a961 22 API calls 95114->95115 95116 e712ce 95115->95116 95169 e81940 95116->95169 95118 e712f9 95179 e71aab 95118->95179 95120 e71315 95121 e71325 GetStdHandle 95120->95121 95122 e7137a 95121->95122 95123 eb2485 95121->95123 95126 e71387 OleInitialize 95122->95126 95123->95122 95124 eb248e 95123->95124 95186 e8fddb 95124->95186 95126->95093 95127 eb2495 95196 ee011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95127->95196 95129 eb249e 95197 ee0944 CreateThread 95129->95197 95131 eb24aa CloseHandle 95131->95122 95132->95095 95198 e713f1 95133->95198 95136 e713f1 22 API calls 95137 e713d0 95136->95137 95138 e7a961 22 API calls 95137->95138 95139 e713dc 95138->95139 95205 e76b57 95139->95205 95141 e71129 95142 e71bc3 6 API calls 95141->95142 95142->95100 95144 e8fe0b 22 API calls 95143->95144 95145 e7a976 95144->95145 95146 e8fddb 22 API calls 95145->95146 95147 e71174 95146->95147 95147->95103 95149 e7a961 22 API calls 95148->95149 95150 e7172c 95149->95150 95151 e7a961 22 API calls 95150->95151 95152 e71734 95151->95152 95153 e7a961 22 API calls 95152->95153 95154 e7174f 95153->95154 95155 e8fddb 22 API calls 95154->95155 95156 e7129c 95155->95156 95157 e71b4a 95156->95157 95158 e71b58 95157->95158 95159 e7a961 22 API calls 95158->95159 95160 e71b63 95159->95160 95161 e7a961 22 API calls 95160->95161 95162 e71b6e 95161->95162 95163 e7a961 22 API calls 95162->95163 95164 e71b79 95163->95164 95165 e7a961 22 API calls 95164->95165 95166 e71b84 95165->95166 95167 e8fddb 22 API calls 95166->95167 95168 e71b96 RegisterWindowMessageW 95167->95168 95168->95114 95170 e81981 95169->95170 95177 e8195d 95169->95177 95253 e90242 5 API calls __Init_thread_wait 95170->95253 95171 e8196e 95171->95118 95174 e8198b 95174->95177 95254 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95174->95254 95175 e88727 95175->95171 95256 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95175->95256 95177->95171 95255 e90242 5 API calls __Init_thread_wait 95177->95255 95180 eb272d 95179->95180 95181 e71abb 95179->95181 95257 ee3209 23 API calls 95180->95257 95182 e8fddb 22 API calls 95181->95182 95184 e71ac3 95182->95184 95184->95120 95185 eb2738 95189 e8fde0 95186->95189 95187 e9ea0c ___std_exception_copy 21 API calls 95187->95189 95188 e8fdfa 95188->95127 95189->95187 95189->95188 95192 e8fdfc 95189->95192 95258 e94ead 7 API calls 2 library calls 95189->95258 95191 e9066d 95260 e932a4 RaiseException 95191->95260 95192->95191 95259 e932a4 RaiseException 95192->95259 95195 e9068a 95195->95127 95196->95129 95197->95131 95261 ee092a 28 API calls 95197->95261 95199 e7a961 22 API calls 95198->95199 95200 e713fc 95199->95200 95201 e7a961 22 API calls 95200->95201 95202 e71404 95201->95202 95203 e7a961 22 API calls 95202->95203 95204 e713c6 95203->95204 95204->95136 95206 e76b67 _wcslen 95205->95206 95207 eb4ba1 95205->95207 95210 e76ba2 95206->95210 95211 e76b7d 95206->95211 95231 e793b2 95207->95231 95209 eb4baa 95209->95209 95213 e8fddb 22 API calls 95210->95213 95217 e76f34 95211->95217 95215 e76bae 95213->95215 95214 e76b85 __fread_nolock 95214->95141 95221 e8fe0b 95215->95221 95218 e76f4c 95217->95218 95220 e76f46 95217->95220 95219 e8fe0b 22 API calls 95218->95219 95219->95220 95220->95214 95224 e8fddb 95221->95224 95223 e8fdfa 95223->95214 95224->95223 95227 e8fdfc 95224->95227 95235 e9ea0c 95224->95235 95242 e94ead 7 API calls 2 library calls 95224->95242 95226 e9066d 95244 e932a4 RaiseException 95226->95244 95227->95226 95243 e932a4 RaiseException 95227->95243 95230 e9068a 95230->95214 95232 e793c0 95231->95232 95233 e793c9 __fread_nolock 95231->95233 95232->95233 95247 e7aec9 95232->95247 95233->95209 95233->95233 95240 ea3820 _free 95235->95240 95236 ea385e 95246 e9f2d9 20 API calls _free 95236->95246 95237 ea3849 RtlAllocateHeap 95239 ea385c 95237->95239 95237->95240 95239->95224 95240->95236 95240->95237 95245 e94ead 7 API calls 2 library calls 95240->95245 95242->95224 95243->95226 95244->95230 95245->95240 95246->95239 95248 e7aedc 95247->95248 95252 e7aed9 __fread_nolock 95247->95252 95249 e8fddb 22 API calls 95248->95249 95250 e7aee7 95249->95250 95251 e8fe0b 22 API calls 95250->95251 95251->95252 95252->95233 95253->95174 95254->95177 95255->95175 95256->95171 95257->95185 95258->95189 95259->95191 95260->95195 95262 e72de3 95263 e72df0 __wsopen_s 95262->95263 95264 eb2c2b ___scrt_fastfail 95263->95264 95265 e72e09 95263->95265 95268 eb2c47 GetOpenFileNameW 95264->95268 95278 e73aa2 95265->95278 95270 eb2c96 95268->95270 95271 e76b57 22 API calls 95270->95271 95273 eb2cab 95271->95273 95273->95273 95275 e72e27 95306 e744a8 95275->95306 95336 eb1f50 95278->95336 95281 e73ace 95283 e76b57 22 API calls 95281->95283 95282 e73ae9 95342 e7a6c3 95282->95342 95285 e73ada 95283->95285 95338 e737a0 95285->95338 95288 e72da5 95289 eb1f50 __wsopen_s 95288->95289 95290 e72db2 GetLongPathNameW 95289->95290 95291 e76b57 22 API calls 95290->95291 95292 e72dda 95291->95292 95293 e73598 95292->95293 95294 e7a961 22 API calls 95293->95294 95295 e735aa 95294->95295 95296 e73aa2 23 API calls 95295->95296 95297 e735b5 95296->95297 95298 e735c0 95297->95298 95303 eb32eb 95297->95303 95348 e7515f 95298->95348 95302 eb330d 95303->95302 95360 e8ce60 41 API calls 95303->95360 95305 e735df 95305->95275 95361 e74ecb 95306->95361 95309 eb3833 95383 ee2cf9 95309->95383 95310 e74ecb 94 API calls 95312 e744e1 95310->95312 95312->95309 95314 e744e9 95312->95314 95313 eb3848 95315 eb3869 95313->95315 95316 eb384c 95313->95316 95318 e744f5 95314->95318 95319 eb3854 95314->95319 95317 e8fe0b 22 API calls 95315->95317 95418 e74f39 95316->95418 95329 eb38ae 95317->95329 95417 e7940c 136 API calls 2 library calls 95318->95417 95424 edda5a 82 API calls 95319->95424 95323 e72e31 95324 eb3862 95324->95315 95325 eb3a5f 95327 eb3a67 95325->95327 95326 e74f39 68 API calls 95326->95327 95327->95326 95429 ed989b 82 API calls __wsopen_s 95327->95429 95329->95325 95329->95327 95333 e79cb3 22 API calls 95329->95333 95409 e7a4a1 95329->95409 95425 ed967e 22 API calls __fread_nolock 95329->95425 95426 ed95ad 42 API calls _wcslen 95329->95426 95427 ee0b5a 22 API calls 95329->95427 95428 e73ff7 22 API calls 95329->95428 95333->95329 95337 e73aaf GetFullPathNameW 95336->95337 95337->95281 95337->95282 95339 e737ae 95338->95339 95340 e793b2 22 API calls 95339->95340 95341 e72e12 95340->95341 95341->95288 95343 e7a6dd 95342->95343 95347 e7a6d0 95342->95347 95344 e8fddb 22 API calls 95343->95344 95345 e7a6e7 95344->95345 95346 e8fe0b 22 API calls 95345->95346 95346->95347 95347->95285 95349 e7516e 95348->95349 95353 e7518f __fread_nolock 95348->95353 95351 e8fe0b 22 API calls 95349->95351 95350 e8fddb 22 API calls 95352 e735cc 95350->95352 95351->95353 95354 e735f3 95352->95354 95353->95350 95355 e73605 95354->95355 95359 e73624 __fread_nolock 95354->95359 95357 e8fe0b 22 API calls 95355->95357 95356 e8fddb 22 API calls 95358 e7363b 95356->95358 95357->95359 95358->95305 95359->95356 95360->95303 95430 e74e90 LoadLibraryA 95361->95430 95366 e74ef6 LoadLibraryExW 95438 e74e59 LoadLibraryA 95366->95438 95367 eb3ccf 95368 e74f39 68 API calls 95367->95368 95370 eb3cd6 95368->95370 95372 e74e59 3 API calls 95370->95372 95374 eb3cde 95372->95374 95460 e750f5 95374->95460 95375 e74f20 95375->95374 95376 e74f2c 95375->95376 95377 e74f39 68 API calls 95376->95377 95379 e744cd 95377->95379 95379->95309 95379->95310 95382 eb3d05 95384 ee2d15 95383->95384 95385 e7511f 64 API calls 95384->95385 95386 ee2d29 95385->95386 95712 ee2e66 75 API calls 95386->95712 95388 ee2d3b 95389 e750f5 40 API calls 95388->95389 95407 ee2d3f 95388->95407 95390 ee2d56 95389->95390 95391 e750f5 40 API calls 95390->95391 95392 ee2d66 95391->95392 95393 e750f5 40 API calls 95392->95393 95394 ee2d81 95393->95394 95395 e750f5 40 API calls 95394->95395 95396 ee2d9c 95395->95396 95397 e7511f 64 API calls 95396->95397 95398 ee2db3 95397->95398 95399 e9ea0c ___std_exception_copy 21 API calls 95398->95399 95400 ee2dba 95399->95400 95401 e9ea0c ___std_exception_copy 21 API calls 95400->95401 95402 ee2dc4 95401->95402 95403 e750f5 40 API calls 95402->95403 95404 ee2dd8 95403->95404 95713 ee28fe 27 API calls 95404->95713 95406 ee2dee 95406->95407 95714 ee22ce 95406->95714 95407->95313 95410 e7a52b 95409->95410 95414 e7a4b1 __fread_nolock 95409->95414 95413 e8fe0b 22 API calls 95410->95413 95411 e8fddb 22 API calls 95412 e7a4b8 95411->95412 95415 e8fddb 22 API calls 95412->95415 95416 e7a4d6 95412->95416 95413->95414 95414->95411 95415->95416 95416->95329 95417->95323 95419 e74f43 95418->95419 95423 e74f4a 95418->95423 95420 e9e678 67 API calls 95419->95420 95420->95423 95421 e74f6a FreeLibrary 95422 e74f59 95421->95422 95422->95319 95423->95421 95423->95422 95424->95324 95425->95329 95426->95329 95427->95329 95428->95329 95429->95327 95431 e74ec6 95430->95431 95432 e74ea8 GetProcAddress 95430->95432 95435 e9e5eb 95431->95435 95433 e74eb8 95432->95433 95433->95431 95434 e74ebf FreeLibrary 95433->95434 95434->95431 95466 e9e52a 95435->95466 95437 e74eea 95437->95366 95437->95367 95439 e74e6e GetProcAddress 95438->95439 95440 e74e8d 95438->95440 95441 e74e7e 95439->95441 95443 e74f80 95440->95443 95441->95440 95442 e74e86 FreeLibrary 95441->95442 95442->95440 95444 e8fe0b 22 API calls 95443->95444 95445 e74f95 95444->95445 95534 e75722 95445->95534 95447 e74fa1 __fread_nolock 95448 e750a5 95447->95448 95449 eb3d1d 95447->95449 95459 e74fdc 95447->95459 95537 e742a2 CreateStreamOnHGlobal 95448->95537 95548 ee304d 74 API calls 95449->95548 95452 eb3d22 95454 e7511f 64 API calls 95452->95454 95453 e750f5 40 API calls 95453->95459 95455 eb3d45 95454->95455 95456 e750f5 40 API calls 95455->95456 95457 e7506e messages 95456->95457 95457->95375 95459->95452 95459->95453 95459->95457 95543 e7511f 95459->95543 95461 e75107 95460->95461 95462 eb3d70 95460->95462 95570 e9e8c4 95461->95570 95465 ee28fe 27 API calls 95465->95382 95467 e9e536 CallCatchBlock 95466->95467 95468 e9e544 95467->95468 95471 e9e574 95467->95471 95491 e9f2d9 20 API calls _free 95468->95491 95470 e9e549 95492 ea27ec 26 API calls pre_c_initialization 95470->95492 95473 e9e579 95471->95473 95474 e9e586 95471->95474 95493 e9f2d9 20 API calls _free 95473->95493 95483 ea8061 95474->95483 95477 e9e58f 95478 e9e5a2 95477->95478 95479 e9e595 95477->95479 95495 e9e5d4 LeaveCriticalSection __fread_nolock 95478->95495 95494 e9f2d9 20 API calls _free 95479->95494 95480 e9e554 __wsopen_s 95480->95437 95484 ea806d CallCatchBlock 95483->95484 95496 ea2f5e EnterCriticalSection 95484->95496 95486 ea807b 95497 ea80fb 95486->95497 95490 ea80ac __wsopen_s 95490->95477 95491->95470 95492->95480 95493->95480 95494->95480 95495->95480 95496->95486 95498 ea811e 95497->95498 95499 ea8177 95498->95499 95506 ea8088 95498->95506 95513 e9918d EnterCriticalSection 95498->95513 95514 e991a1 LeaveCriticalSection 95498->95514 95515 ea4c7d 95499->95515 95504 ea8189 95504->95506 95528 ea3405 11 API calls 2 library calls 95504->95528 95510 ea80b7 95506->95510 95507 ea81a8 95529 e9918d EnterCriticalSection 95507->95529 95533 ea2fa6 LeaveCriticalSection 95510->95533 95512 ea80be 95512->95490 95513->95498 95514->95498 95520 ea4c8a _free 95515->95520 95516 ea4cca 95531 e9f2d9 20 API calls _free 95516->95531 95517 ea4cb5 RtlAllocateHeap 95518 ea4cc8 95517->95518 95517->95520 95522 ea29c8 95518->95522 95520->95516 95520->95517 95530 e94ead 7 API calls 2 library calls 95520->95530 95523 ea29d3 RtlFreeHeap 95522->95523 95524 ea29fc _free 95522->95524 95523->95524 95525 ea29e8 95523->95525 95524->95504 95532 e9f2d9 20 API calls _free 95525->95532 95527 ea29ee GetLastError 95527->95524 95528->95507 95529->95506 95530->95520 95531->95518 95532->95527 95533->95512 95535 e8fddb 22 API calls 95534->95535 95536 e75734 95535->95536 95536->95447 95538 e742bc FindResourceExW 95537->95538 95542 e742d9 95537->95542 95539 eb35ba LoadResource 95538->95539 95538->95542 95540 eb35cf SizeofResource 95539->95540 95539->95542 95541 eb35e3 LockResource 95540->95541 95540->95542 95541->95542 95542->95459 95544 e7512e 95543->95544 95545 eb3d90 95543->95545 95549 e9ece3 95544->95549 95548->95452 95552 e9eaaa 95549->95552 95551 e7513c 95551->95459 95556 e9eab6 CallCatchBlock 95552->95556 95553 e9eac2 95565 e9f2d9 20 API calls _free 95553->95565 95555 e9eae8 95567 e9918d EnterCriticalSection 95555->95567 95556->95553 95556->95555 95557 e9eac7 95566 ea27ec 26 API calls pre_c_initialization 95557->95566 95560 e9eaf4 95568 e9ec0a 62 API calls 2 library calls 95560->95568 95562 e9eb08 95569 e9eb27 LeaveCriticalSection __fread_nolock 95562->95569 95564 e9ead2 __wsopen_s 95564->95551 95565->95557 95566->95564 95567->95560 95568->95562 95569->95564 95573 e9e8e1 95570->95573 95572 e75118 95572->95465 95574 e9e8ed CallCatchBlock 95573->95574 95575 e9e92d 95574->95575 95576 e9e925 __wsopen_s 95574->95576 95581 e9e900 ___scrt_fastfail 95574->95581 95586 e9918d EnterCriticalSection 95575->95586 95576->95572 95578 e9e937 95587 e9e6f8 95578->95587 95600 e9f2d9 20 API calls _free 95581->95600 95582 e9e91a 95601 ea27ec 26 API calls pre_c_initialization 95582->95601 95586->95578 95588 e9e70a ___scrt_fastfail 95587->95588 95593 e9e727 95587->95593 95589 e9e717 95588->95589 95588->95593 95598 e9e76a __fread_nolock 95588->95598 95675 e9f2d9 20 API calls _free 95589->95675 95591 e9e71c 95676 ea27ec 26 API calls pre_c_initialization 95591->95676 95602 e9e96c LeaveCriticalSection __fread_nolock 95593->95602 95594 e9e886 ___scrt_fastfail 95678 e9f2d9 20 API calls _free 95594->95678 95598->95593 95598->95594 95603 e9d955 95598->95603 95610 ea8d45 95598->95610 95677 e9cf78 26 API calls 4 library calls 95598->95677 95600->95582 95601->95576 95602->95576 95604 e9d961 95603->95604 95605 e9d976 95603->95605 95679 e9f2d9 20 API calls _free 95604->95679 95605->95598 95607 e9d966 95680 ea27ec 26 API calls pre_c_initialization 95607->95680 95609 e9d971 95609->95598 95611 ea8d6f 95610->95611 95612 ea8d57 95610->95612 95614 ea90d9 95611->95614 95621 ea8db4 95611->95621 95690 e9f2c6 20 API calls _free 95612->95690 95706 e9f2c6 20 API calls _free 95614->95706 95615 ea8d5c 95691 e9f2d9 20 API calls _free 95615->95691 95618 ea90de 95707 e9f2d9 20 API calls _free 95618->95707 95620 ea8dbf 95692 e9f2c6 20 API calls _free 95620->95692 95621->95620 95622 ea8d64 95621->95622 95626 ea8def 95621->95626 95622->95598 95623 ea8dcc 95708 ea27ec 26 API calls pre_c_initialization 95623->95708 95625 ea8dc4 95693 e9f2d9 20 API calls _free 95625->95693 95629 ea8e08 95626->95629 95630 ea8e4a 95626->95630 95631 ea8e2e 95626->95631 95629->95631 95638 ea8e15 95629->95638 95697 ea3820 21 API calls _free 95630->95697 95694 e9f2c6 20 API calls _free 95631->95694 95633 ea8e33 95695 e9f2d9 20 API calls _free 95633->95695 95635 ea8e61 95639 ea29c8 _free 20 API calls 95635->95639 95681 eaf89b 95638->95681 95642 ea8e6a 95639->95642 95640 ea8e3a 95696 ea27ec 26 API calls pre_c_initialization 95640->95696 95641 ea8fb3 95644 ea9029 95641->95644 95647 ea8fcc GetConsoleMode 95641->95647 95645 ea29c8 _free 20 API calls 95642->95645 95646 ea902d ReadFile 95644->95646 95648 ea8e71 95645->95648 95649 ea90a1 GetLastError 95646->95649 95650 ea9047 95646->95650 95647->95644 95651 ea8fdd 95647->95651 95652 ea8e7b 95648->95652 95653 ea8e96 95648->95653 95654 ea90ae 95649->95654 95655 ea9005 95649->95655 95650->95649 95656 ea901e 95650->95656 95651->95646 95657 ea8fe3 ReadConsoleW 95651->95657 95698 e9f2d9 20 API calls _free 95652->95698 95700 ea9424 28 API calls __wsopen_s 95653->95700 95704 e9f2d9 20 API calls _free 95654->95704 95673 ea8e45 __fread_nolock 95655->95673 95701 e9f2a3 20 API calls 2 library calls 95655->95701 95668 ea906c 95656->95668 95669 ea9083 95656->95669 95656->95673 95657->95656 95662 ea8fff GetLastError 95657->95662 95658 ea29c8 _free 20 API calls 95658->95622 95662->95655 95664 ea8e80 95699 e9f2c6 20 API calls _free 95664->95699 95665 ea90b3 95705 e9f2c6 20 API calls _free 95665->95705 95702 ea8a61 31 API calls 4 library calls 95668->95702 95670 ea909a 95669->95670 95669->95673 95703 ea88a1 29 API calls __wsopen_s 95670->95703 95673->95658 95674 ea909f 95674->95673 95675->95591 95676->95593 95677->95598 95678->95591 95679->95607 95680->95609 95682 eaf8a8 95681->95682 95683 eaf8b5 95681->95683 95709 e9f2d9 20 API calls _free 95682->95709 95686 eaf8c1 95683->95686 95710 e9f2d9 20 API calls _free 95683->95710 95686->95641 95687 eaf8e2 95711 ea27ec 26 API calls pre_c_initialization 95687->95711 95688 eaf8ad 95688->95641 95690->95615 95691->95622 95692->95625 95693->95623 95694->95633 95695->95640 95696->95673 95697->95635 95698->95664 95699->95673 95700->95638 95701->95673 95702->95673 95703->95674 95704->95665 95705->95673 95706->95618 95707->95623 95708->95622 95709->95688 95710->95687 95711->95688 95712->95388 95713->95406 95715 ee22e7 95714->95715 95716 ee22d9 95714->95716 95718 ee232c 95715->95718 95719 e9e5eb 29 API calls 95715->95719 95742 ee22f0 95715->95742 95717 e9e5eb 29 API calls 95716->95717 95717->95715 95743 ee2557 95718->95743 95721 ee2311 95719->95721 95721->95718 95723 ee231a 95721->95723 95722 ee2370 95724 ee2374 95722->95724 95725 ee2395 95722->95725 95726 e9e678 67 API calls 95723->95726 95723->95742 95729 e9e678 67 API calls 95724->95729 95732 ee2381 95724->95732 95747 ee2171 95725->95747 95726->95742 95728 ee239d 95730 ee23c3 95728->95730 95731 ee23a3 95728->95731 95729->95732 95754 ee23f3 95730->95754 95734 ee23b0 95731->95734 95736 e9e678 67 API calls 95731->95736 95733 e9e678 67 API calls 95732->95733 95732->95742 95733->95742 95737 e9e678 67 API calls 95734->95737 95734->95742 95736->95734 95737->95742 95738 ee23de 95741 e9e678 67 API calls 95738->95741 95738->95742 95739 ee23ca 95739->95738 95762 e9e678 95739->95762 95741->95742 95742->95407 95744 ee257c 95743->95744 95746 ee2565 __fread_nolock 95743->95746 95745 e9e8c4 __fread_nolock 40 API calls 95744->95745 95745->95746 95746->95722 95748 e9ea0c ___std_exception_copy 21 API calls 95747->95748 95749 ee217f 95748->95749 95750 e9ea0c ___std_exception_copy 21 API calls 95749->95750 95751 ee2190 95750->95751 95752 e9ea0c ___std_exception_copy 21 API calls 95751->95752 95753 ee219c 95752->95753 95753->95728 95758 ee2408 95754->95758 95755 ee24c0 95779 ee2724 95755->95779 95757 ee21cc 40 API calls 95757->95758 95758->95755 95758->95757 95761 ee24c7 95758->95761 95775 ee2606 95758->95775 95783 ee2269 40 API calls 95758->95783 95761->95739 95763 e9e684 CallCatchBlock 95762->95763 95764 e9e6aa 95763->95764 95765 e9e695 95763->95765 95773 e9e6a5 __wsopen_s 95764->95773 95819 e9918d EnterCriticalSection 95764->95819 95836 e9f2d9 20 API calls _free 95765->95836 95767 e9e69a 95837 ea27ec 26 API calls pre_c_initialization 95767->95837 95770 e9e6c6 95820 e9e602 95770->95820 95772 e9e6d1 95838 e9e6ee LeaveCriticalSection __fread_nolock 95772->95838 95773->95738 95777 ee261d 95775->95777 95778 ee2617 95775->95778 95777->95758 95777->95777 95778->95777 95784 ee26d7 95778->95784 95780 ee2742 95779->95780 95781 ee2731 95779->95781 95780->95761 95782 e9dbb3 65 API calls 95781->95782 95782->95780 95783->95758 95785 ee2714 95784->95785 95786 ee2703 95784->95786 95785->95778 95788 e9dbb3 95786->95788 95789 e9dbdd 95788->95789 95790 e9dbc1 95788->95790 95789->95785 95790->95789 95791 e9dbcd 95790->95791 95792 e9dbe3 95790->95792 95800 e9f2d9 20 API calls _free 95791->95800 95797 e9d9cc 95792->95797 95795 e9dbd2 95801 ea27ec 26 API calls pre_c_initialization 95795->95801 95802 e9d97b 95797->95802 95799 e9d9f0 95799->95789 95800->95795 95801->95789 95803 e9d987 CallCatchBlock 95802->95803 95810 e9918d EnterCriticalSection 95803->95810 95805 e9d995 95811 e9d9f4 95805->95811 95809 e9d9b3 __wsopen_s 95809->95799 95810->95805 95812 ea49a1 27 API calls 95811->95812 95813 e9da09 95812->95813 95814 e9da3a 62 API calls 95813->95814 95815 e9da24 95814->95815 95816 ea4a56 62 API calls 95815->95816 95817 e9d9a2 95816->95817 95818 e9d9c0 LeaveCriticalSection __fread_nolock 95817->95818 95818->95809 95819->95770 95821 e9e60f 95820->95821 95822 e9e624 95820->95822 95864 e9f2d9 20 API calls _free 95821->95864 95828 e9e61f 95822->95828 95839 e9dc0b 95822->95839 95824 e9e614 95865 ea27ec 26 API calls pre_c_initialization 95824->95865 95828->95772 95831 e9d955 __fread_nolock 26 API calls 95832 e9e646 95831->95832 95849 ea862f 95832->95849 95835 ea29c8 _free 20 API calls 95835->95828 95836->95767 95837->95773 95838->95773 95840 e9dc1f 95839->95840 95841 e9dc23 95839->95841 95845 ea4d7a 95840->95845 95841->95840 95842 e9d955 __fread_nolock 26 API calls 95841->95842 95843 e9dc43 95842->95843 95866 ea59be 95843->95866 95846 ea4d90 95845->95846 95848 e9e640 95845->95848 95847 ea29c8 _free 20 API calls 95846->95847 95846->95848 95847->95848 95848->95831 95850 ea863e 95849->95850 95853 ea8653 95849->95853 95989 e9f2c6 20 API calls _free 95850->95989 95852 ea868e 95991 e9f2c6 20 API calls _free 95852->95991 95853->95852 95857 ea867a 95853->95857 95854 ea8643 95990 e9f2d9 20 API calls _free 95854->95990 95986 ea8607 95857->95986 95858 ea8693 95992 e9f2d9 20 API calls _free 95858->95992 95861 ea869b 95993 ea27ec 26 API calls pre_c_initialization 95861->95993 95862 e9e64c 95862->95828 95862->95835 95864->95824 95865->95828 95867 ea59ca CallCatchBlock 95866->95867 95868 ea59ea 95867->95868 95869 ea59d2 95867->95869 95870 ea5a88 95868->95870 95875 ea5a1f 95868->95875 95945 e9f2c6 20 API calls _free 95869->95945 95950 e9f2c6 20 API calls _free 95870->95950 95873 ea59d7 95946 e9f2d9 20 API calls _free 95873->95946 95874 ea5a8d 95951 e9f2d9 20 API calls _free 95874->95951 95891 ea5147 EnterCriticalSection 95875->95891 95879 ea5a95 95952 ea27ec 26 API calls pre_c_initialization 95879->95952 95880 ea5a25 95882 ea5a41 95880->95882 95883 ea5a56 95880->95883 95947 e9f2d9 20 API calls _free 95882->95947 95892 ea5aa9 95883->95892 95885 ea59df __wsopen_s 95885->95840 95887 ea5a46 95948 e9f2c6 20 API calls _free 95887->95948 95888 ea5a51 95949 ea5a80 LeaveCriticalSection __wsopen_s 95888->95949 95891->95880 95893 ea5ad7 95892->95893 95930 ea5ad0 95892->95930 95894 ea5afa 95893->95894 95895 ea5adb 95893->95895 95899 ea5b4b 95894->95899 95900 ea5b2e 95894->95900 95960 e9f2c6 20 API calls _free 95895->95960 95898 ea5ae0 95961 e9f2d9 20 API calls _free 95898->95961 95903 ea5b61 95899->95903 95966 ea9424 28 API calls __wsopen_s 95899->95966 95963 e9f2c6 20 API calls _free 95900->95963 95901 ea5cb1 95901->95888 95953 ea564e 95903->95953 95905 ea5ae7 95962 ea27ec 26 API calls pre_c_initialization 95905->95962 95908 ea5b33 95964 e9f2d9 20 API calls _free 95908->95964 95912 ea5ba8 95915 ea5bbc 95912->95915 95916 ea5c02 WriteFile 95912->95916 95913 ea5b6f 95917 ea5b73 95913->95917 95918 ea5b95 95913->95918 95914 ea5b3b 95965 ea27ec 26 API calls pre_c_initialization 95914->95965 95922 ea5bf2 95915->95922 95923 ea5bc4 95915->95923 95920 ea5c25 GetLastError 95916->95920 95925 ea5b8b 95916->95925 95924 ea5c69 95917->95924 95967 ea55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 95917->95967 95968 ea542e 45 API calls 3 library calls 95918->95968 95920->95925 95971 ea56c4 7 API calls 2 library calls 95922->95971 95926 ea5bc9 95923->95926 95927 ea5be2 95923->95927 95924->95930 95975 e9f2d9 20 API calls _free 95924->95975 95925->95924 95925->95930 95936 ea5c45 95925->95936 95926->95924 95932 ea5bd2 95926->95932 95970 ea5891 8 API calls 2 library calls 95927->95970 95977 e90a8c 95930->95977 95969 ea57a3 7 API calls 2 library calls 95932->95969 95934 ea5be0 95934->95925 95935 ea5c8e 95976 e9f2c6 20 API calls _free 95935->95976 95939 ea5c4c 95936->95939 95940 ea5c60 95936->95940 95972 e9f2d9 20 API calls _free 95939->95972 95974 e9f2a3 20 API calls 2 library calls 95940->95974 95943 ea5c51 95973 e9f2c6 20 API calls _free 95943->95973 95945->95873 95946->95885 95947->95887 95948->95888 95949->95885 95950->95874 95951->95879 95952->95885 95954 eaf89b __fread_nolock 26 API calls 95953->95954 95955 ea565e 95954->95955 95956 ea5663 95955->95956 95984 ea2d74 38 API calls 2 library calls 95955->95984 95956->95912 95956->95913 95958 ea5686 95958->95956 95959 ea56a4 GetConsoleMode 95958->95959 95959->95956 95960->95898 95961->95905 95962->95930 95963->95908 95964->95914 95965->95930 95966->95903 95967->95925 95968->95925 95969->95934 95970->95934 95971->95934 95972->95943 95973->95930 95974->95930 95975->95935 95976->95930 95978 e90a95 95977->95978 95979 e90a97 IsProcessorFeaturePresent 95977->95979 95978->95901 95981 e90c5d 95979->95981 95985 e90c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95981->95985 95983 e90d40 95983->95901 95984->95958 95985->95983 95994 ea8585 95986->95994 95988 ea862b 95988->95862 95989->95854 95990->95862 95991->95858 95992->95861 95993->95862 95995 ea8591 CallCatchBlock 95994->95995 96005 ea5147 EnterCriticalSection 95995->96005 95997 ea859f 95998 ea85d1 95997->95998 95999 ea85c6 95997->95999 96021 e9f2d9 20 API calls _free 95998->96021 96006 ea86ae 95999->96006 96002 ea85cc 96022 ea85fb LeaveCriticalSection __wsopen_s 96002->96022 96004 ea85ee __wsopen_s 96004->95988 96005->95997 96023 ea53c4 96006->96023 96008 ea86c4 96036 ea5333 21 API calls 3 library calls 96008->96036 96009 ea86be 96009->96008 96011 ea53c4 __wsopen_s 26 API calls 96009->96011 96020 ea86f6 96009->96020 96014 ea86ed 96011->96014 96012 ea53c4 __wsopen_s 26 API calls 96015 ea8702 CloseHandle 96012->96015 96013 ea871c 96016 ea873e 96013->96016 96037 e9f2a3 20 API calls 2 library calls 96013->96037 96017 ea53c4 __wsopen_s 26 API calls 96014->96017 96015->96008 96018 ea870e GetLastError 96015->96018 96016->96002 96017->96020 96018->96008 96020->96008 96020->96012 96021->96002 96022->96004 96024 ea53d1 96023->96024 96025 ea53e6 96023->96025 96026 e9f2c6 __dosmaperr 20 API calls 96024->96026 96027 e9f2c6 __dosmaperr 20 API calls 96025->96027 96030 ea540b 96025->96030 96028 ea53d6 96026->96028 96031 ea5416 96027->96031 96029 e9f2d9 _free 20 API calls 96028->96029 96033 ea53de 96029->96033 96030->96009 96032 e9f2d9 _free 20 API calls 96031->96032 96034 ea541e 96032->96034 96033->96009 96035 ea27ec pre_c_initialization 26 API calls 96034->96035 96035->96033 96036->96013 96037->96016 96038 ea8402 96043 ea81be 96038->96043 96041 ea842a 96048 ea81ef try_get_first_available_module 96043->96048 96045 ea83ee 96062 ea27ec 26 API calls pre_c_initialization 96045->96062 96047 ea8343 96047->96041 96055 eb0984 96047->96055 96051 ea8338 96048->96051 96058 e98e0b 40 API calls 2 library calls 96048->96058 96050 ea838c 96050->96051 96059 e98e0b 40 API calls 2 library calls 96050->96059 96051->96047 96061 e9f2d9 20 API calls _free 96051->96061 96053 ea83ab 96053->96051 96060 e98e0b 40 API calls 2 library calls 96053->96060 96063 eb0081 96055->96063 96057 eb099f 96057->96041 96058->96050 96059->96053 96060->96051 96061->96045 96062->96047 96066 eb008d CallCatchBlock 96063->96066 96064 eb009b 96120 e9f2d9 20 API calls _free 96064->96120 96066->96064 96068 eb00d4 96066->96068 96067 eb00a0 96121 ea27ec 26 API calls pre_c_initialization 96067->96121 96074 eb065b 96068->96074 96073 eb00aa __wsopen_s 96073->96057 96075 eb0678 96074->96075 96076 eb068d 96075->96076 96077 eb06a6 96075->96077 96137 e9f2c6 20 API calls _free 96076->96137 96123 ea5221 96077->96123 96080 eb06ab 96081 eb06cb 96080->96081 96082 eb06b4 96080->96082 96136 eb039a CreateFileW 96081->96136 96139 e9f2c6 20 API calls _free 96082->96139 96086 eb06b9 96140 e9f2d9 20 API calls _free 96086->96140 96088 eb0781 GetFileType 96089 eb078c GetLastError 96088->96089 96090 eb07d3 96088->96090 96143 e9f2a3 20 API calls 2 library calls 96089->96143 96145 ea516a 21 API calls 3 library calls 96090->96145 96091 eb0692 96138 e9f2d9 20 API calls _free 96091->96138 96092 eb0704 96092->96088 96093 eb0756 GetLastError 96092->96093 96141 eb039a CreateFileW 96092->96141 96142 e9f2a3 20 API calls 2 library calls 96093->96142 96097 eb079a CloseHandle 96097->96091 96100 eb07c3 96097->96100 96098 eb0749 96098->96088 96098->96093 96144 e9f2d9 20 API calls _free 96100->96144 96101 eb07f4 96103 eb0840 96101->96103 96146 eb05ab 72 API calls 4 library calls 96101->96146 96108 eb086d 96103->96108 96147 eb014d 72 API calls 4 library calls 96103->96147 96104 eb07c8 96104->96091 96107 eb0866 96107->96108 96109 eb087e 96107->96109 96110 ea86ae __wsopen_s 29 API calls 96108->96110 96111 eb00f8 96109->96111 96112 eb08fc CloseHandle 96109->96112 96110->96111 96122 eb0121 LeaveCriticalSection __wsopen_s 96111->96122 96148 eb039a CreateFileW 96112->96148 96114 eb0927 96115 eb095d 96114->96115 96116 eb0931 GetLastError 96114->96116 96115->96111 96149 e9f2a3 20 API calls 2 library calls 96116->96149 96118 eb093d 96150 ea5333 21 API calls 3 library calls 96118->96150 96120->96067 96121->96073 96122->96073 96124 ea522d CallCatchBlock 96123->96124 96151 ea2f5e EnterCriticalSection 96124->96151 96126 ea527b 96152 ea532a 96126->96152 96127 ea5259 96155 ea5000 96127->96155 96128 ea5234 96128->96126 96128->96127 96133 ea52c7 EnterCriticalSection 96128->96133 96131 ea52a4 __wsopen_s 96131->96080 96133->96126 96134 ea52d4 LeaveCriticalSection 96133->96134 96134->96128 96136->96092 96137->96091 96138->96111 96139->96086 96140->96091 96141->96098 96142->96091 96143->96097 96144->96104 96145->96101 96146->96103 96147->96107 96148->96114 96149->96118 96150->96115 96151->96128 96163 ea2fa6 LeaveCriticalSection 96152->96163 96154 ea5331 96154->96131 96156 ea4c7d _free 20 API calls 96155->96156 96159 ea5012 96156->96159 96157 ea501f 96158 ea29c8 _free 20 API calls 96157->96158 96160 ea5071 96158->96160 96159->96157 96164 ea3405 11 API calls 2 library calls 96159->96164 96160->96126 96162 ea5147 EnterCriticalSection 96160->96162 96162->96126 96163->96154 96164->96159 96165 e71cad SystemParametersInfoW 96166 ec2a00 96181 e7d7b0 messages 96166->96181 96167 e7db11 PeekMessageW 96167->96181 96168 e7d807 GetInputState 96168->96167 96168->96181 96169 ec1cbe TranslateAcceleratorW 96169->96181 96171 e7db8f PeekMessageW 96171->96181 96172 e7da04 timeGetTime 96172->96181 96173 e7db73 TranslateMessage DispatchMessageW 96173->96171 96174 e7dbaf Sleep 96192 e7dbc0 96174->96192 96175 ec2b74 Sleep 96175->96192 96176 ec1dda timeGetTime 96340 e8e300 23 API calls 96176->96340 96177 e8e551 timeGetTime 96177->96192 96180 ec2c0b GetExitCodeProcess 96183 ec2c37 CloseHandle 96180->96183 96184 ec2c21 WaitForSingleObject 96180->96184 96181->96167 96181->96168 96181->96169 96181->96171 96181->96172 96181->96173 96181->96174 96181->96175 96181->96176 96187 e7d9d5 96181->96187 96198 e7dfd0 96181->96198 96221 e81310 96181->96221 96276 e8edf6 96181->96276 96281 e7dd50 235 API calls 96181->96281 96282 e7bf40 96181->96282 96341 ee3a2a 23 API calls 96181->96341 96342 e7ec40 96181->96342 96366 ee359c 82 API calls __wsopen_s 96181->96366 96183->96192 96184->96181 96184->96183 96185 ec2a31 96185->96187 96186 f029bf GetForegroundWindow 96186->96192 96188 ec2ca9 Sleep 96188->96181 96192->96177 96192->96180 96192->96181 96192->96185 96192->96186 96192->96187 96192->96188 96367 ef5658 23 API calls 96192->96367 96368 ede97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96192->96368 96369 edd4dc 47 API calls 96192->96369 96200 e7e010 96198->96200 96199 e7ec40 235 API calls 96217 e7e0dc messages 96199->96217 96200->96217 96376 e90242 5 API calls __Init_thread_wait 96200->96376 96203 ec2fca 96205 e7a961 22 API calls 96203->96205 96203->96217 96204 e7a961 22 API calls 96204->96217 96208 ec2fe4 96205->96208 96377 e900a3 29 API calls __onexit 96208->96377 96211 ec2fee 96378 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96211->96378 96215 e7e3e1 96215->96181 96216 e804f0 22 API calls 96216->96217 96217->96199 96217->96204 96217->96215 96217->96216 96218 ee359c 82 API calls 96217->96218 96370 e7a8c7 96217->96370 96374 e7a81b 41 API calls 96217->96374 96375 e8a308 235 API calls 96217->96375 96379 e90242 5 API calls __Init_thread_wait 96217->96379 96380 e900a3 29 API calls __onexit 96217->96380 96381 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96217->96381 96382 ef47d4 235 API calls 96217->96382 96383 ef68c1 235 API calls 96217->96383 96218->96217 96222 e817b0 96221->96222 96223 e81376 96221->96223 96496 e90242 5 API calls __Init_thread_wait 96222->96496 96224 e81390 96223->96224 96225 ec6331 96223->96225 96228 e81940 9 API calls 96224->96228 96507 ef709c 235 API calls 96225->96507 96227 e817ba 96235 e817fb 96227->96235 96497 e79cb3 96227->96497 96231 e813a0 96228->96231 96230 ec633d 96230->96181 96233 e81940 9 API calls 96231->96233 96234 e813b6 96233->96234 96234->96235 96236 e813ec 96234->96236 96237 e8182c 96235->96237 96238 ec6346 96235->96238 96236->96238 96262 e81408 __fread_nolock 96236->96262 96504 e7aceb 23 API calls messages 96237->96504 96508 ee359c 82 API calls __wsopen_s 96238->96508 96239 e817d4 96503 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96239->96503 96242 e81839 96505 e8d217 235 API calls 96242->96505 96245 ec636e 96509 ee359c 82 API calls __wsopen_s 96245->96509 96246 e8152f 96248 e8153c 96246->96248 96249 ec63d1 96246->96249 96251 e81940 9 API calls 96248->96251 96511 ef5745 54 API calls _wcslen 96249->96511 96253 e81549 96251->96253 96252 e8fddb 22 API calls 96252->96262 96258 e81940 9 API calls 96253->96258 96268 e815c7 messages 96253->96268 96254 e81872 96506 e8faeb 23 API calls 96254->96506 96255 e8fe0b 22 API calls 96255->96262 96256 e8171d 96256->96181 96263 e81563 96258->96263 96260 e7ec40 235 API calls 96260->96262 96261 e8167b messages 96261->96256 96495 e8ce17 22 API calls messages 96261->96495 96262->96242 96262->96245 96262->96246 96262->96252 96262->96255 96262->96260 96264 ec63b2 96262->96264 96262->96268 96263->96268 96269 e7a8c7 22 API calls 96263->96269 96510 ee359c 82 API calls __wsopen_s 96264->96510 96266 e81940 9 API calls 96266->96268 96268->96254 96268->96261 96268->96266 96384 eef0ec 96268->96384 96393 ef959f 96268->96393 96396 ef958b 96268->96396 96399 ee6ef1 96268->96399 96479 edd4ce 96268->96479 96482 efe505 96268->96482 96512 ee359c 82 API calls __wsopen_s 96268->96512 96269->96268 96277 e8ee09 96276->96277 96278 e8ee12 96276->96278 96277->96181 96278->96277 96279 e8ee36 IsDialogMessageW 96278->96279 96280 ecefaf GetClassLongW 96278->96280 96279->96277 96279->96278 96280->96278 96280->96279 96281->96181 96926 e7adf0 96282->96926 96284 e7bf9d 96285 ec04b6 96284->96285 96286 e7bfa9 96284->96286 96945 ee359c 82 API calls __wsopen_s 96285->96945 96288 ec04c6 96286->96288 96289 e7c01e 96286->96289 96946 ee359c 82 API calls __wsopen_s 96288->96946 96931 e7ac91 96289->96931 96293 ed7120 22 API calls 96337 e7c039 __fread_nolock messages 96293->96337 96294 e7c7da 96297 e8fe0b 22 API calls 96294->96297 96302 e7c808 __fread_nolock 96297->96302 96299 ec04f5 96303 ec055a 96299->96303 96947 e8d217 235 API calls 96299->96947 96304 e8fe0b 22 API calls 96302->96304 96326 e7c603 96303->96326 96948 ee359c 82 API calls __wsopen_s 96303->96948 96338 e7c350 __fread_nolock messages 96304->96338 96305 e7af8a 22 API calls 96305->96337 96306 ec091a 96958 ee3209 23 API calls 96306->96958 96307 e8fddb 22 API calls 96307->96337 96310 e7ec40 235 API calls 96310->96337 96311 ec08a5 96312 e7ec40 235 API calls 96311->96312 96313 ec08cf 96312->96313 96313->96326 96956 e7a81b 41 API calls 96313->96956 96315 ec0591 96949 ee359c 82 API calls __wsopen_s 96315->96949 96319 ec08f6 96957 ee359c 82 API calls __wsopen_s 96319->96957 96321 e7c237 96323 e7c253 96321->96323 96324 e7a8c7 22 API calls 96321->96324 96328 ec0976 96323->96328 96331 e7c297 messages 96323->96331 96324->96323 96325 e8fe0b 22 API calls 96325->96337 96326->96181 96959 e7aceb 23 API calls messages 96328->96959 96330 ec09bf 96330->96326 96960 ee359c 82 API calls __wsopen_s 96330->96960 96331->96330 96942 e7aceb 23 API calls messages 96331->96942 96333 e7c335 96333->96330 96334 e7c342 96333->96334 96943 e7a704 22 API calls messages 96334->96943 96335 e7bbe0 40 API calls 96335->96337 96337->96293 96337->96294 96337->96299 96337->96302 96337->96303 96337->96305 96337->96306 96337->96307 96337->96310 96337->96311 96337->96315 96337->96319 96337->96321 96337->96325 96337->96326 96337->96330 96337->96335 96935 e7ad81 96337->96935 96950 ed7099 22 API calls __fread_nolock 96337->96950 96951 ef5745 54 API calls _wcslen 96337->96951 96952 e8aa42 22 API calls messages 96337->96952 96953 edf05c 40 API calls 96337->96953 96954 e7a993 41 API calls 96337->96954 96955 e7aceb 23 API calls messages 96337->96955 96339 e7c3ac 96338->96339 96944 e8ce17 22 API calls messages 96338->96944 96339->96181 96340->96181 96341->96181 96363 e7ec76 messages 96342->96363 96343 e900a3 29 API calls pre_c_initialization 96343->96363 96344 e7fef7 96353 e7a8c7 22 API calls 96344->96353 96359 e7ed9d messages 96344->96359 96347 e8fddb 22 API calls 96347->96363 96348 ec4600 96354 e7a8c7 22 API calls 96348->96354 96348->96359 96349 ec4b0b 96972 ee359c 82 API calls __wsopen_s 96349->96972 96350 e7a8c7 22 API calls 96350->96363 96353->96359 96354->96359 96356 e90242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96356->96363 96357 e7fbe3 96357->96359 96360 ec4bdc 96357->96360 96365 e7f3ae messages 96357->96365 96358 e7a961 22 API calls 96358->96363 96359->96181 96973 ee359c 82 API calls __wsopen_s 96360->96973 96362 ec4beb 96974 ee359c 82 API calls __wsopen_s 96362->96974 96363->96343 96363->96344 96363->96347 96363->96348 96363->96349 96363->96350 96363->96356 96363->96357 96363->96358 96363->96359 96363->96362 96364 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96363->96364 96363->96365 96969 e801e0 235 API calls 2 library calls 96363->96969 96970 e806a0 41 API calls messages 96363->96970 96364->96363 96365->96359 96971 ee359c 82 API calls __wsopen_s 96365->96971 96366->96181 96367->96192 96368->96192 96369->96192 96371 e7a8ea __fread_nolock 96370->96371 96372 e7a8db 96370->96372 96371->96217 96372->96371 96373 e8fe0b 22 API calls 96372->96373 96373->96371 96374->96217 96375->96217 96376->96203 96377->96211 96378->96217 96379->96217 96380->96217 96381->96217 96382->96217 96383->96217 96513 e77510 96384->96513 96388 eef136 96389 eef15b 96388->96389 96390 e7ec40 235 API calls 96388->96390 96392 eef15f 96389->96392 96564 e79c6e 22 API calls 96389->96564 96390->96389 96392->96268 96586 ef7f59 96393->96586 96395 ef95af 96395->96268 96397 ef7f59 120 API calls 96396->96397 96398 ef959b 96397->96398 96398->96268 96400 e7a961 22 API calls 96399->96400 96401 ee6f1d 96400->96401 96402 e7a961 22 API calls 96401->96402 96403 ee6f26 96402->96403 96404 ee6f3a 96403->96404 96854 e7b567 96403->96854 96406 e77510 53 API calls 96404->96406 96407 ee6f57 _wcslen 96406->96407 96408 ee70bf 96407->96408 96409 ee6fbc 96407->96409 96478 ee70e9 96407->96478 96411 e74ecb 94 API calls 96408->96411 96410 e77510 53 API calls 96409->96410 96412 ee6fc8 96410->96412 96413 ee70d0 96411->96413 96417 e7a8c7 22 API calls 96412->96417 96420 ee6fdb 96412->96420 96414 ee70e5 96413->96414 96415 e74ecb 94 API calls 96413->96415 96416 e7a961 22 API calls 96414->96416 96414->96478 96415->96414 96418 ee711a 96416->96418 96417->96420 96419 e7a961 22 API calls 96418->96419 96424 ee7126 96419->96424 96421 ee7027 96420->96421 96422 ee7005 96420->96422 96425 e7a8c7 22 API calls 96420->96425 96423 e77510 53 API calls 96421->96423 96859 e733c6 96422->96859 96427 ee7034 96423->96427 96428 e7a961 22 API calls 96424->96428 96425->96422 96430 ee703d 96427->96430 96431 ee7047 96427->96431 96432 ee712f 96428->96432 96429 ee700f 96433 e77510 53 API calls 96429->96433 96434 e7a8c7 22 API calls 96430->96434 96868 ede199 GetFileAttributesW 96431->96868 96436 e7a961 22 API calls 96432->96436 96438 ee701b 96433->96438 96434->96431 96437 ee7138 96436->96437 96441 e77510 53 API calls 96437->96441 96442 e76350 22 API calls 96438->96442 96439 ee7050 96440 ee7063 96439->96440 96443 e74c6d 22 API calls 96439->96443 96445 e77510 53 API calls 96440->96445 96451 ee7069 96440->96451 96444 ee7145 96441->96444 96442->96421 96443->96440 96691 e7525f 96444->96691 96447 ee70a0 96445->96447 96869 edd076 57 API calls 96447->96869 96448 ee7166 96733 e74c6d 96448->96733 96451->96478 96453 ee71a9 96455 e7a8c7 22 API calls 96453->96455 96454 e74c6d 22 API calls 96457 ee7186 96454->96457 96456 ee71ba 96455->96456 96736 e76350 96456->96736 96457->96453 96460 e76b57 22 API calls 96457->96460 96462 ee719b 96460->96462 96461 e76350 22 API calls 96463 ee71d6 96461->96463 96464 e76b57 22 API calls 96462->96464 96465 e76350 22 API calls 96463->96465 96464->96453 96466 ee71e4 96465->96466 96467 e77510 53 API calls 96466->96467 96468 ee71f0 96467->96468 96745 edd7bc 96468->96745 96470 ee7201 96471 edd4ce 4 API calls 96470->96471 96472 ee720b 96471->96472 96473 e77510 53 API calls 96472->96473 96476 ee7239 96472->96476 96474 ee7229 96473->96474 96799 ee2947 96474->96799 96477 e74f39 68 API calls 96476->96477 96477->96478 96478->96268 96920 eddbbe lstrlenW 96479->96920 96483 e77510 53 API calls 96482->96483 96484 efe51d 96483->96484 96485 e7a961 22 API calls 96484->96485 96486 efe52b 96485->96486 96487 e7b567 39 API calls 96486->96487 96488 efe536 96487->96488 96489 efe560 96488->96489 96491 e77510 53 API calls 96488->96491 96925 e762b5 22 API calls 96489->96925 96492 efe551 96491->96492 96493 e76d25 22 API calls 96492->96493 96493->96489 96494 efe56c 96494->96268 96495->96261 96496->96227 96498 e79cc2 _wcslen 96497->96498 96499 e8fe0b 22 API calls 96498->96499 96500 e79cea __fread_nolock 96499->96500 96501 e8fddb 22 API calls 96500->96501 96502 e79d00 96501->96502 96502->96239 96503->96235 96504->96242 96505->96254 96506->96254 96507->96230 96508->96268 96509->96268 96510->96268 96511->96263 96512->96268 96514 e77525 96513->96514 96515 e77522 96513->96515 96516 e7752d 96514->96516 96517 e7755b 96514->96517 96536 e79e90 96515->96536 96565 e951c6 26 API calls 96516->96565 96519 eb50f6 96517->96519 96522 e7756d 96517->96522 96527 eb500f 96517->96527 96568 e95183 26 API calls 96519->96568 96520 e7753d 96526 e8fddb 22 API calls 96520->96526 96566 e8fb21 51 API calls 96522->96566 96523 eb510e 96523->96523 96528 e77547 96526->96528 96529 eb5088 96527->96529 96531 e8fe0b 22 API calls 96527->96531 96530 e79cb3 22 API calls 96528->96530 96567 e8fb21 51 API calls 96529->96567 96530->96515 96532 eb5058 96531->96532 96533 e8fddb 22 API calls 96532->96533 96534 eb507f 96533->96534 96535 e79cb3 22 API calls 96534->96535 96535->96529 96569 e76270 96536->96569 96538 e79fd2 96539 e7a4a1 22 API calls 96538->96539 96540 e79fec 96539->96540 96540->96388 96543 ebf7c4 96584 ed96e2 84 API calls __wsopen_s 96543->96584 96544 ebf699 96551 e8fddb 22 API calls 96544->96551 96546 e7a405 96546->96540 96585 ed96e2 84 API calls __wsopen_s 96546->96585 96549 e7a6c3 22 API calls 96563 e79eb5 96549->96563 96550 ebf7d2 96552 e7a4a1 22 API calls 96550->96552 96553 ebf754 96551->96553 96554 ebf7e8 96552->96554 96555 e8fe0b 22 API calls 96553->96555 96554->96540 96557 e7a12c __fread_nolock 96555->96557 96557->96543 96557->96546 96559 e7a4a1 22 API calls 96559->96563 96560 e7aec9 22 API calls 96561 e7a0db CharUpperBuffW 96560->96561 96580 e7a673 22 API calls 96561->96580 96563->96538 96563->96543 96563->96544 96563->96546 96563->96549 96563->96557 96563->96559 96563->96560 96574 e74573 41 API calls _wcslen 96563->96574 96575 e7a587 96563->96575 96581 e748c8 23 API calls 96563->96581 96582 e749bd 22 API calls __fread_nolock 96563->96582 96583 e7a673 22 API calls 96563->96583 96564->96392 96565->96520 96566->96520 96567->96519 96568->96523 96570 e8fe0b 22 API calls 96569->96570 96571 e76295 96570->96571 96572 e8fddb 22 API calls 96571->96572 96573 e762a3 96572->96573 96573->96563 96574->96563 96576 e7a59d 96575->96576 96579 e7a598 __fread_nolock 96575->96579 96577 ebf80f 96576->96577 96578 e8fe0b 22 API calls 96576->96578 96578->96579 96579->96563 96580->96563 96581->96563 96582->96563 96583->96563 96584->96550 96585->96540 96587 e77510 53 API calls 96586->96587 96588 ef7f90 96587->96588 96612 ef7fd5 messages 96588->96612 96624 ef8cd3 96588->96624 96590 ef8281 96591 ef844f 96590->96591 96596 ef828f 96590->96596 96665 ef8ee4 60 API calls 96591->96665 96594 ef845e 96595 ef846a 96594->96595 96594->96596 96595->96612 96637 ef7e86 96596->96637 96597 e77510 53 API calls 96615 ef8049 96597->96615 96602 ef82c8 96652 e8fc70 96602->96652 96605 ef82e8 96658 ee359c 82 API calls __wsopen_s 96605->96658 96606 ef8302 96659 e763eb 22 API calls 96606->96659 96609 ef82f3 GetCurrentProcess TerminateProcess 96609->96606 96610 ef8311 96660 e76a50 22 API calls 96610->96660 96612->96395 96613 ef832a 96623 ef8352 96613->96623 96661 e804f0 22 API calls 96613->96661 96615->96590 96615->96597 96615->96612 96656 ed417d 22 API calls __fread_nolock 96615->96656 96657 ef851d 42 API calls _strftime 96615->96657 96616 ef84c5 96616->96612 96618 ef84d9 FreeLibrary 96616->96618 96617 ef8341 96662 ef8b7b 75 API calls 96617->96662 96618->96612 96623->96616 96663 e804f0 22 API calls 96623->96663 96664 e7aceb 23 API calls messages 96623->96664 96666 ef8b7b 75 API calls 96623->96666 96625 e7aec9 22 API calls 96624->96625 96626 ef8cee CharLowerBuffW 96625->96626 96667 ed8e54 96626->96667 96630 e7a961 22 API calls 96631 ef8d2a 96630->96631 96674 e76d25 96631->96674 96633 ef8d3e 96634 e793b2 22 API calls 96633->96634 96636 ef8d48 _wcslen 96634->96636 96635 ef8e5e _wcslen 96635->96615 96636->96635 96687 ef851d 42 API calls _strftime 96636->96687 96638 ef7ea1 96637->96638 96642 ef7eec 96637->96642 96639 e8fe0b 22 API calls 96638->96639 96640 ef7ec3 96639->96640 96641 e8fddb 22 API calls 96640->96641 96640->96642 96641->96640 96643 ef9096 96642->96643 96644 ef92ab messages 96643->96644 96651 ef90ba _strcat _wcslen 96643->96651 96644->96602 96645 e7b6b5 39 API calls 96645->96651 96646 e7b567 39 API calls 96646->96651 96647 e7b38f 39 API calls 96647->96651 96648 e77510 53 API calls 96648->96651 96649 e9ea0c 21 API calls ___std_exception_copy 96649->96651 96651->96644 96651->96645 96651->96646 96651->96647 96651->96648 96651->96649 96690 edefae 24 API calls _wcslen 96651->96690 96655 e8fc85 96652->96655 96653 e8fd1d VirtualProtect 96654 e8fceb 96653->96654 96654->96605 96654->96606 96655->96653 96655->96654 96656->96615 96657->96615 96658->96609 96659->96610 96660->96613 96661->96617 96662->96623 96663->96623 96664->96623 96665->96594 96666->96623 96668 ed8e74 _wcslen 96667->96668 96669 ed8f63 96668->96669 96670 ed8ea9 96668->96670 96672 ed8f68 96668->96672 96669->96630 96669->96636 96670->96669 96688 e8ce60 41 API calls 96670->96688 96672->96669 96689 e8ce60 41 API calls 96672->96689 96675 e76d34 96674->96675 96676 e76d91 96674->96676 96675->96676 96678 e76d3f 96675->96678 96677 e793b2 22 API calls 96676->96677 96684 e76d62 __fread_nolock 96677->96684 96679 eb4c9d 96678->96679 96680 e76d5a 96678->96680 96682 e8fddb 22 API calls 96679->96682 96681 e76f34 22 API calls 96680->96681 96681->96684 96683 eb4ca7 96682->96683 96685 e8fe0b 22 API calls 96683->96685 96684->96633 96686 eb4cda 96685->96686 96687->96635 96688->96670 96689->96672 96690->96651 96692 e7a961 22 API calls 96691->96692 96693 e75275 96692->96693 96694 e7a961 22 API calls 96693->96694 96695 e7527d 96694->96695 96696 e7a961 22 API calls 96695->96696 96697 e75285 96696->96697 96698 e7a961 22 API calls 96697->96698 96699 e7528d 96698->96699 96700 e752c1 96699->96700 96701 eb3df5 96699->96701 96702 e76d25 22 API calls 96700->96702 96703 e7a8c7 22 API calls 96701->96703 96704 e752cf 96702->96704 96705 eb3dfe 96703->96705 96706 e793b2 22 API calls 96704->96706 96707 e7a6c3 22 API calls 96705->96707 96708 e752d9 96706->96708 96709 e75304 96707->96709 96708->96709 96710 e76d25 22 API calls 96708->96710 96711 e75349 96709->96711 96712 e75325 96709->96712 96729 eb3e20 96709->96729 96714 e752fa 96710->96714 96713 e76d25 22 API calls 96711->96713 96712->96711 96717 e74c6d 22 API calls 96712->96717 96715 e7535a 96713->96715 96716 e793b2 22 API calls 96714->96716 96718 e75370 96715->96718 96723 e7a8c7 22 API calls 96715->96723 96716->96709 96719 e75332 96717->96719 96721 e75384 96718->96721 96725 e7a8c7 22 API calls 96718->96725 96719->96711 96724 e76d25 22 API calls 96719->96724 96720 e76b57 22 API calls 96730 eb3ee0 96720->96730 96722 e7538f 96721->96722 96726 e7a8c7 22 API calls 96721->96726 96727 e7a8c7 22 API calls 96722->96727 96731 e7539a 96722->96731 96723->96718 96724->96711 96725->96721 96726->96722 96727->96731 96728 e74c6d 22 API calls 96728->96730 96729->96720 96730->96711 96730->96728 96870 e749bd 22 API calls __fread_nolock 96730->96870 96731->96448 96734 e7aec9 22 API calls 96733->96734 96735 e74c78 96734->96735 96735->96453 96735->96454 96737 e76362 96736->96737 96738 eb4a51 96736->96738 96871 e76373 96737->96871 96881 e74a88 22 API calls __fread_nolock 96738->96881 96741 e7636e 96741->96461 96742 eb4a5b 96743 eb4a67 96742->96743 96744 e7a8c7 22 API calls 96742->96744 96744->96743 96746 edd7d8 96745->96746 96747 edd7dd 96746->96747 96748 edd7f3 96746->96748 96751 e7a8c7 22 API calls 96747->96751 96798 edd7ee 96747->96798 96749 e7a961 22 API calls 96748->96749 96750 edd7fb 96749->96750 96752 e7a961 22 API calls 96750->96752 96751->96798 96753 edd803 96752->96753 96754 e7a961 22 API calls 96753->96754 96755 edd80e 96754->96755 96756 e7a961 22 API calls 96755->96756 96757 edd816 96756->96757 96758 e7a961 22 API calls 96757->96758 96759 edd81e 96758->96759 96760 e7a961 22 API calls 96759->96760 96761 edd826 96760->96761 96762 e7a961 22 API calls 96761->96762 96763 edd82e 96762->96763 96764 e7a961 22 API calls 96763->96764 96765 edd836 96764->96765 96766 e7525f 22 API calls 96765->96766 96767 edd84d 96766->96767 96768 e7525f 22 API calls 96767->96768 96769 edd866 96768->96769 96770 e74c6d 22 API calls 96769->96770 96771 edd872 96770->96771 96772 edd885 96771->96772 96773 e793b2 22 API calls 96771->96773 96774 e74c6d 22 API calls 96772->96774 96773->96772 96775 edd88e 96774->96775 96776 edd89e 96775->96776 96778 e793b2 22 API calls 96775->96778 96777 edd8b0 96776->96777 96779 e7a8c7 22 API calls 96776->96779 96780 e76350 22 API calls 96777->96780 96778->96776 96779->96777 96781 edd8bb 96780->96781 96882 edd978 22 API calls 96781->96882 96783 edd8ca 96883 edd978 22 API calls 96783->96883 96785 edd8dd 96786 e74c6d 22 API calls 96785->96786 96787 edd8e7 96786->96787 96788 edd8ec 96787->96788 96789 edd8fe 96787->96789 96790 e733c6 22 API calls 96788->96790 96791 e74c6d 22 API calls 96789->96791 96793 edd8f9 96790->96793 96792 edd907 96791->96792 96794 edd925 96792->96794 96795 e733c6 22 API calls 96792->96795 96796 e76350 22 API calls 96793->96796 96797 e76350 22 API calls 96794->96797 96795->96793 96796->96794 96797->96798 96798->96470 96800 ee2954 __wsopen_s 96799->96800 96801 e8fe0b 22 API calls 96800->96801 96802 ee2971 96801->96802 96803 e75722 22 API calls 96802->96803 96804 ee297b 96803->96804 96884 ee274e 96804->96884 96806 ee2986 96807 e7511f 64 API calls 96806->96807 96808 ee299b 96807->96808 96809 ee29bf 96808->96809 96810 ee2a6c 96808->96810 96891 ee2e66 75 API calls 96809->96891 96894 ee2e66 75 API calls 96810->96894 96813 ee29c4 96820 ee2a75 messages 96813->96820 96892 e9d583 26 API calls 96813->96892 96815 e750f5 40 API calls 96816 ee2a91 96815->96816 96817 e750f5 40 API calls 96816->96817 96819 ee2aa1 96817->96819 96818 ee29ed 96893 e9d583 26 API calls 96818->96893 96821 e750f5 40 API calls 96819->96821 96820->96476 96823 ee2abc 96821->96823 96824 e750f5 40 API calls 96823->96824 96825 ee2acc 96824->96825 96826 e750f5 40 API calls 96825->96826 96828 ee2ae7 96826->96828 96827 ee2a38 96827->96815 96827->96820 96829 e750f5 40 API calls 96828->96829 96830 ee2af7 96829->96830 96831 e750f5 40 API calls 96830->96831 96832 ee2b07 96831->96832 96833 e750f5 40 API calls 96832->96833 96834 ee2b17 96833->96834 96887 ee3017 GetTempPathW GetTempFileNameW 96834->96887 96836 ee2b22 96837 e9e5eb 29 API calls 96836->96837 96846 ee2b33 96837->96846 96838 e9e678 67 API calls 96839 ee2bf8 96838->96839 96841 ee2bfe DeleteFileW 96839->96841 96842 ee2c12 96839->96842 96840 e750f5 40 API calls 96840->96846 96841->96820 96843 ee2c91 CopyFileW 96842->96843 96849 ee2c18 96842->96849 96844 ee2cb9 DeleteFileW 96843->96844 96845 ee2ca7 DeleteFileW 96843->96845 96888 ee2fd8 CreateFileW 96844->96888 96845->96820 96846->96820 96846->96840 96848 e9dbb3 65 API calls 96846->96848 96850 ee2bed 96846->96850 96848->96846 96851 ee22ce 79 API calls 96849->96851 96850->96838 96852 ee2c7c 96851->96852 96852->96844 96853 ee2c80 DeleteFileW 96852->96853 96853->96820 96855 e7b578 96854->96855 96856 e7b57f 96854->96856 96855->96856 96909 e962d1 39 API calls 96855->96909 96856->96404 96858 e7b5c2 96858->96404 96860 eb30bb 96859->96860 96861 e733dd 96859->96861 96862 e8fddb 22 API calls 96860->96862 96910 e733ee 96861->96910 96865 eb30c5 _wcslen 96862->96865 96864 e733e8 96864->96429 96866 e8fe0b 22 API calls 96865->96866 96867 eb30fe __fread_nolock 96866->96867 96868->96439 96869->96451 96870->96730 96872 e76382 96871->96872 96878 e763b6 __fread_nolock 96871->96878 96873 eb4a82 96872->96873 96874 e763a9 96872->96874 96872->96878 96875 e8fddb 22 API calls 96873->96875 96876 e7a587 22 API calls 96874->96876 96877 eb4a91 96875->96877 96876->96878 96879 e8fe0b 22 API calls 96877->96879 96878->96741 96880 eb4ac5 __fread_nolock 96879->96880 96881->96742 96882->96783 96883->96785 96895 e9e4e8 96884->96895 96886 ee275d 96886->96806 96887->96836 96889 ee2fff SetFileTime CloseHandle 96888->96889 96890 ee3013 96888->96890 96889->96890 96890->96820 96891->96813 96892->96818 96893->96827 96894->96827 96898 e9e469 96895->96898 96897 e9e505 96897->96886 96899 e9e478 96898->96899 96900 e9e48c 96898->96900 96906 e9f2d9 20 API calls _free 96899->96906 96905 e9e488 __alldvrm 96900->96905 96908 ea333f 11 API calls 2 library calls 96900->96908 96902 e9e47d 96907 ea27ec 26 API calls pre_c_initialization 96902->96907 96905->96897 96906->96902 96907->96905 96908->96905 96909->96858 96911 e733fe _wcslen 96910->96911 96912 eb311d 96911->96912 96913 e73411 96911->96913 96915 e8fddb 22 API calls 96912->96915 96914 e7a587 22 API calls 96913->96914 96916 e7341e __fread_nolock 96914->96916 96917 eb3127 96915->96917 96916->96864 96918 e8fe0b 22 API calls 96917->96918 96919 eb3157 __fread_nolock 96918->96919 96921 eddbdc GetFileAttributesW 96920->96921 96922 edd4d5 96920->96922 96921->96922 96923 eddbe8 FindFirstFileW 96921->96923 96922->96268 96923->96922 96924 eddbf9 FindClose 96923->96924 96924->96922 96925->96494 96927 e7ae01 96926->96927 96930 e7ae1c messages 96926->96930 96928 e7aec9 22 API calls 96927->96928 96929 e7ae09 CharUpperBuffW 96928->96929 96929->96930 96930->96284 96932 e7acae 96931->96932 96933 e7acd1 96932->96933 96961 ee359c 82 API calls __wsopen_s 96932->96961 96933->96337 96936 ebfadb 96935->96936 96937 e7ad92 96935->96937 96938 e8fddb 22 API calls 96937->96938 96939 e7ad99 96938->96939 96962 e7adcd 96939->96962 96942->96333 96943->96338 96944->96338 96945->96288 96946->96326 96947->96303 96948->96326 96949->96326 96950->96337 96951->96337 96952->96337 96953->96337 96954->96337 96955->96337 96956->96319 96957->96326 96958->96321 96959->96330 96960->96326 96961->96933 96965 e7addd 96962->96965 96963 e7adb6 96963->96337 96964 e8fddb 22 API calls 96964->96965 96965->96963 96965->96964 96966 e7a961 22 API calls 96965->96966 96967 e7a8c7 22 API calls 96965->96967 96968 e7adcd 22 API calls 96965->96968 96966->96965 96967->96965 96968->96965 96969->96363 96970->96363 96971->96359 96972->96359 96973->96362 96974->96359 96975 ec3a41 96979 ee10c0 96975->96979 96977 ec3a4c 96978 ee10c0 53 API calls 96977->96978 96978->96977 96980 ee10fa 96979->96980 96985 ee10cd 96979->96985 96980->96977 96981 ee10fc 96991 e8fa11 53 API calls 96981->96991 96983 ee1101 96984 e77510 53 API calls 96983->96984 96986 ee1108 96984->96986 96985->96980 96985->96981 96985->96983 96988 ee10f4 96985->96988 96987 e76350 22 API calls 96986->96987 96987->96980 96990 e7b270 39 API calls 96988->96990 96990->96980 96991->96983 96992 1962ff8 97006 1960c48 96992->97006 96994 19630af 97009 1962ee8 96994->97009 96996 19630d8 CreateFileW 96998 1963127 96996->96998 96999 196312c 96996->96999 96999->96998 97000 1963143 VirtualAlloc 96999->97000 97000->96998 97001 1963161 ReadFile 97000->97001 97001->96998 97002 196317c 97001->97002 97003 1961ee8 13 API calls 97002->97003 97004 19631af 97003->97004 97005 19631d2 ExitProcess 97004->97005 97005->96998 97012 19640d8 GetPEB 97006->97012 97008 19612d3 97008->96994 97010 1962ef1 Sleep 97009->97010 97011 1962eff 97010->97011 97013 1964102 97012->97013 97013->97008 97014 eb2ba5 97015 e72b25 97014->97015 97016 eb2baf 97014->97016 97042 e72b83 7 API calls 97015->97042 97048 e73a5a 97016->97048 97019 eb2bb8 97021 e79cb3 22 API calls 97019->97021 97024 eb2bc6 97021->97024 97023 e72b2f 97031 e72b44 97023->97031 97046 e73837 49 API calls ___scrt_fastfail 97023->97046 97025 eb2bce 97024->97025 97026 eb2bf5 97024->97026 97028 e733c6 22 API calls 97025->97028 97029 e733c6 22 API calls 97026->97029 97030 eb2bd9 97028->97030 97040 eb2bf1 GetForegroundWindow ShellExecuteW 97029->97040 97032 e76350 22 API calls 97030->97032 97036 e72b5f 97031->97036 97047 e730f2 Shell_NotifyIconW ___scrt_fastfail 97031->97047 97035 eb2be7 97032->97035 97038 e733c6 22 API calls 97035->97038 97039 e72b66 SetCurrentDirectoryW 97036->97039 97037 eb2c26 97037->97036 97038->97040 97041 e72b7a 97039->97041 97040->97037 97055 e72cd4 7 API calls 97042->97055 97044 e72b2a 97045 e72c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97044->97045 97045->97023 97046->97031 97047->97036 97049 eb1f50 __wsopen_s 97048->97049 97050 e73a67 GetModuleFileNameW 97049->97050 97051 e79cb3 22 API calls 97050->97051 97052 e73a8d 97051->97052 97053 e73aa2 23 API calls 97052->97053 97054 e73a97 97053->97054 97054->97019 97055->97044 97056 ea90fa 97057 ea9107 97056->97057 97061 ea911f 97056->97061 97106 e9f2d9 20 API calls _free 97057->97106 97059 ea910c 97107 ea27ec 26 API calls pre_c_initialization 97059->97107 97062 ea9117 97061->97062 97063 ea917a 97061->97063 97108 eafdc4 21 API calls 2 library calls 97061->97108 97064 e9d955 __fread_nolock 26 API calls 97063->97064 97066 ea9192 97064->97066 97076 ea8c32 97066->97076 97068 ea9199 97068->97062 97069 e9d955 __fread_nolock 26 API calls 97068->97069 97070 ea91c5 97069->97070 97070->97062 97071 e9d955 __fread_nolock 26 API calls 97070->97071 97072 ea91d3 97071->97072 97072->97062 97073 e9d955 __fread_nolock 26 API calls 97072->97073 97074 ea91e3 97073->97074 97075 e9d955 __fread_nolock 26 API calls 97074->97075 97075->97062 97077 ea8c3e CallCatchBlock 97076->97077 97078 ea8c5e 97077->97078 97079 ea8c46 97077->97079 97081 ea8d24 97078->97081 97086 ea8c97 97078->97086 97110 e9f2c6 20 API calls _free 97079->97110 97117 e9f2c6 20 API calls _free 97081->97117 97083 ea8c4b 97111 e9f2d9 20 API calls _free 97083->97111 97084 ea8d29 97118 e9f2d9 20 API calls _free 97084->97118 97089 ea8cbb 97086->97089 97090 ea8ca6 97086->97090 97088 ea8c53 __wsopen_s 97088->97068 97109 ea5147 EnterCriticalSection 97089->97109 97112 e9f2c6 20 API calls _free 97090->97112 97092 ea8cb3 97119 ea27ec 26 API calls pre_c_initialization 97092->97119 97094 ea8cc1 97097 ea8cdd 97094->97097 97098 ea8cf2 97094->97098 97095 ea8cab 97113 e9f2d9 20 API calls _free 97095->97113 97114 e9f2d9 20 API calls _free 97097->97114 97101 ea8d45 __fread_nolock 38 API calls 97098->97101 97103 ea8ced 97101->97103 97102 ea8ce2 97115 e9f2c6 20 API calls _free 97102->97115 97116 ea8d1c LeaveCriticalSection __wsopen_s 97103->97116 97106->97059 97107->97062 97108->97063 97109->97094 97110->97083 97111->97088 97112->97095 97113->97092 97114->97102 97115->97103 97116->97088 97117->97084 97118->97092 97119->97088 97120 e72e37 97121 e7a961 22 API calls 97120->97121 97122 e72e4d 97121->97122 97199 e74ae3 97122->97199 97124 e72e6b 97125 e73a5a 24 API calls 97124->97125 97126 e72e7f 97125->97126 97127 e79cb3 22 API calls 97126->97127 97128 e72e8c 97127->97128 97129 e74ecb 94 API calls 97128->97129 97130 e72ea5 97129->97130 97131 e72ead 97130->97131 97132 eb2cb0 97130->97132 97135 e7a8c7 22 API calls 97131->97135 97133 ee2cf9 80 API calls 97132->97133 97134 eb2cc3 97133->97134 97136 eb2ccf 97134->97136 97138 e74f39 68 API calls 97134->97138 97137 e72ec3 97135->97137 97140 e74f39 68 API calls 97136->97140 97213 e76f88 22 API calls 97137->97213 97138->97136 97142 eb2ce5 97140->97142 97141 e72ecf 97143 e79cb3 22 API calls 97141->97143 97229 e73084 22 API calls 97142->97229 97144 e72edc 97143->97144 97214 e7a81b 41 API calls 97144->97214 97147 e72eec 97149 e79cb3 22 API calls 97147->97149 97148 eb2d02 97230 e73084 22 API calls 97148->97230 97151 e72f12 97149->97151 97215 e7a81b 41 API calls 97151->97215 97152 eb2d1e 97154 e73a5a 24 API calls 97152->97154 97156 eb2d44 97154->97156 97155 e72f21 97158 e7a961 22 API calls 97155->97158 97231 e73084 22 API calls 97156->97231 97161 e72f3f 97158->97161 97159 eb2d50 97160 e7a8c7 22 API calls 97159->97160 97162 eb2d5e 97160->97162 97216 e73084 22 API calls 97161->97216 97232 e73084 22 API calls 97162->97232 97165 e72f4b 97217 e94a28 40 API calls 3 library calls 97165->97217 97166 eb2d6d 97170 e7a8c7 22 API calls 97166->97170 97168 e72f59 97168->97142 97169 e72f63 97168->97169 97218 e94a28 40 API calls 3 library calls 97169->97218 97172 eb2d83 97170->97172 97233 e73084 22 API calls 97172->97233 97173 e72f6e 97173->97148 97175 e72f78 97173->97175 97219 e94a28 40 API calls 3 library calls 97175->97219 97176 eb2d90 97178 e72f83 97178->97152 97179 e72f8d 97178->97179 97220 e94a28 40 API calls 3 library calls 97179->97220 97181 e72f98 97182 e72fdc 97181->97182 97221 e73084 22 API calls 97181->97221 97182->97166 97183 e72fe8 97182->97183 97183->97176 97223 e763eb 22 API calls 97183->97223 97185 e72fbf 97187 e7a8c7 22 API calls 97185->97187 97190 e72fcd 97187->97190 97188 e72ff8 97224 e76a50 22 API calls 97188->97224 97222 e73084 22 API calls 97190->97222 97191 e73006 97225 e770b0 23 API calls 97191->97225 97196 e73021 97197 e73065 97196->97197 97226 e76f88 22 API calls 97196->97226 97227 e770b0 23 API calls 97196->97227 97228 e73084 22 API calls 97196->97228 97200 e74af0 __wsopen_s 97199->97200 97201 e76b57 22 API calls 97200->97201 97202 e74b22 97200->97202 97201->97202 97203 e74c6d 22 API calls 97202->97203 97209 e74b58 97202->97209 97203->97202 97204 e74c6d 22 API calls 97204->97209 97205 e79cb3 22 API calls 97207 e74c52 97205->97207 97206 e79cb3 22 API calls 97206->97209 97208 e7515f 22 API calls 97207->97208 97211 e74c5e 97208->97211 97209->97204 97209->97206 97210 e7515f 22 API calls 97209->97210 97212 e74c29 97209->97212 97210->97209 97211->97124 97212->97205 97212->97211 97213->97141 97214->97147 97215->97155 97216->97165 97217->97168 97218->97173 97219->97178 97220->97181 97221->97185 97222->97182 97223->97188 97224->97191 97225->97196 97226->97196 97227->97196 97228->97196 97229->97148 97230->97152 97231->97159 97232->97166 97233->97176 97234 e73156 97237 e73170 97234->97237 97238 e73187 97237->97238 97239 e7318c 97238->97239 97240 e731eb 97238->97240 97274 e731e9 97238->97274 97241 e73265 PostQuitMessage 97239->97241 97242 e73199 97239->97242 97244 eb2dfb 97240->97244 97245 e731f1 97240->97245 97279 e7316a 97241->97279 97247 e731a4 97242->97247 97248 eb2e7c 97242->97248 97243 e731d0 DefWindowProcW 97243->97279 97293 e718e2 10 API calls 97244->97293 97249 e7321d SetTimer RegisterWindowMessageW 97245->97249 97250 e731f8 97245->97250 97252 eb2e68 97247->97252 97253 e731ae 97247->97253 97298 edbf30 34 API calls ___scrt_fastfail 97248->97298 97254 e73246 CreatePopupMenu 97249->97254 97249->97279 97256 e73201 KillTimer 97250->97256 97257 eb2d9c 97250->97257 97251 eb2e1c 97294 e8e499 42 API calls 97251->97294 97282 edc161 97252->97282 97260 eb2e4d 97253->97260 97261 e731b9 97253->97261 97254->97279 97289 e730f2 Shell_NotifyIconW ___scrt_fastfail 97256->97289 97263 eb2da1 97257->97263 97264 eb2dd7 MoveWindow 97257->97264 97260->97243 97297 ed0ad7 22 API calls 97260->97297 97267 e73253 97261->97267 97276 e731c4 97261->97276 97262 eb2e8e 97262->97243 97262->97279 97268 eb2da7 97263->97268 97269 eb2dc6 SetFocus 97263->97269 97264->97279 97266 e73214 97290 e73c50 DeleteObject DestroyWindow 97266->97290 97291 e7326f 44 API calls ___scrt_fastfail 97267->97291 97272 eb2db0 97268->97272 97268->97276 97269->97279 97292 e718e2 10 API calls 97272->97292 97274->97243 97275 e73263 97275->97279 97276->97243 97295 e730f2 Shell_NotifyIconW ___scrt_fastfail 97276->97295 97280 eb2e41 97296 e73837 49 API calls ___scrt_fastfail 97280->97296 97283 edc179 ___scrt_fastfail 97282->97283 97284 edc276 97282->97284 97299 e73923 97283->97299 97284->97279 97286 edc25f KillTimer SetTimer 97286->97284 97287 edc1a0 97287->97286 97288 edc251 Shell_NotifyIconW 97287->97288 97288->97286 97289->97266 97290->97279 97291->97275 97292->97279 97293->97251 97294->97276 97295->97280 97296->97274 97297->97274 97298->97262 97300 e73a13 97299->97300 97301 e7393f 97299->97301 97300->97287 97302 e76270 22 API calls 97301->97302 97303 e7394d 97302->97303 97304 eb3393 LoadStringW 97303->97304 97305 e7395a 97303->97305 97307 eb33ad 97304->97307 97306 e76b57 22 API calls 97305->97306 97308 e7396f 97306->97308 97312 e7a8c7 22 API calls 97307->97312 97315 e73994 ___scrt_fastfail 97307->97315 97309 eb33c9 97308->97309 97310 e7397c 97308->97310 97311 e76350 22 API calls 97309->97311 97310->97307 97313 e73986 97310->97313 97316 eb33d7 97311->97316 97312->97315 97314 e76350 22 API calls 97313->97314 97314->97315 97318 e739f9 Shell_NotifyIconW 97315->97318 97316->97315 97317 e733c6 22 API calls 97316->97317 97319 eb33f9 97317->97319 97318->97300 97320 e733c6 22 API calls 97319->97320 97320->97315 97321 e903fb 97322 e90407 CallCatchBlock 97321->97322 97350 e8feb1 97322->97350 97324 e9040e 97325 e90561 97324->97325 97328 e90438 97324->97328 97377 e9083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97325->97377 97327 e90568 97378 e94e52 28 API calls _abort 97327->97378 97339 e90477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97328->97339 97361 ea247d 97328->97361 97330 e9056e 97379 e94e04 28 API calls _abort 97330->97379 97334 e90576 97335 e90457 97337 e904d8 97369 e90959 97337->97369 97339->97337 97373 e94e1a 38 API calls 2 library calls 97339->97373 97341 e904de 97342 e904f3 97341->97342 97374 e90992 GetModuleHandleW 97342->97374 97344 e904fa 97344->97327 97345 e904fe 97344->97345 97346 e90507 97345->97346 97375 e94df5 28 API calls _abort 97345->97375 97376 e90040 13 API calls 2 library calls 97346->97376 97349 e9050f 97349->97335 97351 e8feba 97350->97351 97380 e90698 IsProcessorFeaturePresent 97351->97380 97353 e8fec6 97381 e92c94 10 API calls 3 library calls 97353->97381 97355 e8fecb 97356 e8fecf 97355->97356 97382 ea2317 97355->97382 97356->97324 97359 e8fee6 97359->97324 97362 ea2494 97361->97362 97363 e90a8c CatchGuardHandler 5 API calls 97362->97363 97364 e90451 97363->97364 97364->97335 97365 ea2421 97364->97365 97366 ea2450 97365->97366 97367 e90a8c CatchGuardHandler 5 API calls 97366->97367 97368 ea2479 97367->97368 97368->97339 97425 e92340 97369->97425 97371 e9096c GetStartupInfoW 97372 e9097f 97371->97372 97372->97341 97373->97337 97374->97344 97375->97346 97376->97349 97377->97327 97378->97330 97379->97334 97380->97353 97381->97355 97386 ead1f6 97382->97386 97385 e92cbd 8 API calls 3 library calls 97385->97356 97387 ead213 97386->97387 97390 ead20f 97386->97390 97387->97390 97392 ea4bfb 97387->97392 97388 e90a8c CatchGuardHandler 5 API calls 97389 e8fed8 97388->97389 97389->97359 97389->97385 97390->97388 97393 ea4c07 CallCatchBlock 97392->97393 97404 ea2f5e EnterCriticalSection 97393->97404 97395 ea4c0e 97405 ea50af 97395->97405 97397 ea4c1d 97398 ea4c2c 97397->97398 97418 ea4a8f 29 API calls 97397->97418 97420 ea4c48 LeaveCriticalSection _abort 97398->97420 97401 ea4c27 97419 ea4b45 GetStdHandle GetFileType 97401->97419 97402 ea4c3d __wsopen_s 97402->97387 97404->97395 97406 ea50bb CallCatchBlock 97405->97406 97407 ea50c8 97406->97407 97408 ea50df 97406->97408 97422 e9f2d9 20 API calls _free 97407->97422 97421 ea2f5e EnterCriticalSection 97408->97421 97411 ea50cd 97423 ea27ec 26 API calls pre_c_initialization 97411->97423 97413 ea5117 97424 ea513e LeaveCriticalSection _abort 97413->97424 97414 ea50d7 __wsopen_s 97414->97397 97416 ea5000 __wsopen_s 21 API calls 97417 ea50eb 97416->97417 97417->97413 97417->97416 97418->97401 97419->97398 97420->97402 97421->97417 97422->97411 97423->97414 97424->97414 97426 e92357 97425->97426 97426->97371 97426->97426 97427 e71033 97432 e74c91 97427->97432 97431 e71042 97433 e7a961 22 API calls 97432->97433 97434 e74cff 97433->97434 97440 e73af0 97434->97440 97437 e74d9c 97438 e71038 97437->97438 97443 e751f7 22 API calls __fread_nolock 97437->97443 97439 e900a3 29 API calls __onexit 97438->97439 97439->97431 97444 e73b1c 97440->97444 97443->97437 97445 e73b0f 97444->97445 97446 e73b29 97444->97446 97445->97437 97446->97445 97447 e73b30 RegOpenKeyExW 97446->97447 97447->97445 97448 e73b4a RegQueryValueExW 97447->97448 97449 e73b80 RegCloseKey 97448->97449 97450 e73b6b 97448->97450 97449->97445 97450->97449 97451 e7f7bf 97452 e7fcb6 97451->97452 97453 e7f7d3 97451->97453 97488 e7aceb 23 API calls messages 97452->97488 97455 e7fcc2 97453->97455 97456 e8fddb 22 API calls 97453->97456 97489 e7aceb 23 API calls messages 97455->97489 97458 e7f7e5 97456->97458 97458->97455 97459 e7f83e 97458->97459 97460 e7fd3d 97458->97460 97462 e81310 235 API calls 97459->97462 97471 e7ed9d messages 97459->97471 97490 ee1155 22 API calls 97460->97490 97468 e7ec76 messages 97462->97468 97463 ec4beb 97494 ee359c 82 API calls __wsopen_s 97463->97494 97464 e8fddb 22 API calls 97464->97468 97465 e7fef7 97465->97471 97476 e7a8c7 22 API calls 97465->97476 97468->97463 97468->97464 97468->97465 97469 e7f3ae messages 97468->97469 97470 ec4600 97468->97470 97468->97471 97472 ec4b0b 97468->97472 97473 e7a8c7 22 API calls 97468->97473 97479 e90242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97468->97479 97480 e7fbe3 97468->97480 97481 e7a961 22 API calls 97468->97481 97484 e901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97468->97484 97485 e900a3 29 API calls pre_c_initialization 97468->97485 97486 e801e0 235 API calls 2 library calls 97468->97486 97487 e806a0 41 API calls messages 97468->97487 97469->97471 97491 ee359c 82 API calls __wsopen_s 97469->97491 97470->97471 97477 e7a8c7 22 API calls 97470->97477 97492 ee359c 82 API calls __wsopen_s 97472->97492 97473->97468 97476->97471 97477->97471 97479->97468 97480->97469 97480->97471 97482 ec4bdc 97480->97482 97481->97468 97493 ee359c 82 API calls __wsopen_s 97482->97493 97484->97468 97485->97468 97486->97468 97487->97468 97488->97455 97489->97460 97490->97471 97491->97471 97492->97471 97493->97463 97494->97471 97495 ec3f75 97506 e8ceb1 97495->97506 97497 ec3f8b 97505 ec4006 97497->97505 97515 e8e300 23 API calls 97497->97515 97499 e7bf40 235 API calls 97500 ec4052 97499->97500 97503 ec4a88 97500->97503 97517 ee359c 82 API calls __wsopen_s 97500->97517 97502 ec3fe6 97502->97500 97516 ee1abf 22 API calls 97502->97516 97505->97499 97507 e8cebf 97506->97507 97508 e8ced2 97506->97508 97518 e7aceb 23 API calls messages 97507->97518 97510 e8cf05 97508->97510 97511 e8ced7 97508->97511 97519 e7aceb 23 API calls messages 97510->97519 97512 e8fddb 22 API calls 97511->97512 97514 e8cec9 97512->97514 97514->97497 97515->97502 97516->97505 97517->97503 97518->97514 97519->97514 97520 e7105b 97525 e7344d 97520->97525 97522 e7106a 97556 e900a3 29 API calls __onexit 97522->97556 97524 e71074 97526 e7345d __wsopen_s 97525->97526 97527 e7a961 22 API calls 97526->97527 97528 e73513 97527->97528 97529 e73a5a 24 API calls 97528->97529 97530 e7351c 97529->97530 97557 e73357 97530->97557 97533 e733c6 22 API calls 97534 e73535 97533->97534 97535 e7515f 22 API calls 97534->97535 97536 e73544 97535->97536 97537 e7a961 22 API calls 97536->97537 97538 e7354d 97537->97538 97539 e7a6c3 22 API calls 97538->97539 97540 e73556 RegOpenKeyExW 97539->97540 97541 eb3176 RegQueryValueExW 97540->97541 97542 e73578 97540->97542 97543 eb320c RegCloseKey 97541->97543 97544 eb3193 97541->97544 97542->97522 97543->97542 97555 eb321e _wcslen 97543->97555 97545 e8fe0b 22 API calls 97544->97545 97546 eb31ac 97545->97546 97548 e75722 22 API calls 97546->97548 97547 e74c6d 22 API calls 97547->97555 97549 eb31b7 RegQueryValueExW 97548->97549 97550 eb31d4 97549->97550 97552 eb31ee messages 97549->97552 97551 e76b57 22 API calls 97550->97551 97551->97552 97552->97543 97553 e79cb3 22 API calls 97553->97555 97554 e7515f 22 API calls 97554->97555 97555->97542 97555->97547 97555->97553 97555->97554 97556->97524 97558 eb1f50 __wsopen_s 97557->97558 97559 e73364 GetFullPathNameW 97558->97559 97560 e73386 97559->97560 97561 e76b57 22 API calls 97560->97561 97562 e733a4 97561->97562 97562->97533 97563 e71098 97568 e742de 97563->97568 97567 e710a7 97569 e7a961 22 API calls 97568->97569 97570 e742f5 GetVersionExW 97569->97570 97571 e76b57 22 API calls 97570->97571 97572 e74342 97571->97572 97573 e793b2 22 API calls 97572->97573 97582 e74378 97572->97582 97574 e7436c 97573->97574 97576 e737a0 22 API calls 97574->97576 97575 e7441b GetCurrentProcess IsWow64Process 97577 e74437 97575->97577 97576->97582 97578 e7444f LoadLibraryA 97577->97578 97579 eb3824 GetSystemInfo 97577->97579 97580 e74460 GetProcAddress 97578->97580 97581 e7449c GetSystemInfo 97578->97581 97580->97581 97584 e74470 GetNativeSystemInfo 97580->97584 97585 e74476 97581->97585 97582->97575 97583 eb37df 97582->97583 97584->97585 97586 e7109d 97585->97586 97587 e7447a FreeLibrary 97585->97587 97588 e900a3 29 API calls __onexit 97586->97588 97587->97586 97588->97567

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 234 e742de-e7434d call e7a961 GetVersionExW call e76b57 239 e74353 234->239 240 eb3617-eb362a 234->240 241 e74355-e74357 239->241 242 eb362b-eb362f 240->242 243 e7435d-e743bc call e793b2 call e737a0 241->243 244 eb3656 241->244 245 eb3632-eb363e 242->245 246 eb3631 242->246 263 eb37df-eb37e6 243->263 264 e743c2-e743c4 243->264 249 eb365d-eb3660 244->249 245->242 248 eb3640-eb3642 245->248 246->245 248->241 251 eb3648-eb364f 248->251 253 e7441b-e74435 GetCurrentProcess IsWow64Process 249->253 254 eb3666-eb36a8 249->254 251->240 252 eb3651 251->252 252->244 256 e74437 253->256 257 e74494-e7449a 253->257 254->253 258 eb36ae-eb36b1 254->258 260 e7443d-e74449 256->260 257->260 261 eb36db-eb36e5 258->261 262 eb36b3-eb36bd 258->262 265 e7444f-e7445e LoadLibraryA 260->265 266 eb3824-eb3828 GetSystemInfo 260->266 270 eb36f8-eb3702 261->270 271 eb36e7-eb36f3 261->271 267 eb36ca-eb36d6 262->267 268 eb36bf-eb36c5 262->268 272 eb37e8 263->272 273 eb3806-eb3809 263->273 264->249 269 e743ca-e743dd 264->269 276 e74460-e7446e GetProcAddress 265->276 277 e7449c-e744a6 GetSystemInfo 265->277 267->253 268->253 278 e743e3-e743e5 269->278 279 eb3726-eb372f 269->279 281 eb3715-eb3721 270->281 282 eb3704-eb3710 270->282 271->253 280 eb37ee 272->280 274 eb380b-eb381a 273->274 275 eb37f4-eb37fc 273->275 274->280 285 eb381c-eb3822 274->285 275->273 276->277 286 e74470-e74474 GetNativeSystemInfo 276->286 287 e74476-e74478 277->287 288 eb374d-eb3762 278->288 289 e743eb-e743ee 278->289 283 eb373c-eb3748 279->283 284 eb3731-eb3737 279->284 280->275 281->253 282->253 283->253 284->253 285->275 286->287 292 e74481-e74493 287->292 293 e7447a-e7447b FreeLibrary 287->293 290 eb376f-eb377b 288->290 291 eb3764-eb376a 288->291 294 e743f4-e7440f 289->294 295 eb3791-eb3794 289->295 290->253 291->253 293->292 297 e74415 294->297 298 eb3780-eb378c 294->298 295->253 296 eb379a-eb37c1 295->296 299 eb37ce-eb37da 296->299 300 eb37c3-eb37c9 296->300 297->253 298->253 299->253 300->253
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 00E7430D
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          • GetCurrentProcess.KERNEL32(?,00F0CB64,00000000,?,?), ref: 00E74422
                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00E74429
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00E74454
                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E74466
                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00E74474
                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E7447B
                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00E744A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                          • API String ID: 3290436268-3101561225
                          • Opcode ID: f0a8264375ec74911ca6d1dcd9237e869e1a17493da904810705cef3f312fc50
                          • Instruction ID: 81e2b4425065a130ca51d4c24762e50cfee38cfa8e4eeac90d7f4eb512e0ae37
                          • Opcode Fuzzy Hash: f0a8264375ec74911ca6d1dcd9237e869e1a17493da904810705cef3f312fc50
                          • Instruction Fuzzy Hash: 82A1C6BA90A2DCDFC711CFB97C411F67FA47B37344B04A599D885A3A62E3204584FB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 661 e742a2-e742ba CreateStreamOnHGlobal 662 e742bc-e742d3 FindResourceExW 661->662 663 e742da-e742dd 661->663 664 eb35ba-eb35c9 LoadResource 662->664 665 e742d9 662->665 664->665 666 eb35cf-eb35dd SizeofResource 664->666 665->663 666->665 667 eb35e3-eb35ee LockResource 666->667 667->665 668 eb35f4-eb3612 667->668 668->665
                          APIs
                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00E750AA,?,?,00000000,00000000), ref: 00E742B2
                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E750AA,?,?,00000000,00000000), ref: 00E742C9
                          • LoadResource.KERNEL32(?,00000000,?,?,00E750AA,?,?,00000000,00000000,?,?,?,?,?,?,00E74F20), ref: 00EB35BE
                          • SizeofResource.KERNEL32(?,00000000,?,?,00E750AA,?,?,00000000,00000000,?,?,?,?,?,?,00E74F20), ref: 00EB35D3
                          • LockResource.KERNEL32(00E750AA,?,?,00E750AA,?,?,00000000,00000000,?,?,?,?,?,?,00E74F20,?), ref: 00EB35E6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                          • String ID: SCRIPT
                          • API String ID: 3051347437-3967369404
                          • Opcode ID: ac23f1e9d7644765969dd5868d161d6a12faa717062f5c0d5a3cf448536297c4
                          • Instruction ID: 4cfdf27437a1aa403f29ecba7548c96093b90831c661cf1d69e5eacdb6dcb643
                          • Opcode Fuzzy Hash: ac23f1e9d7644765969dd5868d161d6a12faa717062f5c0d5a3cf448536297c4
                          • Instruction Fuzzy Hash: 47118EB0200704BFD7219B65DC49F677BBDFBC6B55F208269F406E66A0DB71DC109A60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 810 eddbbe-eddbda lstrlenW 811 eddbdc-eddbe6 GetFileAttributesW 810->811 812 eddc06 810->812 813 eddc09-eddc0d 811->813 814 eddbe8-eddbf7 FindFirstFileW 811->814 812->813 814->812 815 eddbf9-eddc04 FindClose 814->815 815->813
                          APIs
                          • lstrlenW.KERNEL32(?,"R), ref: 00EDDBCE
                          • GetFileAttributesW.KERNELBASE(?), ref: 00EDDBDD
                          • FindFirstFileW.KERNELBASE(?,?), ref: 00EDDBEE
                          • FindClose.KERNEL32(00000000), ref: 00EDDBFA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirstlstrlen
                          • String ID: "R
                          • API String ID: 2695905019-1746183819
                          • Opcode ID: efe6e2c9bc4d4c1238b31f3458d28895705480dd26c5ebdd7ba11a94a810a898
                          • Instruction ID: f8a8d9bdba3197de5e347c14d40b8a65be3ac3009251ad4ea777a108eaf6f6cf
                          • Opcode Fuzzy Hash: efe6e2c9bc4d4c1238b31f3458d28895705480dd26c5ebdd7ba11a94a810a898
                          • Instruction Fuzzy Hash: 03F0A03082891857C2206B78AC0E8BAB76CEE01338F205703F836D22E1EBB0595696D5
                          APIs
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E72B6B
                            • Part of subcall function 00E73A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F41418,?,00E72E7F,?,?,?,00000000), ref: 00E73A78
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F32224), ref: 00EB2C10
                          • ShellExecuteW.SHELL32(00000000,?,?,00F32224), ref: 00EB2C17
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                          • String ID: runas
                          • API String ID: 448630720-4000483414
                          • Opcode ID: c52802cf951d7cdcf3ebb417d0b75c190a0ad8a64b28b5cd7846751bee659c4f
                          • Instruction ID: 516033149cc3ef68bf8fd2b41c232a034cb231d40f41243e67dd4f3ed2ac8207
                          • Opcode Fuzzy Hash: c52802cf951d7cdcf3ebb417d0b75c190a0ad8a64b28b5cd7846751bee659c4f
                          • Instruction Fuzzy Hash: 5D11B4312083056AC714FF70D8529AEBBE4AFA1714F04B42DF68A720A3CF30854AB752
                          APIs
                          • GetInputState.USER32 ref: 00E7D807
                          • timeGetTime.WINMM ref: 00E7DA07
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E7DB28
                          • TranslateMessage.USER32(?), ref: 00E7DB7B
                          • DispatchMessageW.USER32(?), ref: 00E7DB89
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E7DB9F
                          • Sleep.KERNEL32(0000000A), ref: 00E7DBB1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                          • String ID:
                          • API String ID: 2189390790-0
                          • Opcode ID: 93856e1f6c56997b597cd38d22f57957d432dfaf21298600fa02b267914b1c1f
                          • Instruction ID: 40de54a4153f5d527f99ef8c53074ff7a37bfe2565659cf0da502dd6ff4737db
                          • Opcode Fuzzy Hash: 93856e1f6c56997b597cd38d22f57957d432dfaf21298600fa02b267914b1c1f
                          • Instruction Fuzzy Hash: 184200306082459FD728CF24CC44FAAB7F0BF86308F14A65DE95AA7291D771E845DB92

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00E72D07
                          • RegisterClassExW.USER32(00000030), ref: 00E72D31
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E72D42
                          • InitCommonControlsEx.COMCTL32(?), ref: 00E72D5F
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E72D6F
                          • LoadIconW.USER32(000000A9), ref: 00E72D85
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E72D94
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 440013dd9df8c97ff3efc1d0ed5dfd06b2b951019937e89655bd162f8b757582
                          • Instruction ID: cf2bc26be0c60522f9868111479089b0b1b541ba844aa1138f7c68810c676f27
                          • Opcode Fuzzy Hash: 440013dd9df8c97ff3efc1d0ed5dfd06b2b951019937e89655bd162f8b757582
                          • Instruction Fuzzy Hash: CC21C3B595121CAFEB00DFA4E949BDDBBB4FB09700F00821AF911A62A0D7B54584EF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 302 ea8d45-ea8d55 303 ea8d6f-ea8d71 302->303 304 ea8d57-ea8d6a call e9f2c6 call e9f2d9 302->304 306 ea90d9-ea90e6 call e9f2c6 call e9f2d9 303->306 307 ea8d77-ea8d7d 303->307 318 ea90f1 304->318 324 ea90ec call ea27ec 306->324 307->306 310 ea8d83-ea8dae 307->310 310->306 313 ea8db4-ea8dbd 310->313 316 ea8dbf-ea8dd2 call e9f2c6 call e9f2d9 313->316 317 ea8dd7-ea8dd9 313->317 316->324 321 ea8ddf-ea8de3 317->321 322 ea90d5-ea90d7 317->322 323 ea90f4-ea90f9 318->323 321->322 326 ea8de9-ea8ded 321->326 322->323 324->318 326->316 327 ea8def-ea8e06 326->327 330 ea8e08-ea8e0b 327->330 331 ea8e23-ea8e2c 327->331 333 ea8e0d-ea8e13 330->333 334 ea8e15-ea8e1e 330->334 335 ea8e4a-ea8e54 331->335 336 ea8e2e-ea8e45 call e9f2c6 call e9f2d9 call ea27ec 331->336 333->334 333->336 337 ea8ebf-ea8ed9 334->337 339 ea8e5b-ea8e79 call ea3820 call ea29c8 * 2 335->339 340 ea8e56-ea8e58 335->340 367 ea900c 336->367 342 ea8edf-ea8eef 337->342 343 ea8fad-ea8fb6 call eaf89b 337->343 371 ea8e7b-ea8e91 call e9f2d9 call e9f2c6 339->371 372 ea8e96-ea8ebc call ea9424 339->372 340->339 342->343 348 ea8ef5-ea8ef7 342->348 356 ea8fb8-ea8fca 343->356 357 ea9029 343->357 348->343 349 ea8efd-ea8f23 348->349 349->343 353 ea8f29-ea8f3c 349->353 353->343 358 ea8f3e-ea8f40 353->358 356->357 362 ea8fcc-ea8fdb GetConsoleMode 356->362 360 ea902d-ea9045 ReadFile 357->360 358->343 363 ea8f42-ea8f6d 358->363 365 ea90a1-ea90ac GetLastError 360->365 366 ea9047-ea904d 360->366 362->357 368 ea8fdd-ea8fe1 362->368 363->343 370 ea8f6f-ea8f82 363->370 373 ea90ae-ea90c0 call e9f2d9 call e9f2c6 365->373 374 ea90c5-ea90c8 365->374 366->365 375 ea904f 366->375 369 ea900f-ea9019 call ea29c8 367->369 368->360 376 ea8fe3-ea8ffd ReadConsoleW 368->376 369->323 370->343 378 ea8f84-ea8f86 370->378 371->367 372->337 373->367 385 ea90ce-ea90d0 374->385 386 ea9005-ea900b call e9f2a3 374->386 382 ea9052-ea9064 375->382 383 ea901e-ea9027 376->383 384 ea8fff GetLastError 376->384 378->343 389 ea8f88-ea8fa8 378->389 382->369 393 ea9066-ea906a 382->393 383->382 384->386 385->369 386->367 389->343 397 ea906c-ea907c call ea8a61 393->397 398 ea9083-ea908e 393->398 407 ea907f-ea9081 397->407 399 ea909a-ea909f call ea88a1 398->399 400 ea9090 call ea8bb1 398->400 408 ea9095-ea9098 399->408 400->408 407->369 408->407
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: .
                          • API String ID: 0-3963672497
                          • Opcode ID: 5cf82cbe4bafa0a3f9fbf0731e30bd9ceb4b1210f30205ce77a7d0ceea371cdb
                          • Instruction ID: 222daa8f62c05cdd32e09efc18f5ace291edbdfba30f0d9d1b44125614c838ec
                          • Opcode Fuzzy Hash: 5cf82cbe4bafa0a3f9fbf0731e30bd9ceb4b1210f30205ce77a7d0ceea371cdb
                          • Instruction Fuzzy Hash: FAC1D474A042499FDF11DFA8C881BADBBF4AF5F314F145199F914BB292CB30A941CB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 410 eb065b-eb068b call eb042f 413 eb068d-eb0698 call e9f2c6 410->413 414 eb06a6-eb06b2 call ea5221 410->414 421 eb069a-eb06a1 call e9f2d9 413->421 419 eb06cb-eb0714 call eb039a 414->419 420 eb06b4-eb06c9 call e9f2c6 call e9f2d9 414->420 430 eb0781-eb078a GetFileType 419->430 431 eb0716-eb071f 419->431 420->421 428 eb097d-eb0983 421->428 432 eb078c-eb07bd GetLastError call e9f2a3 CloseHandle 430->432 433 eb07d3-eb07d6 430->433 435 eb0721-eb0725 431->435 436 eb0756-eb077c GetLastError call e9f2a3 431->436 432->421 449 eb07c3-eb07ce call e9f2d9 432->449 439 eb07d8-eb07dd 433->439 440 eb07df-eb07e5 433->440 435->436 441 eb0727-eb0754 call eb039a 435->441 436->421 445 eb07e9-eb0837 call ea516a 439->445 440->445 446 eb07e7 440->446 441->430 441->436 452 eb0839-eb0845 call eb05ab 445->452 453 eb0847-eb086b call eb014d 445->453 446->445 449->421 452->453 459 eb086f-eb0879 call ea86ae 452->459 460 eb087e-eb08c1 453->460 461 eb086d 453->461 459->428 463 eb08c3-eb08c7 460->463 464 eb08e2-eb08f0 460->464 461->459 463->464 468 eb08c9-eb08dd 463->468 465 eb097b 464->465 466 eb08f6-eb08fa 464->466 465->428 466->465 469 eb08fc-eb092f CloseHandle call eb039a 466->469 468->464 472 eb0963-eb0977 469->472 473 eb0931-eb095d GetLastError call e9f2a3 call ea5333 469->473 472->465 473->472
                          APIs
                            • Part of subcall function 00EB039A: CreateFileW.KERNELBASE(00000000,00000000,?,00EB0704,?,?,00000000,?,00EB0704,00000000,0000000C), ref: 00EB03B7
                          • GetLastError.KERNEL32 ref: 00EB076F
                          • __dosmaperr.LIBCMT ref: 00EB0776
                          • GetFileType.KERNELBASE(00000000), ref: 00EB0782
                          • GetLastError.KERNEL32 ref: 00EB078C
                          • __dosmaperr.LIBCMT ref: 00EB0795
                          • CloseHandle.KERNEL32(00000000), ref: 00EB07B5
                          • CloseHandle.KERNEL32(?), ref: 00EB08FF
                          • GetLastError.KERNEL32 ref: 00EB0931
                          • __dosmaperr.LIBCMT ref: 00EB0938
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                          • String ID: H
                          • API String ID: 4237864984-2852464175
                          • Opcode ID: c4c0629c0657e53817f0b36649b8493d39a6e9bc14523f72940892129c3d9ad8
                          • Instruction ID: b12846a1acd60f96b1b8009437f145e9ab8333f5196d27440e25840e22276165
                          • Opcode Fuzzy Hash: c4c0629c0657e53817f0b36649b8493d39a6e9bc14523f72940892129c3d9ad8
                          • Instruction Fuzzy Hash: C7A12532A141188FDF19EF68D851BEF7BE0EB4A324F141159F815EF2A1CB31A912DB91

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00E73A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F41418,?,00E72E7F,?,?,?,00000000), ref: 00E73A78
                            • Part of subcall function 00E73357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E73379
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E7356A
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00EB318D
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00EB31CE
                          • RegCloseKey.ADVAPI32(?), ref: 00EB3210
                          • _wcslen.LIBCMT ref: 00EB3277
                          • _wcslen.LIBCMT ref: 00EB3286
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                          • API String ID: 98802146-2727554177
                          • Opcode ID: e6d34eab6824a1f5abeaa84f1d217f22aca332bbd76fe0b025ab40818f7ff9d2
                          • Instruction ID: 2ca13af1056baea537d0053dcb54a240375259edde8d5d41f1427e6b8352a9fe
                          • Opcode Fuzzy Hash: e6d34eab6824a1f5abeaa84f1d217f22aca332bbd76fe0b025ab40818f7ff9d2
                          • Instruction Fuzzy Hash: AE71C2714043059EC354EF69DC828ABBBF8FF95740F80553EF949A31A1EB309A48EB52

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00E72B8E
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00E72B9D
                          • LoadIconW.USER32(00000063), ref: 00E72BB3
                          • LoadIconW.USER32(000000A4), ref: 00E72BC5
                          • LoadIconW.USER32(000000A2), ref: 00E72BD7
                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E72BEF
                          • RegisterClassExW.USER32(?), ref: 00E72C40
                            • Part of subcall function 00E72CD4: GetSysColorBrush.USER32(0000000F), ref: 00E72D07
                            • Part of subcall function 00E72CD4: RegisterClassExW.USER32(00000030), ref: 00E72D31
                            • Part of subcall function 00E72CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E72D42
                            • Part of subcall function 00E72CD4: InitCommonControlsEx.COMCTL32(?), ref: 00E72D5F
                            • Part of subcall function 00E72CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E72D6F
                            • Part of subcall function 00E72CD4: LoadIconW.USER32(000000A9), ref: 00E72D85
                            • Part of subcall function 00E72CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E72D94
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: 5792acef8dd460f4246040b0a195d1811b93a366c2af6f91d3367143a6fdbf15
                          • Instruction ID: 42860b08caf1d6cb3c7045340155e1e580f1688d54eb270de5dd830443a49d77
                          • Opcode Fuzzy Hash: 5792acef8dd460f4246040b0a195d1811b93a366c2af6f91d3367143a6fdbf15
                          • Instruction Fuzzy Hash: CE215E78E4031CAFDB109FA5ED45BAE7FB4FB59B50F00411AFA00A66A0D3B10580EF90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 551 e73170-e73185 552 e73187-e7318a 551->552 553 e731e5-e731e7 551->553 554 e7318c-e73193 552->554 555 e731eb 552->555 553->552 556 e731e9 553->556 557 e73265-e7326d PostQuitMessage 554->557 558 e73199-e7319e 554->558 560 eb2dfb-eb2e23 call e718e2 call e8e499 555->560 561 e731f1-e731f6 555->561 559 e731d0-e731d8 DefWindowProcW 556->559 566 e73219-e7321b 557->566 563 e731a4-e731a8 558->563 564 eb2e7c-eb2e90 call edbf30 558->564 565 e731de-e731e4 559->565 595 eb2e28-eb2e2f 560->595 567 e7321d-e73244 SetTimer RegisterWindowMessageW 561->567 568 e731f8-e731fb 561->568 570 eb2e68-eb2e72 call edc161 563->570 571 e731ae-e731b3 563->571 564->566 589 eb2e96 564->589 566->565 567->566 572 e73246-e73251 CreatePopupMenu 567->572 574 e73201-e73214 KillTimer call e730f2 call e73c50 568->574 575 eb2d9c-eb2d9f 568->575 585 eb2e77 570->585 578 eb2e4d-eb2e54 571->578 579 e731b9-e731be 571->579 572->566 574->566 581 eb2da1-eb2da5 575->581 582 eb2dd7-eb2df6 MoveWindow 575->582 578->559 592 eb2e5a-eb2e63 call ed0ad7 578->592 587 e731c4-e731ca 579->587 588 e73253-e73263 call e7326f 579->588 590 eb2da7-eb2daa 581->590 591 eb2dc6-eb2dd2 SetFocus 581->591 582->566 585->566 587->559 587->595 588->566 589->559 590->587 596 eb2db0-eb2dc1 call e718e2 590->596 591->566 592->559 595->559 600 eb2e35-eb2e48 call e730f2 call e73837 595->600 596->566 600->559
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00E7316A,?,?), ref: 00E731D8
                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00E7316A,?,?), ref: 00E73204
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E73227
                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00E7316A,?,?), ref: 00E73232
                          • CreatePopupMenu.USER32 ref: 00E73246
                          • PostQuitMessage.USER32(00000000), ref: 00E73267
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated
                          • API String ID: 129472671-2362178303
                          • Opcode ID: 8bd7892d91b915a209149cdb401cd4af4bba5e027998b9ba9139db70d96d04ac
                          • Instruction ID: 79d293bf63812cfd9781b147fa805e35b87e7f0ad4286a14478326d3a5504cc0
                          • Opcode Fuzzy Hash: 8bd7892d91b915a209149cdb401cd4af4bba5e027998b9ba9139db70d96d04ac
                          • Instruction Fuzzy Hash: E1415C35250248A7DB555F789C0DBF93B55FB06344F14A229FD09B52B3C771CA80B7A2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 607 1963228-19632d6 call 1960c48 610 19632dd-1963303 call 1964138 CreateFileW 607->610 613 1963305 610->613 614 196330a-196331a 610->614 615 1963455-1963459 613->615 621 1963321-196333b VirtualAlloc 614->621 622 196331c 614->622 616 196349b-196349e 615->616 617 196345b-196345f 615->617 623 19634a1-19634a8 616->623 619 1963461-1963464 617->619 620 196346b-196346f 617->620 619->620 624 1963471-196347b 620->624 625 196347f-1963483 620->625 626 1963342-1963359 ReadFile 621->626 627 196333d 621->627 622->615 628 19634fd-1963512 623->628 629 19634aa-19634b5 623->629 624->625 632 1963485-196348f 625->632 633 1963493 625->633 634 1963360-19633a0 VirtualAlloc 626->634 635 196335b 626->635 627->615 630 1963514-196351f VirtualFree 628->630 631 1963522-196352a 628->631 636 19634b7 629->636 637 19634b9-19634c5 629->637 630->631 632->633 633->616 640 19633a7-19633c2 call 1964388 634->640 641 19633a2 634->641 635->615 636->628 638 19634c7-19634d7 637->638 639 19634d9-19634e5 637->639 643 19634fb 638->643 644 19634e7-19634f0 639->644 645 19634f2-19634f8 639->645 647 19633cd-19633d7 640->647 641->615 643->623 644->643 645->643 648 196340a-196341e call 1964198 647->648 649 19633d9-1963408 call 1964388 647->649 655 1963422-1963426 648->655 656 1963420 648->656 649->647 657 1963432-1963436 655->657 658 1963428-196342c CloseHandle 655->658 656->615 659 1963446-196344f 657->659 660 1963438-1963443 VirtualFree 657->660 658->657 659->610 659->615 660->659
                          APIs
                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 019632F9
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0196351F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateFileFreeVirtual
                          • String ID:
                          • API String ID: 204039940-0
                          • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                          • Instruction ID: 81873db4fb33bee805b17ba900a1de97c81f27a84cbd5b4022851098cd9e73a8
                          • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                          • Instruction Fuzzy Hash: 84A10874E00209EBDB15CFA4C994BAEFBB9FF48705F108559E209BB280D7759A41CB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 671 e72c63-e72cd3 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E72C91
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E72CB2
                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E71CAD,?), ref: 00E72CC6
                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E71CAD,?), ref: 00E72CCF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: 3ae75f847cc80c01e8004dba0c584292423585ddac82e2008492e90a2efd3fdc
                          • Instruction ID: 97a0fb1f22169f984d54caf58437d73ead808a6de86ed74ff74b80cb6bcb259b
                          • Opcode Fuzzy Hash: 3ae75f847cc80c01e8004dba0c584292423585ddac82e2008492e90a2efd3fdc
                          • Instruction Fuzzy Hash: B1F0DA795402987AEB311B17AC48E777EBDE7D7F50B00005AFD00A35A0C6621894FAB1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 786 1962ff8-1963125 call 1960c48 call 1962ee8 CreateFileW 793 1963127 786->793 794 196312c-196313c 786->794 795 19631dc-19631e1 793->795 797 1963143-196315d VirtualAlloc 794->797 798 196313e 794->798 799 1963161-1963178 ReadFile 797->799 800 196315f 797->800 798->795 801 196317c-19631b6 call 1962f28 call 1961ee8 799->801 802 196317a 799->802 800->795 807 19631d2-19631da ExitProcess 801->807 808 19631b8-19631cd call 1962f78 801->808 802->795 807->795 808->807
                          APIs
                            • Part of subcall function 01962EE8: Sleep.KERNELBASE(000001F4), ref: 01962EF9
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0196311B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: HIEEVP43ODG0QUFN4NX1M
                          • API String ID: 2694422964-322644881
                          • Opcode ID: 74c0a4f94e0e1937e377596d40a06f072f3cda4ca6fac2b1eb0ddfc00f4496e6
                          • Instruction ID: e7235693a6097dac72ea4b2467a3aeecbd7b118303a34564cb17f7a33b6934c4
                          • Opcode Fuzzy Hash: 74c0a4f94e0e1937e377596d40a06f072f3cda4ca6fac2b1eb0ddfc00f4496e6
                          • Instruction Fuzzy Hash: E3519170D04289DAEF11DBA4C854BEFBBB9AF59300F004599E6087B2C1D6BA5B44CBB5

                          Control-flow Graph

                          APIs
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EE2C05
                          • DeleteFileW.KERNEL32(?), ref: 00EE2C87
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EE2C9D
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EE2CAE
                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EE2CC0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: File$Delete$Copy
                          • String ID:
                          • API String ID: 3226157194-0
                          • Opcode ID: 703a6dcd1fdc39289563da52435b07a891128bb71eff6c0bbf0eb4be452c82dd
                          • Instruction ID: bc9cce09fa90979bb11de9395ee16b7c481792aed53a22b3f0812aca5a9af871
                          • Opcode Fuzzy Hash: 703a6dcd1fdc39289563da52435b07a891128bb71eff6c0bbf0eb4be452c82dd
                          • Instruction Fuzzy Hash: D0B14C7290011DABDF21EFA5CC85EDEB7BDEF48350F1050AAF609F6151EB319A448B61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 922 ea5aa9-ea5ace 923 ea5ad0-ea5ad2 922->923 924 ea5ad7-ea5ad9 922->924 927 ea5ca5-ea5cb4 call e90a8c 923->927 925 ea5afa-ea5b1f 924->925 926 ea5adb-ea5af5 call e9f2c6 call e9f2d9 call ea27ec 924->926 929 ea5b21-ea5b24 925->929 930 ea5b26-ea5b2c 925->930 926->927 929->930 933 ea5b4e-ea5b53 929->933 934 ea5b4b 930->934 935 ea5b2e-ea5b46 call e9f2c6 call e9f2d9 call ea27ec 930->935 938 ea5b64-ea5b6d call ea564e 933->938 939 ea5b55-ea5b61 call ea9424 933->939 934->933 967 ea5c9c-ea5c9f 935->967 950 ea5ba8-ea5bba 938->950 951 ea5b6f-ea5b71 938->951 939->938 953 ea5bbc-ea5bc2 950->953 954 ea5c02-ea5c23 WriteFile 950->954 955 ea5b73-ea5b78 951->955 956 ea5b95-ea5b9e call ea542e 951->956 962 ea5bf2-ea5c00 call ea56c4 953->962 963 ea5bc4-ea5bc7 953->963 958 ea5c2e 954->958 959 ea5c25-ea5c2b GetLastError 954->959 964 ea5b7e-ea5b8b call ea55e1 955->964 965 ea5c6c-ea5c7e 955->965 966 ea5ba3-ea5ba6 956->966 968 ea5c31-ea5c3c 958->968 959->958 962->966 969 ea5bc9-ea5bcc 963->969 970 ea5be2-ea5bf0 call ea5891 963->970 976 ea5b8e-ea5b90 964->976 973 ea5c89-ea5c99 call e9f2d9 call e9f2c6 965->973 974 ea5c80-ea5c83 965->974 966->976 981 ea5ca4 967->981 978 ea5c3e-ea5c43 968->978 979 ea5ca1 968->979 969->965 980 ea5bd2-ea5be0 call ea57a3 969->980 970->966 973->967 974->973 975 ea5c85-ea5c87 974->975 975->981 976->968 986 ea5c69 978->986 987 ea5c45-ea5c4a 978->987 979->981 980->966 981->927 986->965 991 ea5c4c-ea5c5e call e9f2d9 call e9f2c6 987->991 992 ea5c60-ea5c67 call e9f2a3 987->992 991->967 992->967
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: JO
                          • API String ID: 0-1663374661
                          • Opcode ID: 4825a9dc41dddf16c5fdb514240013ccb82307195512c76f63a13b45b465b4c9
                          • Instruction ID: 8c4bcd1b6f3a8b8ac7a09cf15c68c0907beffed6b15bb2abd3c4bd9895f4d0c6
                          • Opcode Fuzzy Hash: 4825a9dc41dddf16c5fdb514240013ccb82307195512c76f63a13b45b465b4c9
                          • Instruction Fuzzy Hash: B351B072D00609AFCF109FA4C845FEEBBB8AF4E324F14215AF505BF292D635A901DB61
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00E73B0F,SwapMouseButtons,00000004,?), ref: 00E73B40
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00E73B0F,SwapMouseButtons,00000004,?), ref: 00E73B61
                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00E73B0F,SwapMouseButtons,00000004,?), ref: 00E73B83
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 3677997916-824357125
                          • Opcode ID: bc3f5745eb943dc8e3a4c8478acaae04394efad9593e0bf9ab8867229544cacf
                          • Instruction ID: 0d4417e2fd603f553f69861882d36606b8627b758201f8593829348506020b4b
                          • Opcode Fuzzy Hash: bc3f5745eb943dc8e3a4c8478acaae04394efad9593e0bf9ab8867229544cacf
                          • Instruction Fuzzy Hash: 9C112AB5510208FFDB608FB5DC44AEEBBBDEF04744B10955AA809E7110D2319E40A7A0
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 019626A3
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01962739
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0196275B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                          • Instruction ID: f139811b2e29ba4c0fc1ed6d08f926b9590357eb6a2e5ff59d73caca20c101e6
                          • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                          • Instruction Fuzzy Hash: 7E62FB30A14258DBEB24CFA4C850BDEB776FF58301F1095A9D10DEB290E7799E81CB69
                          Strings
                          • Variable must be of type 'Object'., xrefs: 00EC32B7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: Variable must be of type 'Object'.
                          • API String ID: 0-109567571
                          • Opcode ID: e697c8e910f80a8772a7c1296ccf5d5d399de29f3d8f46b73e89e5a711cfc735
                          • Instruction ID: 5b1b86f2002dce1ae2fd6310df1c225a22ff08a7af9fa9e098ef3078c1c73cfb
                          • Opcode Fuzzy Hash: e697c8e910f80a8772a7c1296ccf5d5d399de29f3d8f46b73e89e5a711cfc735
                          • Instruction Fuzzy Hash: 52C27975A00204DFCB24DF68C881AADB7F1BF19314F24D5A9E919BB3A1D371AD42CB91
                          APIs
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E90668
                            • Part of subcall function 00E932A4: RaiseException.KERNEL32(?,?,?,00E9068A,?,00F41444,?,?,?,?,?,?,00E9068A,00E71129,00F38738,00E71129), ref: 00E93304
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E90685
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Exception@8Throw$ExceptionRaise
                          • String ID: Unknown exception
                          • API String ID: 3476068407-410509341
                          • Opcode ID: e1dd329292629a7fd9796dc67c7a5be0de1135278f020323189de91b6f6c1f2b
                          • Instruction ID: acf066967bda88743b76303fc07b87801efedfedafa6fa2e8e428babb4e4a685
                          • Opcode Fuzzy Hash: e1dd329292629a7fd9796dc67c7a5be0de1135278f020323189de91b6f6c1f2b
                          • Instruction Fuzzy Hash: CEF0C23490030DBBCF10B674D846D9E77AC5E00354BA05131F928F69E2EF71EA66D6C1
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00EE302F
                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00EE3044
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: aut
                          • API String ID: 3285503233-3010740371
                          • Opcode ID: 212785b9b58f951ff1d253a04ed7594c45a090867775823ac7eeffcec9cf79c7
                          • Instruction ID: 5c718e471b52617346d0ad81d1c5df2c7ddf39b75fc80002b7ff0e2254420d95
                          • Opcode Fuzzy Hash: 212785b9b58f951ff1d253a04ed7594c45a090867775823ac7eeffcec9cf79c7
                          • Instruction Fuzzy Hash: 7AD05E7250032877DA20A7A4AC0EFCB3B6CEB05760F0002A1B655E20D1DAB4D984CAD0
                          APIs
                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00EF82F5
                          • TerminateProcess.KERNEL32(00000000), ref: 00EF82FC
                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 00EF84DD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$CurrentFreeLibraryTerminate
                          • String ID:
                          • API String ID: 146820519-0
                          • Opcode ID: 86cd177dadc6de0caa62b8df30e34f1473f53d2ccd7c84d8f73f48031f013f10
                          • Instruction ID: 9f4d104365063307298aa1a7087f9cd3d272512b56c50bc9ab915dbd25dc6cf1
                          • Opcode Fuzzy Hash: 86cd177dadc6de0caa62b8df30e34f1473f53d2ccd7c84d8f73f48031f013f10
                          • Instruction Fuzzy Hash: 00128B71A083059FD714DF28C580B2ABBE1BF85318F04995DE999AB392DB30ED45CB92
                          APIs
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E71BF4
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E71BFC
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E71C07
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E71C12
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E71C1A
                            • Part of subcall function 00E71BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E71C22
                            • Part of subcall function 00E71B4A: RegisterWindowMessageW.USER32(00000004,?,00E712C4), ref: 00E71BA2
                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E7136A
                          • OleInitialize.OLE32 ref: 00E71388
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00EB24AB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                          • String ID:
                          • API String ID: 1986988660-0
                          • Opcode ID: b4cf5671d5f2b2f9308233d80b7823fc9803de2ee2ef30ecd3e5015f41ade7cd
                          • Instruction ID: b2c98d73b72b5851fdc9faa820494905a250abd852fe98f9db9fe6b68337266f
                          • Opcode Fuzzy Hash: b4cf5671d5f2b2f9308233d80b7823fc9803de2ee2ef30ecd3e5015f41ade7cd
                          • Instruction Fuzzy Hash: D67199BC9513088EC384EF79ED456953AE0BBAA344318922ADD1AD73B2EB3044C5FF51
                          APIs
                            • Part of subcall function 00E73923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E73A04
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EDC259
                          • KillTimer.USER32(?,00000001,?,?), ref: 00EDC261
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EDC270
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: IconNotifyShell_Timer$Kill
                          • String ID:
                          • API String ID: 3500052701-0
                          • Opcode ID: 62a3e84244454fe49186160edec889efdbd28d6aef5145cdfb56ca8b6a45d20f
                          • Instruction ID: b2491076eee1a1313d049b4ca6ef08b71faa465122d3ebf7b6a9922a886a96ac
                          • Opcode Fuzzy Hash: 62a3e84244454fe49186160edec889efdbd28d6aef5145cdfb56ca8b6a45d20f
                          • Instruction Fuzzy Hash: 3D31C370904744AFEB32CF648895BEBBBECEB06348F10149EE6DAA3351C3745A85CB51
                          APIs
                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,00EA85CC,?,00F38CC8,0000000C), ref: 00EA8704
                          • GetLastError.KERNEL32(?,00EA85CC,?,00F38CC8,0000000C), ref: 00EA870E
                          • __dosmaperr.LIBCMT ref: 00EA8739
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseErrorHandleLast__dosmaperr
                          • String ID:
                          • API String ID: 2583163307-0
                          • Opcode ID: 14c4e7dc0d502ffa5128f188be327d0d03a2863b16f8309c762d0662f94639b0
                          • Instruction ID: a8d6d75e4a391226f67e11ddc10b46ba8e64e48fc2019d2a2e679a9aebc55470
                          • Opcode Fuzzy Hash: 14c4e7dc0d502ffa5128f188be327d0d03a2863b16f8309c762d0662f94639b0
                          • Instruction Fuzzy Hash: B9016B3360462026EA2063346A45B7E2B894BCB77CF383229F804FF0D2DEB0FC858190
                          APIs
                          • TranslateMessage.USER32(?), ref: 00E7DB7B
                          • DispatchMessageW.USER32(?), ref: 00E7DB89
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E7DB9F
                          • Sleep.KERNEL32(0000000A), ref: 00E7DBB1
                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00EC1CC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                          • String ID:
                          • API String ID: 3288985973-0
                          • Opcode ID: a6cc83b191308e0897ab4e998662c2c9439e7b09a053173bbf896cec31c11ca7
                          • Instruction ID: 8bcded62d9caef70c601ea60921ce9433ab4bb2ebbc297e83c7bf4dc81f09b7f
                          • Opcode Fuzzy Hash: a6cc83b191308e0897ab4e998662c2c9439e7b09a053173bbf896cec31c11ca7
                          • Instruction Fuzzy Hash: 7CF0FE306483489BEB34DB608C49FEA73B8FF55314F505619F65EA30D0DB70A4899B55
                          APIs
                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00EE2CD4,?,?,?,00000004,00000001), ref: 00EE2FF2
                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00EE2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EE3006
                          • CloseHandle.KERNEL32(00000000,?,00EE2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EE300D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleTime
                          • String ID:
                          • API String ID: 3397143404-0
                          • Opcode ID: ab431134ad6fd7b5b742278add3fae0e54599908f64b5021c365d3a87c689d4c
                          • Instruction ID: ee6f2e6d0fde041c5e4592e24e28c71f1ac45f4e96ea05ee8ad7453ebd5e5fd8
                          • Opcode Fuzzy Hash: ab431134ad6fd7b5b742278add3fae0e54599908f64b5021c365d3a87c689d4c
                          • Instruction Fuzzy Hash: A4E0863228021877E2301765BC0DF8B3A1CE786B75F104310F759760D146A0150152E8
                          APIs
                          • __Init_thread_footer.LIBCMT ref: 00E817F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Init_thread_footer
                          • String ID: CALL
                          • API String ID: 1385522511-4196123274
                          • Opcode ID: 52c15f84e6778bebf31aa1b7bd41f68ad759ae701fe13551f029b819ff5d7857
                          • Instruction ID: de3c9dd316dc83bb092bfa6e93aed890744a441a6071ef7a49a859ec8bb77964
                          • Opcode Fuzzy Hash: 52c15f84e6778bebf31aa1b7bd41f68ad759ae701fe13551f029b819ff5d7857
                          • Instruction Fuzzy Hash: 43227C706082419FC714EF14C480B6ABBF5BF85314F2499ADF49EAB3A1D732E846CB52
                          APIs
                          • _wcslen.LIBCMT ref: 00EE6F6B
                            • Part of subcall function 00E74ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74EFD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LibraryLoad_wcslen
                          • String ID: >>>AUTOIT SCRIPT<<<
                          • API String ID: 3312870042-2806939583
                          • Opcode ID: 730ff3addd759c7456376ebfe4b9cc7c878969b9a63edfed4e2e1f2bacbd4425
                          • Instruction ID: f92f5f0f0bcc9a57b89374ad7b9c4ee09e8a4fd71da5090346a991eb1c6f963c
                          • Opcode Fuzzy Hash: 730ff3addd759c7456376ebfe4b9cc7c878969b9a63edfed4e2e1f2bacbd4425
                          • Instruction Fuzzy Hash: A7B1C4712082459FCB14EF20C491D6EB7E5AF94304F14986DF49AA72A2EB30ED49CB92
                          APIs
                          • GetOpenFileNameW.COMDLG32(?), ref: 00EB2C8C
                            • Part of subcall function 00E73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E73A97,?,?,00E72E7F,?,?,?,00000000), ref: 00E73AC2
                            • Part of subcall function 00E72DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E72DC4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Name$Path$FileFullLongOpen
                          • String ID: X
                          • API String ID: 779396738-3081909835
                          • Opcode ID: 5f897c8b02b48394d2c0aff4f61d275b467cc5df021204ac463b59ba319ea28b
                          • Instruction ID: 3f9d74411e2746d364456ed7729d9f501d2eed1f1b6a915d20ae93eabf7a628e
                          • Opcode Fuzzy Hash: 5f897c8b02b48394d2c0aff4f61d275b467cc5df021204ac463b59ba319ea28b
                          • Instruction Fuzzy Hash: 21219371A00258ABDB41DF94C845BEE7BF8AF49314F009059E509F7241DBB45A899FA1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID: EA06
                          • API String ID: 2638373210-3962188686
                          • Opcode ID: e584a121c4f47ae8384d742024a3e6651320e00558709580a86ba83569ecc2b9
                          • Instruction ID: 3342c90b58b68aa9a05b8873b3eff1db65a29069b4d797ccef11947f69690b9f
                          • Opcode Fuzzy Hash: e584a121c4f47ae8384d742024a3e6651320e00558709580a86ba83569ecc2b9
                          • Instruction Fuzzy Hash: BF01B5729042587EDF28CBA8C856EEEBBF89B05315F00459EE252E2181E5B4E6088B60
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 019626A3
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01962739
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0196275B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                          • Instruction ID: d6b8493d53d3f4e580a232547f46816edbd3e021b0c182d4b9cb1a121c64f813
                          • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                          • Instruction Fuzzy Hash: 3A12DE24E24658C6EB24DF64D8507DEB236EF68300F1094E9910DEB7A4E77A4F81CF5A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: e06cef63d0fe2fa584268331a8322fd2c278c18b5e8393da8efa2ddef151eb2f
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: 01310675A00109DBC718EF59D480A69F7A2FF49304B24A6A5E90DEF655D731EEC1CBC0
                          APIs
                            • Part of subcall function 00E74E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E74EDD,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E9C
                            • Part of subcall function 00E74E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E74EAE
                            • Part of subcall function 00E74E90: FreeLibrary.KERNEL32(00000000,?,?,00E74EDD,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74EC0
                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74EFD
                            • Part of subcall function 00E74E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EB3CDE,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E62
                            • Part of subcall function 00E74E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E74E74
                            • Part of subcall function 00E74E59: FreeLibrary.KERNEL32(00000000,?,?,00EB3CDE,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E87
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Library$Load$AddressFreeProc
                          • String ID:
                          • API String ID: 2632591731-0
                          • Opcode ID: 507ee28a7a9ca7f632062060e07e870fa47784bd5b4e4e8886221b2c636fa4ce
                          • Instruction ID: f1e0884a01af63754a816303e55adadc785c369af7b9f543b7f080e613f3af32
                          • Opcode Fuzzy Hash: 507ee28a7a9ca7f632062060e07e870fa47784bd5b4e4e8886221b2c636fa4ce
                          • Instruction Fuzzy Hash: E511C472700205AADB14AB60DC02BAD77E5AF40710F10E42DF546BA1C1DF709A05AB90
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __wsopen_s
                          • String ID:
                          • API String ID: 3347428461-0
                          • Opcode ID: 187fa505e827dc6e50e792ee190e3c4a8ccd871f88ed5ab2e2433214d399345d
                          • Instruction ID: 7d3e9993520af156a252c6a2c14f1e1a5bdb4b76e0b9a9a158c3bb72709ba2aa
                          • Opcode Fuzzy Hash: 187fa505e827dc6e50e792ee190e3c4a8ccd871f88ed5ab2e2433214d399345d
                          • Instruction Fuzzy Hash: 1511067590420AAFCB05DF58E94199E7BF9EF49314F104059F818AB312DA31EA118BA5
                          APIs
                            • Part of subcall function 00EA4C7D: RtlAllocateHeap.NTDLL(00000008,00E71129,00000000,?,00EA2E29,00000001,00000364,?,?,?,00E9F2DE,00EA3863,00F41444,?,00E8FDF5,?), ref: 00EA4CBE
                          • _free.LIBCMT ref: 00EA506C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AllocateHeap_free
                          • String ID:
                          • API String ID: 614378929-0
                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                          • Instruction ID: 169e65dff678a62e33c7cd0133488f5e5d00e98c75f0a6cb11f719ffc1f57d6f
                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                          • Instruction Fuzzy Hash: E2012B732047045BE3218E659881A5AFBE8FB8E370F25051DE194A72C0E6707905C674
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                          • Instruction ID: 1c4fc18bb5e7ca3cb369a31bca26583f662f2f6394d4b8bfaaf9b36408e5a802
                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                          • Instruction Fuzzy Hash: 81F0F972510E1496DE317A698C05B5A37D89F97334F101715F621BA3D3DB70E80185A5
                          APIs
                          • RtlAllocateHeap.NTDLL(00000008,00E71129,00000000,?,00EA2E29,00000001,00000364,?,?,?,00E9F2DE,00EA3863,00F41444,?,00E8FDF5,?), ref: 00EA4CBE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: cd7e45969564b8ee480aaa427f190aa01c4f7b2db6d25757e5bbfd27ec79d68e
                          • Instruction ID: e612d951114b172d6bdc56107f784d1872295fb9c1fb01c3f8be9accaab4371f
                          • Opcode Fuzzy Hash: cd7e45969564b8ee480aaa427f190aa01c4f7b2db6d25757e5bbfd27ec79d68e
                          • Instruction Fuzzy Hash: CEF0BB7160622466FB215F629C05F56BBC8BFC7774B186211B81DBE1D1CAF0F80156D0
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,?,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6,?,00E71129), ref: 00EA3852
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: e8420d59172285b31c900994364e295795896d22ca738440e4a0cf73efa65857
                          • Instruction ID: e563dfd34ec821fcf8a119f3001cc537ef99a9cec240581742451850c799cc7c
                          • Opcode Fuzzy Hash: e8420d59172285b31c900994364e295795896d22ca738440e4a0cf73efa65857
                          • Instruction Fuzzy Hash: 8FE0E53110122466DA352B779C04F9A36C8AF4B7B4F152220BC04BE4D1DB18FD0182E0
                          APIs
                          • FreeLibrary.KERNEL32(?,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74F6D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: f79e778de04b02e532a3aab667b5d5f9ecb61acea44d793793a70b4efa01bb80
                          • Instruction ID: acba91a6f553d1c9c45702a1bfac98f02f329ed1d6100c1bf1fbec29a921177d
                          • Opcode Fuzzy Hash: f79e778de04b02e532a3aab667b5d5f9ecb61acea44d793793a70b4efa01bb80
                          • Instruction Fuzzy Hash: 54F01CB1205751CFDB389F64D490852B7E4BF15319320E96EE1EE92651C7319844EB50
                          APIs
                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E72DC4
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LongNamePath_wcslen
                          • String ID:
                          • API String ID: 541455249-0
                          • Opcode ID: 391feb247e66201b290a840ad1da1650d4ac7ff6ad08c07b0dc02776e5b5ae8b
                          • Instruction ID: 97eee70bdda0446cee093f79fc4b71cb5178c0de32b4fa7f23b0f73072419ec0
                          • Opcode Fuzzy Hash: 391feb247e66201b290a840ad1da1650d4ac7ff6ad08c07b0dc02776e5b5ae8b
                          • Instruction Fuzzy Hash: 02E0CD726001245BC71093589C05FEA77DDEFC8794F0541B1FD09E7249D960AD80C590
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                          • Instruction ID: 875ecacf252565a7fbdac0266c3c566bd9ba1915a3587dd0922e38be4640d581
                          • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                          • Instruction Fuzzy Hash: F4E0DFB0209B004FCF3C9E28A8527B677E89F09304F00082EF69B92312E57228418A0D
                          APIs
                            • Part of subcall function 00E73837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E73908
                            • Part of subcall function 00E7D730: GetInputState.USER32 ref: 00E7D807
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E72B6B
                            • Part of subcall function 00E730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E7314E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                          • String ID:
                          • API String ID: 3667716007-0
                          • Opcode ID: ae929691b5e29b5fbeb9cc8638f9ef4ab9bb57afa616baf6418038b83e19f8f0
                          • Instruction ID: 515711af4cc397f87ee4f5e4e2335d128843b8a0fe5f8cb39b2774d1f8b9f27a
                          • Opcode Fuzzy Hash: ae929691b5e29b5fbeb9cc8638f9ef4ab9bb57afa616baf6418038b83e19f8f0
                          • Instruction Fuzzy Hash: 3DE0862130424806C608BB75985256DB7D9AFE2355F40B53EF54AA31A3CF2445856252
                          APIs
                          • CreateFileW.KERNELBASE(00000000,00000000,?,00EB0704,?,?,00000000,?,00EB0704,00000000,0000000C), ref: 00EB03B7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: aa4e8ce1d15ac260c308c3055d559abed48281c2d418b62f972f7b3f5d4a094e
                          • Instruction ID: a5b048b5ee4b08b67716137e381ef299c5e059cfa5039ea7b0eae616454bd70e
                          • Opcode Fuzzy Hash: aa4e8ce1d15ac260c308c3055d559abed48281c2d418b62f972f7b3f5d4a094e
                          • Instruction Fuzzy Hash: 36D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100BE1856020C732E821AB90
                          APIs
                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00E71CBC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: InfoParametersSystem
                          • String ID:
                          • API String ID: 3098949447-0
                          • Opcode ID: b75341391c157a50d43b1ba1aaad4647801d044288223c11e659585d82aac58c
                          • Instruction ID: 481ea04f81697a6a30d91414401d67b8a9d0825a67e8f21d1dcb5aa77a76bf77
                          • Opcode Fuzzy Hash: b75341391c157a50d43b1ba1aaad4647801d044288223c11e659585d82aac58c
                          • Instruction Fuzzy Hash: 46C09B3D38030C9FF2144B80BC4AF207754B359F00F484001FA09555E3C7A11450F650
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 01962EF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: e18f29100170897569c99617415c73002d6adf1c60c7723d1989a2a3156cfe5c
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: 9AE0E67494410EDFDB00DFB4D54D69D7BB4EF04301F100161FD05D2281D6309D508A72
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F0961A
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F0965B
                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00F0969F
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F096C9
                          • SendMessageW.USER32 ref: 00F096F2
                          • GetKeyState.USER32(00000011), ref: 00F0978B
                          • GetKeyState.USER32(00000009), ref: 00F09798
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F097AE
                          • GetKeyState.USER32(00000010), ref: 00F097B8
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F097E9
                          • SendMessageW.USER32 ref: 00F09810
                          • SendMessageW.USER32(?,00001030,?,00F07E95), ref: 00F09918
                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F0992E
                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F09941
                          • SetCapture.USER32(?), ref: 00F0994A
                          • ClientToScreen.USER32(?,?), ref: 00F099AF
                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F099BC
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F099D6
                          • ReleaseCapture.USER32 ref: 00F099E1
                          • GetCursorPos.USER32(?), ref: 00F09A19
                          • ScreenToClient.USER32(?,?), ref: 00F09A26
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F09A80
                          • SendMessageW.USER32 ref: 00F09AAE
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F09AEB
                          • SendMessageW.USER32 ref: 00F09B1A
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F09B3B
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F09B4A
                          • GetCursorPos.USER32(?), ref: 00F09B68
                          • ScreenToClient.USER32(?,?), ref: 00F09B75
                          • GetParent.USER32(?), ref: 00F09B93
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F09BFA
                          • SendMessageW.USER32 ref: 00F09C2B
                          • ClientToScreen.USER32(?,?), ref: 00F09C84
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F09CB4
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F09CDE
                          • SendMessageW.USER32 ref: 00F09D01
                          • ClientToScreen.USER32(?,?), ref: 00F09D4E
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F09D82
                            • Part of subcall function 00E89944: GetWindowLongW.USER32(?,000000EB), ref: 00E89952
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F09E05
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                          • String ID: @GUI_DRAGID$F
                          • API String ID: 3429851547-4164748364
                          • Opcode ID: b77514e90b4384f0cf899ec0f48e7d23d0eda6934a39c48cb06aa05c1d06bcb9
                          • Instruction ID: 4df59be4b57673accb1b7cb89ab06ed907718c5781886fabd42b655d101c9e51
                          • Opcode Fuzzy Hash: b77514e90b4384f0cf899ec0f48e7d23d0eda6934a39c48cb06aa05c1d06bcb9
                          • Instruction Fuzzy Hash: D9428235608205AFD724CF24CC44AAABBE5FF49320F144619FA59972E2E7B2D850FF51
                          APIs
                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00F048F3
                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00F04908
                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00F04927
                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00F0494B
                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00F0495C
                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00F0497B
                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00F049AE
                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00F049D4
                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00F04A0F
                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F04A56
                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F04A7E
                          • IsMenu.USER32(?), ref: 00F04A97
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F04AF2
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F04B20
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F04B94
                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00F04BE3
                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00F04C82
                          • wsprintfW.USER32 ref: 00F04CAE
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F04CC9
                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F04CF1
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F04D13
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F04D33
                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F04D5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                          • String ID: %d/%02d/%02d
                          • API String ID: 4054740463-328681919
                          • Opcode ID: b6251e850a3a715c07d42a1fcc8acd6b5d8f8787f9d8c97beab93cc7b7a73cd2
                          • Instruction ID: e6650baf98d8a552a9f12bb710231d83f80e7d36734a62af3df8164669269d01
                          • Opcode Fuzzy Hash: b6251e850a3a715c07d42a1fcc8acd6b5d8f8787f9d8c97beab93cc7b7a73cd2
                          • Instruction Fuzzy Hash: 3E12B3B1A00219ABEB359F24CC49FAE7BE8FF45720F104219F619EB1D1DB74A941EB50
                          APIs
                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00E8F998
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00ECF474
                          • IsIconic.USER32(00000000), ref: 00ECF47D
                          • ShowWindow.USER32(00000000,00000009), ref: 00ECF48A
                          • SetForegroundWindow.USER32(00000000), ref: 00ECF494
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00ECF4AA
                          • GetCurrentThreadId.KERNEL32 ref: 00ECF4B1
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00ECF4BD
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ECF4CE
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ECF4D6
                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00ECF4DE
                          • SetForegroundWindow.USER32(00000000), ref: 00ECF4E1
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ECF4F6
                          • keybd_event.USER32(00000012,00000000), ref: 00ECF501
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ECF50B
                          • keybd_event.USER32(00000012,00000000), ref: 00ECF510
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ECF519
                          • keybd_event.USER32(00000012,00000000), ref: 00ECF51E
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ECF528
                          • keybd_event.USER32(00000012,00000000), ref: 00ECF52D
                          • SetForegroundWindow.USER32(00000000), ref: 00ECF530
                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00ECF557
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 4125248594-2988720461
                          • Opcode ID: 7b46a611a60e1165edd6a4901d3c96e5ddb128c44db7d129ededcda9ae81dc89
                          • Instruction ID: caff963bd87a32eb387ca38660901e2caf66c8c27aa7adab1a02c103da759301
                          • Opcode Fuzzy Hash: 7b46a611a60e1165edd6a4901d3c96e5ddb128c44db7d129ededcda9ae81dc89
                          • Instruction Fuzzy Hash: A3316171A4021CBBEB206BB55D4AFBF7E6DFB44B50F141129FA04F61D1C6B29D01AAA0
                          APIs
                            • Part of subcall function 00ED16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ED170D
                            • Part of subcall function 00ED16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ED173A
                            • Part of subcall function 00ED16C3: GetLastError.KERNEL32 ref: 00ED174A
                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00ED1286
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00ED12A8
                          • CloseHandle.KERNEL32(?), ref: 00ED12B9
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00ED12D1
                          • GetProcessWindowStation.USER32 ref: 00ED12EA
                          • SetProcessWindowStation.USER32(00000000), ref: 00ED12F4
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00ED1310
                            • Part of subcall function 00ED10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00ED11FC), ref: 00ED10D4
                            • Part of subcall function 00ED10BF: CloseHandle.KERNEL32(?,?,00ED11FC), ref: 00ED10E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                          • String ID: $default$winsta0
                          • API String ID: 22674027-1027155976
                          • Opcode ID: afeb121c5411967b39c3e2fd020f66e49f1a33418d549e03119632cd442d37ee
                          • Instruction ID: 9d6ad29a56fca50dc694b9068495c9992c048ed9d9bedeb6850f8923f69d591d
                          • Opcode Fuzzy Hash: afeb121c5411967b39c3e2fd020f66e49f1a33418d549e03119632cd442d37ee
                          • Instruction Fuzzy Hash: 89818B71900209BFDF219FA4DC49BEE7BB9FF04708F14526AF924B62A0C7718946DB61
                          APIs
                            • Part of subcall function 00ED10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00ED1114
                            • Part of subcall function 00ED10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1120
                            • Part of subcall function 00ED10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED112F
                            • Part of subcall function 00ED10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1136
                            • Part of subcall function 00ED10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00ED114D
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00ED0BCC
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00ED0C00
                          • GetLengthSid.ADVAPI32(?), ref: 00ED0C17
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00ED0C51
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00ED0C6D
                          • GetLengthSid.ADVAPI32(?), ref: 00ED0C84
                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00ED0C8C
                          • HeapAlloc.KERNEL32(00000000), ref: 00ED0C93
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00ED0CB4
                          • CopySid.ADVAPI32(00000000), ref: 00ED0CBB
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00ED0CEA
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00ED0D0C
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00ED0D1E
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0D45
                          • HeapFree.KERNEL32(00000000), ref: 00ED0D4C
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0D55
                          • HeapFree.KERNEL32(00000000), ref: 00ED0D5C
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0D65
                          • HeapFree.KERNEL32(00000000), ref: 00ED0D6C
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00ED0D78
                          • HeapFree.KERNEL32(00000000), ref: 00ED0D7F
                            • Part of subcall function 00ED1193: GetProcessHeap.KERNEL32(00000008,00ED0BB1,?,00000000,?,00ED0BB1,?), ref: 00ED11A1
                            • Part of subcall function 00ED1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00ED0BB1,?), ref: 00ED11A8
                            • Part of subcall function 00ED1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00ED0BB1,?), ref: 00ED11B7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                          • String ID:
                          • API String ID: 4175595110-0
                          • Opcode ID: e8659ef5acc166111bdbd565a439a3ded3a1c2c8892f9ddbfa4e76f838718741
                          • Instruction ID: f6d52746060ecd0a5c5848f3e9887973fc10120bd81b128cc13855716050c82c
                          • Opcode Fuzzy Hash: e8659ef5acc166111bdbd565a439a3ded3a1c2c8892f9ddbfa4e76f838718741
                          • Instruction Fuzzy Hash: D8715C7290020AAFDF10DFA5DC48BAEBBB9FF05314F184616E914F7291D771A906CBA0
                          APIs
                          • OpenClipboard.USER32(00F0CC08), ref: 00EEEB29
                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00EEEB37
                          • GetClipboardData.USER32(0000000D), ref: 00EEEB43
                          • CloseClipboard.USER32 ref: 00EEEB4F
                          • GlobalLock.KERNEL32(00000000), ref: 00EEEB87
                          • CloseClipboard.USER32 ref: 00EEEB91
                          • GlobalUnlock.KERNEL32(00000000), ref: 00EEEBBC
                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00EEEBC9
                          • GetClipboardData.USER32(00000001), ref: 00EEEBD1
                          • GlobalLock.KERNEL32(00000000), ref: 00EEEBE2
                          • GlobalUnlock.KERNEL32(00000000), ref: 00EEEC22
                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00EEEC38
                          • GetClipboardData.USER32(0000000F), ref: 00EEEC44
                          • GlobalLock.KERNEL32(00000000), ref: 00EEEC55
                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00EEEC77
                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EEEC94
                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EEECD2
                          • GlobalUnlock.KERNEL32(00000000), ref: 00EEECF3
                          • CountClipboardFormats.USER32 ref: 00EEED14
                          • CloseClipboard.USER32 ref: 00EEED59
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                          • String ID:
                          • API String ID: 420908878-0
                          • Opcode ID: 83959a91f8a631496bedd805179c60863f9712c7d9d8064e652c8b4862dc1810
                          • Instruction ID: 8a9b8635f83c212f8c36144c40721a801e61e7c9da22cce79cb9177f20b83def
                          • Opcode Fuzzy Hash: 83959a91f8a631496bedd805179c60863f9712c7d9d8064e652c8b4862dc1810
                          • Instruction Fuzzy Hash: D061B1342042499FD310EF25D885F6AB7E4BF84708F14A61DF45AA73A2DB31DD05DBA2
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00EE69BE
                          • FindClose.KERNEL32(00000000), ref: 00EE6A12
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EE6A4E
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EE6A75
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EE6AB2
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EE6ADF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                          • API String ID: 3830820486-3289030164
                          • Opcode ID: fd84ed753429a91f3b0199ffb4cd30eb2852ea8fc8c749e5729d10576117ef65
                          • Instruction ID: 622ac99046ce12d1fc13304b7e52b47eac7a7b81bc380bf3db6b2b539281f866
                          • Opcode Fuzzy Hash: fd84ed753429a91f3b0199ffb4cd30eb2852ea8fc8c749e5729d10576117ef65
                          • Instruction Fuzzy Hash: C7D16071508344AFC714EBA0C892EABB7ECAF98704F04591DF589E7191EB74DA44CB62
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EE9663
                          • GetFileAttributesW.KERNEL32(?), ref: 00EE96A1
                          • SetFileAttributesW.KERNEL32(?,?), ref: 00EE96BB
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00EE96D3
                          • FindClose.KERNEL32(00000000), ref: 00EE96DE
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00EE96FA
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE974A
                          • SetCurrentDirectoryW.KERNEL32(00F36B7C), ref: 00EE9768
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EE9772
                          • FindClose.KERNEL32(00000000), ref: 00EE977F
                          • FindClose.KERNEL32(00000000), ref: 00EE978F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1409584000-438819550
                          • Opcode ID: 6b14cb24a3399f932f76a1a5d71ae83962ed27b9c1db3e57c85420d3ca55d38d
                          • Instruction ID: 16d9f17db6dc522f2685d7e4c67863d3df37e0c2fdc2e3e7015d8576016a1d77
                          • Opcode Fuzzy Hash: 6b14cb24a3399f932f76a1a5d71ae83962ed27b9c1db3e57c85420d3ca55d38d
                          • Instruction Fuzzy Hash: 1831D33250025E7ADF20AFB5EC49ADE77ECAF49364F105166F905F20A2DB34DD449E50
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EE97BE
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00EE9819
                          • FindClose.KERNEL32(00000000), ref: 00EE9824
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00EE9840
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE9890
                          • SetCurrentDirectoryW.KERNEL32(00F36B7C), ref: 00EE98AE
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EE98B8
                          • FindClose.KERNEL32(00000000), ref: 00EE98C5
                          • FindClose.KERNEL32(00000000), ref: 00EE98D5
                            • Part of subcall function 00EDDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00EDDB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 2640511053-438819550
                          • Opcode ID: 26502dea065f8c6745d0b8e7d7c33d1d5b0132a8368de808b04c424774a5e2fc
                          • Instruction ID: 3536b3375cdbba1c6bda45e224dd9841ff8f5c08e0542f5dd54ca51c65344e6b
                          • Opcode Fuzzy Hash: 26502dea065f8c6745d0b8e7d7c33d1d5b0132a8368de808b04c424774a5e2fc
                          • Instruction Fuzzy Hash: 7C31C33250065D6ADF24AFB5DC48ADE77ECAF46324F109155E810F21F2EB30DD459B64
                          APIs
                          • GetLocalTime.KERNEL32(?), ref: 00EE8257
                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00EE8267
                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00EE8273
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EE8310
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE8324
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE8356
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EE838C
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE8395
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CurrentDirectoryTime$File$Local$System
                          • String ID: *.*
                          • API String ID: 1464919966-438819550
                          • Opcode ID: a8f69c89c4d505d92ef59d5686b2e54a648669e7d9feb7f699c6d064e6487f76
                          • Instruction ID: 3b0ee162dc9a91764b5f08a78524055a0ad1f94b6fd99aa08b841cd8c5a6e0b2
                          • Opcode Fuzzy Hash: a8f69c89c4d505d92ef59d5686b2e54a648669e7d9feb7f699c6d064e6487f76
                          • Instruction Fuzzy Hash: 88617A725083499FCB10EF61C8419AFB3E8FF89314F04991EF999A7251EB31E945CB92
                          APIs
                            • Part of subcall function 00E73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E73A97,?,?,00E72E7F,?,?,?,00000000), ref: 00E73AC2
                            • Part of subcall function 00EDE199: GetFileAttributesW.KERNEL32(?,00EDCF95), ref: 00EDE19A
                          • FindFirstFileW.KERNEL32(?,?), ref: 00EDD122
                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00EDD1DD
                          • MoveFileW.KERNEL32(?,?), ref: 00EDD1F0
                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EDD20D
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EDD237
                            • Part of subcall function 00EDD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00EDD21C,?,?), ref: 00EDD2B2
                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00EDD253
                          • FindClose.KERNEL32(00000000), ref: 00EDD264
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                          • String ID: \*.*
                          • API String ID: 1946585618-1173974218
                          • Opcode ID: 6199a3363576deae11a433e0f15daba79f82f26631c50357bfd7c8fd347f687c
                          • Instruction ID: 3c745e7e476573d2ad24ad6b269b1adedca3b9a7c11f1f3755bf7f301bc117bc
                          • Opcode Fuzzy Hash: 6199a3363576deae11a433e0f15daba79f82f26631c50357bfd7c8fd347f687c
                          • Instruction Fuzzy Hash: C1615D3180510DAACF05EBE0DE92DEDB7B5EF55304F249166E405772A2EB306F0ADB61
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: 4216a64c7d4b3039675701119daf61ec7aef4832515160e25277809719601f05
                          • Instruction ID: 881e920c7e792830b563a38b0efdc577adaef27d9dec483270f271fb9d0a08e1
                          • Opcode Fuzzy Hash: 4216a64c7d4b3039675701119daf61ec7aef4832515160e25277809719601f05
                          • Instruction Fuzzy Hash: 2141BC35604255AFE320CF26D888B29BBE5FF44318F14D199E419AB7A2C732EC41CBD0
                          APIs
                            • Part of subcall function 00ED16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ED170D
                            • Part of subcall function 00ED16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ED173A
                            • Part of subcall function 00ED16C3: GetLastError.KERNEL32 ref: 00ED174A
                          • ExitWindowsEx.USER32(?,00000000), ref: 00EDE932
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                          • String ID: $ $@$SeShutdownPrivilege
                          • API String ID: 2234035333-3163812486
                          • Opcode ID: 223a3e4da914eb4083dc5c35663cf485acb00043adf1c6c66eb91827757d77b1
                          • Instruction ID: 9a941056795f88189ee9c53c6d975bc3a85b27779df2794749a0ee812cf7c467
                          • Opcode Fuzzy Hash: 223a3e4da914eb4083dc5c35663cf485acb00043adf1c6c66eb91827757d77b1
                          • Instruction Fuzzy Hash: 3F012672611215BBEB1433B49C9EBBF729CEB44754F141963FC02F63D1D5A05C429190
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00EF1276
                          • WSAGetLastError.WSOCK32 ref: 00EF1283
                          • bind.WSOCK32(00000000,?,00000010), ref: 00EF12BA
                          • WSAGetLastError.WSOCK32 ref: 00EF12C5
                          • closesocket.WSOCK32(00000000), ref: 00EF12F4
                          • listen.WSOCK32(00000000,00000005), ref: 00EF1303
                          • WSAGetLastError.WSOCK32 ref: 00EF130D
                          • closesocket.WSOCK32(00000000), ref: 00EF133C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$closesocket$bindlistensocket
                          • String ID:
                          • API String ID: 540024437-0
                          • Opcode ID: 09269d7569fbba17b8837de563229418abdbab84ba556a332cfe881690140fe2
                          • Instruction ID: 6a7fcab2ce7b097835eafac1fd0fda5ea90c384dfe171d5219b1950f3361b085
                          • Opcode Fuzzy Hash: 09269d7569fbba17b8837de563229418abdbab84ba556a332cfe881690140fe2
                          • Instruction Fuzzy Hash: 7E418E31600148DFE710DF64C488B29BBE6BF46318F18D188E956AF2A6C771ED81DBE1
                          APIs
                            • Part of subcall function 00E73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E73A97,?,?,00E72E7F,?,?,?,00000000), ref: 00E73AC2
                            • Part of subcall function 00EDE199: GetFileAttributesW.KERNEL32(?,00EDCF95), ref: 00EDE19A
                          • FindFirstFileW.KERNEL32(?,?), ref: 00EDD420
                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EDD470
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EDD481
                          • FindClose.KERNEL32(00000000), ref: 00EDD498
                          • FindClose.KERNEL32(00000000), ref: 00EDD4A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                          • String ID: \*.*
                          • API String ID: 2649000838-1173974218
                          • Opcode ID: 55325b2e86734ebf57e79c91f25606662526374ff065f45245690b414330b07e
                          • Instruction ID: e8cf0e92d13bd81ae841fb7a08af8f23ef5f08926819559be844076785351202
                          • Opcode Fuzzy Hash: 55325b2e86734ebf57e79c91f25606662526374ff065f45245690b414330b07e
                          • Instruction Fuzzy Hash: 8A31723100C3459BC304EF64DC518AF77E8FE91314F44AA2EF4E5A3291EB20AA09D763
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __floor_pentium4
                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                          • API String ID: 4168288129-2761157908
                          • Opcode ID: 44355c68a082b1890ac7b81cd205071b87d2a6c3068567e35e0db4b937d49cf8
                          • Instruction ID: 662b66be7ea216ad9046689ecca2bbdaba42f3eb61e2ac499ffa0dad79af54ea
                          • Opcode Fuzzy Hash: 44355c68a082b1890ac7b81cd205071b87d2a6c3068567e35e0db4b937d49cf8
                          • Instruction Fuzzy Hash: 43C22971E046288FDB25CF689D407EAB7B5EB8A305F1551EAD44DFB240E778AE818F40
                          APIs
                          • _wcslen.LIBCMT ref: 00EE64DC
                          • CoInitialize.OLE32(00000000), ref: 00EE6639
                          • CoCreateInstance.OLE32(00F0FCF8,00000000,00000001,00F0FB68,?), ref: 00EE6650
                          • CoUninitialize.OLE32 ref: 00EE68D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                          • String ID: .lnk
                          • API String ID: 886957087-24824748
                          • Opcode ID: 85f57c7347a764e8cddd038a04691622ef3b7871504094539bce53d128b128be
                          • Instruction ID: 21448e9b2f73599a711cd784a3acf4d9fae3c134faa32f7d5a0dfeada0522ad5
                          • Opcode Fuzzy Hash: 85f57c7347a764e8cddd038a04691622ef3b7871504094539bce53d128b128be
                          • Instruction Fuzzy Hash: 8CD15B71608345AFD314DF24C881D6BB7E8FF94344F10996DF5999B2A2EB30E909CB92
                          APIs
                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00EF22E8
                            • Part of subcall function 00EEE4EC: GetWindowRect.USER32(?,?), ref: 00EEE504
                          • GetDesktopWindow.USER32 ref: 00EF2312
                          • GetWindowRect.USER32(00000000), ref: 00EF2319
                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00EF2355
                          • GetCursorPos.USER32(?), ref: 00EF2381
                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00EF23DF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                          • String ID:
                          • API String ID: 2387181109-0
                          • Opcode ID: 6cc331e1abb0f9d19e722d79d99c10229fdd5f61b22a5a9660ad7a073ee98917
                          • Instruction ID: 744522ae3af887ab99c12e1a65dbaeabe220e7e117df8d2413df8047709e6abc
                          • Opcode Fuzzy Hash: 6cc331e1abb0f9d19e722d79d99c10229fdd5f61b22a5a9660ad7a073ee98917
                          • Instruction Fuzzy Hash: 9131B0B250531A9BCB20DF54C849A6BBBA9FF84314F001A1DF685A7291D734E909CB91
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00EE9B78
                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00EE9C8B
                            • Part of subcall function 00EE3874: GetInputState.USER32 ref: 00EE38CB
                            • Part of subcall function 00EE3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EE3966
                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00EE9BA8
                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00EE9C75
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                          • String ID: *.*
                          • API String ID: 1972594611-438819550
                          • Opcode ID: 4f0b4254ac9f4084eabbc12dbd77122f4705faea471f4e93a4e7370974ebeff7
                          • Instruction ID: 3ffdbe33ba9d33d5b43b37caf64dd4ff5ffa9b64c525ecb7c3dff89f2d4c3716
                          • Opcode Fuzzy Hash: 4f0b4254ac9f4084eabbc12dbd77122f4705faea471f4e93a4e7370974ebeff7
                          • Instruction Fuzzy Hash: 8141607190024EAFDF14EF65C845AEEBBF8EF05314F249155E805B2192EB309E84DFA1
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E89A4E
                          • GetSysColor.USER32(0000000F), ref: 00E89B23
                          • SetBkColor.GDI32(?,00000000), ref: 00E89B36
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Color$LongProcWindow
                          • String ID:
                          • API String ID: 3131106179-0
                          • Opcode ID: 4c9ef5522bc3dd67009d3c1ef936744c127c3e8dba45f42db9ee5f19e7491471
                          • Instruction ID: 850d2674422420a6ed923f4c5b26d79129346c54bf233b1230fb9a9d7f6a8035
                          • Opcode Fuzzy Hash: 4c9ef5522bc3dd67009d3c1ef936744c127c3e8dba45f42db9ee5f19e7491471
                          • Instruction Fuzzy Hash: BBA12B70508408BEE729BA3C8D48EBB369DEB42344B18214DF44EF69D3CA269D42E775
                          APIs
                            • Part of subcall function 00EF304E: inet_addr.WSOCK32(?), ref: 00EF307A
                            • Part of subcall function 00EF304E: _wcslen.LIBCMT ref: 00EF309B
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00EF185D
                          • WSAGetLastError.WSOCK32 ref: 00EF1884
                          • bind.WSOCK32(00000000,?,00000010), ref: 00EF18DB
                          • WSAGetLastError.WSOCK32 ref: 00EF18E6
                          • closesocket.WSOCK32(00000000), ref: 00EF1915
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 1601658205-0
                          • Opcode ID: fff3e51a9541e82e265ce37e1e036fc0ad68a1a5be542dbf0fbfb442292865c1
                          • Instruction ID: e7d9548a0d7e692d3ddb48e4c01e216992a005609893d963ddac0398ecd37d0a
                          • Opcode Fuzzy Hash: fff3e51a9541e82e265ce37e1e036fc0ad68a1a5be542dbf0fbfb442292865c1
                          • Instruction Fuzzy Hash: 5651A071A00204AFDB14AF24C886F6A77E5AB44718F18D098FA1A6F293D671AD418BE1
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: d24ded16baed681f4e782a6ed0a2d2637e0b7240f2cf298a4dc3f13d3999db4d
                          • Instruction ID: 76aa39b9555436729b4b604afdecc0b83129e2bb0aafa9d8b2a280cf09fd5026
                          • Opcode Fuzzy Hash: d24ded16baed681f4e782a6ed0a2d2637e0b7240f2cf298a4dc3f13d3999db4d
                          • Instruction Fuzzy Hash: 5E219431B402115FE7208F2AC884B6A7BE5FF85324F19C058E84A8B291CB75DC42FB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                          • API String ID: 0-1546025612
                          • Opcode ID: ccbd9873106191b63d9f301e96ee2537acd91e8e6e6057272015eb58f1d86804
                          • Instruction ID: 6eb1a1aca7b907f86828ba13af10b3ddfe2f52e6d26749eb5e84c9f06040599c
                          • Opcode Fuzzy Hash: ccbd9873106191b63d9f301e96ee2537acd91e8e6e6057272015eb58f1d86804
                          • Instruction Fuzzy Hash: CCA28E71E4021ACBDF24CF58C9447EEB7B1BB64318F2491AAD819B7285EB749D81CF90
                          APIs
                          • GetCurrentProcess.KERNEL32(00EA28E9,(,00E94CBE,00000000,00F388B8,0000000C,00E94E15,(,00000002,00000000,?,00EA28E9,00000003,00EA2DF7,?,?), ref: 00E94D09
                          • TerminateProcess.KERNEL32(00000000,?,00EA28E9,00000003,00EA2DF7,?,?,?,00E9E6D1,?,00F38A48,00000010,00E74F4A,?,?,00000000), ref: 00E94D10
                          • ExitProcess.KERNEL32 ref: 00E94D22
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID: (
                          • API String ID: 1703294689-2063206799
                          • Opcode ID: 954a7575b60a2d7dabeb21983498e1e53e9d2923b1c6c3ee16a931e32bd8aa0b
                          • Instruction ID: c57b1ecd7dacaa735d27e0d7392fc27cf1cdfe6e2ce21438b18b462715581c6b
                          • Opcode Fuzzy Hash: 954a7575b60a2d7dabeb21983498e1e53e9d2923b1c6c3ee16a931e32bd8aa0b
                          • Instruction Fuzzy Hash: 00E0B6B5010148ABCF15AF64DD09E583B69FB46785B109114FC05AA162CB35ED42DA80
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00EFA6AC
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00EFA6BA
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • Process32NextW.KERNEL32(00000000,?), ref: 00EFA79C
                          • CloseHandle.KERNEL32(00000000), ref: 00EFA7AB
                            • Part of subcall function 00E8CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00EB3303,?), ref: 00E8CE8A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                          • String ID:
                          • API String ID: 1991900642-0
                          • Opcode ID: bc03e27f97a825c3f30ba8d88bfee7e787ff6d898acdd8ace3f4b551c5bcaf74
                          • Instruction ID: 4aae571a57a3a01c265596dbe809fd286477cf44132bddc0a56b7f965d1eb8b4
                          • Opcode Fuzzy Hash: bc03e27f97a825c3f30ba8d88bfee7e787ff6d898acdd8ace3f4b551c5bcaf74
                          • Instruction Fuzzy Hash: 49516F715083049FD714EF24C886E6BBBE8FF89754F04992DF599A7252EB30D904CB92
                          APIs
                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00EDAAAC
                          • SetKeyboardState.USER32(00000080), ref: 00EDAAC8
                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00EDAB36
                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00EDAB88
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: 2ec1627d68e622fba30951b2bd365cd4fcc58fa43beb417a10b7d76d727f0b56
                          • Instruction ID: fb6f15c4100b14e6ff893e63427f44ccbac325f714f7cb774297ceffd497c0d6
                          • Opcode Fuzzy Hash: 2ec1627d68e622fba30951b2bd365cd4fcc58fa43beb417a10b7d76d727f0b56
                          • Instruction Fuzzy Hash: 22310930A40208AEEB358B648C05BFA7BA6EB45314F0C632BF585762D1D3758A83D792
                          APIs
                          • _free.LIBCMT ref: 00EABB7F
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • GetTimeZoneInformation.KERNEL32 ref: 00EABB91
                          • WideCharToMultiByte.KERNEL32(00000000,?,00F4121C,000000FF,?,0000003F,?,?), ref: 00EABC09
                          • WideCharToMultiByte.KERNEL32(00000000,?,00F41270,000000FF,?,0000003F,?,?,?,00F4121C,000000FF,?,0000003F,?,?), ref: 00EABC36
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                          • String ID:
                          • API String ID: 806657224-0
                          • Opcode ID: a78ffb509f62c436f3f405075d33209a548974bdb8987e1a0dd6df7f2737f142
                          • Instruction ID: 2583b3ecc846d7c0d7910ec6ffb2cc2641f420a59148fc1eea8e1b31ddd29e0a
                          • Opcode Fuzzy Hash: a78ffb509f62c436f3f405075d33209a548974bdb8987e1a0dd6df7f2737f142
                          • Instruction Fuzzy Hash: 3C31C370904209DFCB10DF69DC80869BBB8FF5B320714525AE410EF2A2D770AE40DB50
                          APIs
                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00EECE89
                          • GetLastError.KERNEL32(?,00000000), ref: 00EECEEA
                          • SetEvent.KERNEL32(?,?,00000000), ref: 00EECEFE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorEventFileInternetLastRead
                          • String ID:
                          • API String ID: 234945975-0
                          • Opcode ID: 945eca03e7c81d6d9870d29f943d0c4dd966bbb745c0b05bbb89ce7d7fd4bc43
                          • Instruction ID: fb1872ecf31617a573c81d8fe50231c2357cfcb841e2c503eb401c9857562802
                          • Opcode Fuzzy Hash: 945eca03e7c81d6d9870d29f943d0c4dd966bbb745c0b05bbb89ce7d7fd4bc43
                          • Instruction Fuzzy Hash: 1C21B071500309AFDB20DFA6C945BAA77F8EB00318F20541EE646E2161E774ED06DBA0
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00ED82AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: ($|
                          • API String ID: 1659193697-1631851259
                          • Opcode ID: 8dd78fccfd4573ed1e283bc8bd220288bd60c2486488b493cf1717f090719365
                          • Instruction ID: b5bf43c7aa06e153087051ff160e58f2602c6c58faea6674b762a7776b92207d
                          • Opcode Fuzzy Hash: 8dd78fccfd4573ed1e283bc8bd220288bd60c2486488b493cf1717f090719365
                          • Instruction Fuzzy Hash: 52323874A006059FCB28CF59C58196AB7F0FF48724B15D56EE49AEB3A1EB70E942CB40
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00EE5CC1
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00EE5D17
                          • FindClose.KERNEL32(?), ref: 00EE5D5F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Find$File$CloseFirstNext
                          • String ID:
                          • API String ID: 3541575487-0
                          • Opcode ID: 609ef85e8aa367ea0a027f8ce710287a548e0e7854164ea735d300be1bf92f5f
                          • Instruction ID: c436e2fd03d28c835365727d72707c2912d8fd21b37936406f25d6fe8f4b873a
                          • Opcode Fuzzy Hash: 609ef85e8aa367ea0a027f8ce710287a548e0e7854164ea735d300be1bf92f5f
                          • Instruction Fuzzy Hash: E451CC35600A459FC704CF28C894E9AB7E4FF4A318F24955EE95A9B3A2CB30ED04CF91
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 00EA271A
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00EA2724
                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00EA2731
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 67b8ba48fc44a9727b96fea71b3980bb6a7ea0db83b18e5ce03a164e0f06d2a4
                          • Instruction ID: 6c79fd38f0594a6e82c878f795d1c4c1622da78640a5cc80148a17eaf4843153
                          • Opcode Fuzzy Hash: 67b8ba48fc44a9727b96fea71b3980bb6a7ea0db83b18e5ce03a164e0f06d2a4
                          • Instruction Fuzzy Hash: A731C47491121CABCF21DF68DC887D8B7B8BF08310F5052EAE91CA6260E7709F818F84
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00EE51DA
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00EE5238
                          • SetErrorMode.KERNEL32(00000000), ref: 00EE52A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID:
                          • API String ID: 1682464887-0
                          • Opcode ID: dcb3dbaac7718e1e3fdfa18d638a5c413f163cb0a1c2b4ae9426047dbf6037bc
                          • Instruction ID: 7f2353e363f3fc8b6b9e9e55e4d5a0b4396d31b00a3e75d78ac23dd4da9172bd
                          • Opcode Fuzzy Hash: dcb3dbaac7718e1e3fdfa18d638a5c413f163cb0a1c2b4ae9426047dbf6037bc
                          • Instruction Fuzzy Hash: 9B316F75A00518DFDB00DF54D884EADBBF5FF49318F188099E909AB3A2DB71E856CB90
                          APIs
                            • Part of subcall function 00E8FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00E90668
                            • Part of subcall function 00E8FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00E90685
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ED170D
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ED173A
                          • GetLastError.KERNEL32 ref: 00ED174A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                          • String ID:
                          • API String ID: 577356006-0
                          • Opcode ID: 427234bbfde761a97b746186f41305e6b95767b14a0e4f5980a2a70af59bde9b
                          • Instruction ID: fc8ea1bb8bf525ced0fac2e6fa4ff51ca92ca5e3774abba34adbc3e520795bd4
                          • Opcode Fuzzy Hash: 427234bbfde761a97b746186f41305e6b95767b14a0e4f5980a2a70af59bde9b
                          • Instruction Fuzzy Hash: 4B11C4B1400308BFD718AF54DD86E6AB7FDFB04714B20856EE45A63251EB70FC418B60
                          APIs
                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EDD608
                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00EDD645
                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EDD650
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseControlCreateDeviceFileHandle
                          • String ID:
                          • API String ID: 33631002-0
                          • Opcode ID: 5088aef702f9f19e40ebaaeb2425e6f6163b5a62a6405bea612fadacd911ab74
                          • Instruction ID: ade609dd03efe1f034eb90f38e87f1860072c9f2dfb25759f705531eb6b1d769
                          • Opcode Fuzzy Hash: 5088aef702f9f19e40ebaaeb2425e6f6163b5a62a6405bea612fadacd911ab74
                          • Instruction Fuzzy Hash: A6117CB1E05228BBDB108F949C44FAFBBBCEB45B50F108152F914E7290D2704A018BE1
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00ED168C
                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00ED16A1
                          • FreeSid.ADVAPI32(?), ref: 00ED16B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: e040841cd34ec88cc5cb8bc961b367f3016f27fd3e96169a0b7b165b7fbe19cd
                          • Instruction ID: a9d376fc507df65f7b11dc074413df4d8d515d86cbd6233b9c3c019fe1f9ed9a
                          • Opcode Fuzzy Hash: e040841cd34ec88cc5cb8bc961b367f3016f27fd3e96169a0b7b165b7fbe19cd
                          • Instruction Fuzzy Hash: 2BF0F47195030DFBEF00DFE49D89AAEBBBCFB08604F5045A5E501E2181E774AA449A90
                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 00ECD28C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: NameUser
                          • String ID: X64
                          • API String ID: 2645101109-893830106
                          • Opcode ID: 9bc3f7ae6ec8ec2f09ea2447edbbae711b634c9e98ca5ab4173ba17b8b2b3924
                          • Instruction ID: 81f2cc8811ac458335c738b8cc5ae98e123a209b39b99ddce94e037b5b8332a6
                          • Opcode Fuzzy Hash: 9bc3f7ae6ec8ec2f09ea2447edbbae711b634c9e98ca5ab4173ba17b8b2b3924
                          • Instruction Fuzzy Hash: 9CD0C9B480511DEACB94DB90DC88DD9B37CFB04305F100255F10AF2050D73095499F10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                          • Instruction ID: 75168c03e93578f4129ed1e9f67475cf2a456160d7955cc48d26d3657d911d62
                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                          • Instruction Fuzzy Hash: 67021C71E002199BDF14DFA9C8806AEFBF1EF48314F25916AD919F7384D731AA41CB94
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00EE6918
                          • FindClose.KERNEL32(00000000), ref: 00EE6961
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: e9e30835198d2bf37d9556331c97760be81f6fcdf23b94afeebc971d9ddeeeb6
                          • Instruction ID: 906c3b224cfc8ccdd9ad68847da945dcff3c9563122effacf3617a9f98864e57
                          • Opcode Fuzzy Hash: e9e30835198d2bf37d9556331c97760be81f6fcdf23b94afeebc971d9ddeeeb6
                          • Instruction Fuzzy Hash: 1311D0316042449FC710DF2AD884A1ABBE5FF85328F14C69DE4699F6A2C731EC05CB90
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00EF4891,?,?,00000035,?), ref: 00EE37E4
                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00EF4891,?,?,00000035,?), ref: 00EE37F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: 53fb36b5ea25b3373cae942ef2a3b1dd1bcef4d3844a52ee3ab549a2ece4ada0
                          • Instruction ID: 71b8519ea0118cc660942b46d9bbb3ee297c9506edf641e5f5e537dbdd4889e2
                          • Opcode Fuzzy Hash: 53fb36b5ea25b3373cae942ef2a3b1dd1bcef4d3844a52ee3ab549a2ece4ada0
                          • Instruction Fuzzy Hash: EFF0E5B070522C2AEB2017B78C4DFEB7BAEEFC4761F000266F509E3281D9609904C6F0
                          APIs
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00EDB25D
                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00EDB270
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: InputSendkeybd_event
                          • String ID:
                          • API String ID: 3536248340-0
                          • Opcode ID: 036e78fe19bf12783edc52fae922d1da1b6f69dbf2234f7fed8e20a781a48ed2
                          • Instruction ID: 9006b8a66d1bb14760e844d55dbe0cee197d1c11e54b0be5f9124a48c80664e2
                          • Opcode Fuzzy Hash: 036e78fe19bf12783edc52fae922d1da1b6f69dbf2234f7fed8e20a781a48ed2
                          • Instruction Fuzzy Hash: 02F01D7590424DABDF059FA0C805BFE7BB4FF04309F04900AF955A51A1D77986129F94
                          APIs
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00ED11FC), ref: 00ED10D4
                          • CloseHandle.KERNEL32(?,?,00ED11FC), ref: 00ED10E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AdjustCloseHandlePrivilegesToken
                          • String ID:
                          • API String ID: 81990902-0
                          • Opcode ID: 5e2f511fdd4bba4ab559f1cecc06d3e8181ef8b4953a3abb7e445befa5dcccb5
                          • Instruction ID: 5213ddf7bcaf638da4596a0b4c60723ab8fa57642de1ae3f14f88cb1397c79df
                          • Opcode Fuzzy Hash: 5e2f511fdd4bba4ab559f1cecc06d3e8181ef8b4953a3abb7e445befa5dcccb5
                          • Instruction Fuzzy Hash: 7DE0BF72018610EEF7252B51FC05E7777E9FB04321F14892EF5A9905B1DB626CA0EB50
                          Strings
                          • Variable is not of type 'Object'., xrefs: 00EC0C40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: Variable is not of type 'Object'.
                          • API String ID: 0-1840281001
                          • Opcode ID: 3ed240d2a02e6bd0c5d801dceec6e48b69a9e5aa42c8283a5bd680a8d872026a
                          • Instruction ID: 6980e26106956f54e475813bbca411097adfab7dcb6be62707e44acad8288ab0
                          • Opcode Fuzzy Hash: 3ed240d2a02e6bd0c5d801dceec6e48b69a9e5aa42c8283a5bd680a8d872026a
                          • Instruction Fuzzy Hash: D6326C70900218DBDF14DF94C985BEDB7B9BF05308F24A06DE90ABB291D736AE46CB51
                          APIs
                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00EA6766,?,?,00000008,?,?,00EAFEFE,00000000), ref: 00EA6998
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: b21c4c15b0094080beed460524a2cba79a47c481bf939d0cb96d7636395834de
                          • Instruction ID: a952b20233060503c992bf46e2e7a298481b95d78df81be72834b964085c0fb9
                          • Opcode Fuzzy Hash: b21c4c15b0094080beed460524a2cba79a47c481bf939d0cb96d7636395834de
                          • Instruction Fuzzy Hash: 86B14E31510608DFD719CF28C48ABA57BE0FF4A368F299658E899DF2A1C735E991CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3916222277
                          • Opcode ID: d5e325ad3747cea3b4ce2337cfe72d53e639d8e43a07df810081524b24c20662
                          • Instruction ID: f2ce3a0af038081cc63e89cfcc8fdcfe05ee826710d1554b88af6331ad4b2b61
                          • Opcode Fuzzy Hash: d5e325ad3747cea3b4ce2337cfe72d53e639d8e43a07df810081524b24c20662
                          • Instruction Fuzzy Hash: 5F1260719002299BCB14DF58CA81BEEB7F5FF48710F14919AE849FB251EB709E81DB90
                          APIs
                          • BlockInput.USER32(00000001), ref: 00EEEABD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: BlockInput
                          • String ID:
                          • API String ID: 3456056419-0
                          • Opcode ID: ba5aa11433eaea71d23f926568171d3d4c47f8d8dd78aaa7455dc96550c1cef3
                          • Instruction ID: 0f2f72d4ac11af069d2fce253e5ad97722b23c8b3cbba0a0166665992a4e77b0
                          • Opcode Fuzzy Hash: ba5aa11433eaea71d23f926568171d3d4c47f8d8dd78aaa7455dc96550c1cef3
                          • Instruction Fuzzy Hash: 59E012312002049FC710DF5AD404E9AB7DDAF58764F00942AFC4DD7351D770A8408B90
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00E903EE), ref: 00E909DA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: b76b1ad1e653895914044975be5d578d43c5ee5077b7593e12b4445bcf04e0bc
                          • Instruction ID: 5d3da503ca5ba5aa245a6a834a7315cb16d8c4a7eaf7f3d251901727885e9878
                          • Opcode Fuzzy Hash: b76b1ad1e653895914044975be5d578d43c5ee5077b7593e12b4445bcf04e0bc
                          • Instruction Fuzzy Hash:
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0
                          • API String ID: 0-4108050209
                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                          • Instruction ID: ad5da3e9c9e4725d777ba11b29cc047aa932211f63fdf4474ed69fa3e5984ec6
                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                          • Instruction Fuzzy Hash: 8251536163C7255ADF3C8528895E7FE63D9DB82308F18350AD8C2FB292C611DE4ED356
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 474c845c7eb080d329e070d5852db8422b6ef3fbfc53d10fdeb2f560b919ab62
                          • Instruction ID: 8c228785d0317820b971d9cc7de11fc1a9213cfd78f2244c26d01c32ee24bdf3
                          • Opcode Fuzzy Hash: 474c845c7eb080d329e070d5852db8422b6ef3fbfc53d10fdeb2f560b919ab62
                          • Instruction Fuzzy Hash: 20326722D29F014DD7239634DC223367689AFBB3C5F16E337F85AB99A5EB29D4835100
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b0ace3d62c2616b4da772a356d168616ab2ae2fed81117ff030a5ae6346e5d2f
                          • Instruction ID: b083bdc84903897cc9a1e87fc94e43f11c676c329d956ac1102a143117703045
                          • Opcode Fuzzy Hash: b0ace3d62c2616b4da772a356d168616ab2ae2fed81117ff030a5ae6346e5d2f
                          • Instruction Fuzzy Hash: 84320931A001058BCF24DE28C694FBDBBA1EB46318F38A56ED45EB7291D236DD83DB51
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9fa33f337e3d5ebbdd31e9cfaebefe653efa58cba5fed96f76d91467c482aeec
                          • Instruction ID: 0a447f160a862160d70ec3eb3b6f35929743235d824711e988764215cc321886
                          • Opcode Fuzzy Hash: 9fa33f337e3d5ebbdd31e9cfaebefe653efa58cba5fed96f76d91467c482aeec
                          • Instruction Fuzzy Hash: EC22AE71A0060A9FDF14DF64C881AEEB3F6FF48304F14A529E85AB7291EB359D51CB50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06f7c088322563ae28ec58097ae6b0b9f3a1a2d38bb25f0b7a027b8b5fdc7473
                          • Instruction ID: 8f05f98f4f420697e82adb8490783a8e8beb99ced51a6b6a8ef4feb1ecfa1999
                          • Opcode Fuzzy Hash: 06f7c088322563ae28ec58097ae6b0b9f3a1a2d38bb25f0b7a027b8b5fdc7473
                          • Instruction Fuzzy Hash: A30295B1A00209EBDB04DF64D881AEEB7F5FF44314F109169E81ABB391E731AE11CB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6fe5e6750c3a5320e6ca1a99d5fe8cd1523704ee2279b67c230db93c449b0cb
                          • Instruction ID: 2f9593e258c71b94863b97b39c506efed0b1044b7499bdac9e79a1bd7acbe560
                          • Opcode Fuzzy Hash: c6fe5e6750c3a5320e6ca1a99d5fe8cd1523704ee2279b67c230db93c449b0cb
                          • Instruction Fuzzy Hash: 7CB1F320D2AF454DD72396398831336FA5CAFBB6D5F92D71BFC2674D22EB2286835140
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                          • Instruction ID: daae5ea9c5d814769ca826ceadadde2b4e26d3850e58c400a9655e9228d3315c
                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                          • Instruction Fuzzy Hash: F59177722090A34ADF2D463E857407EFFE15A923A631A17DED8F2EA1C5FE24C954D620
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                          • Instruction ID: c6c9c66d0e365f2b635b0f164f84ef3ac1598c05b1163aa091773eec437b6a88
                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                          • Instruction Fuzzy Hash: F79155722090E34EDF2D467A857407EFFE15A923A631A27DED4F2EA1C1FE24C954D620
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a8854e5ae368e41637702119214a218672e96cf4bef67b105dc488f33e43aa1
                          • Instruction ID: 70b3de3e2b3b69e07fa7c7dfde5b708af8f54efbc48d0422e5d6285472e879eb
                          • Opcode Fuzzy Hash: 4a8854e5ae368e41637702119214a218672e96cf4bef67b105dc488f33e43aa1
                          • Instruction Fuzzy Hash: 8A61A97123830966DE389A2C8D91BFE63D6DF41708F14391AE8C2FB291E6519E4EC355
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: adc12ed7ce966c9491b007b31cc8ca119866732d99a5ce8077f9315d77cff920
                          • Instruction ID: 0444a16ec47ef0dfa613d8af5ac12d0b44ef9eb48f9185758e0c5025599b93b3
                          • Opcode Fuzzy Hash: adc12ed7ce966c9491b007b31cc8ca119866732d99a5ce8077f9315d77cff920
                          • Instruction Fuzzy Hash: 5D6159B163C70996DE384A284951BFF23D4AF4370CF14395EE8C2FB291DA12AD4EC255
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                          • Instruction ID: 36c75aced356fa56e99949f780fd0e10a079aa3b32bebfb841806bd41fba0de2
                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                          • Instruction Fuzzy Hash: 168185736080E309DF6E427A853407EFFE15A923A531A27DED4F2EB1C1EE24C554E620
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d26d6f516d9494ae6df557822e0ccb74a3051660b5dc87d53fbf29e193277917
                          • Instruction ID: 40291c6e8febe57bcec9eeb5d12d6280ec666015907ba34bfe2687ef946dc501
                          • Opcode Fuzzy Hash: d26d6f516d9494ae6df557822e0ccb74a3051660b5dc87d53fbf29e193277917
                          • Instruction Fuzzy Hash: 85513E9298EAC51FD70362794C7A588BF748C2702079847EFC48146ED7E94E401FCB97
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction ID: e2baa4bf226aa6d5ff307a9874e9fc530c9120997ac12783b46754000a24681c
                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction Fuzzy Hash: A041D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8ad2ebff9310d6bdff94f86b8e61b0be17b50823d974e922a026fc6f8a97062f
                          • Instruction ID: f9d70f34c1378c9db00ef812f99c6a0634e0874562540938065d6ad70d27803d
                          • Opcode Fuzzy Hash: 8ad2ebff9310d6bdff94f86b8e61b0be17b50823d974e922a026fc6f8a97062f
                          • Instruction Fuzzy Hash: 5F21EB323205158BDB28CF79C82367E73E9A764320F55862EE4A7D37D0DE35A904D780
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction ID: 93060faf61f6138295cbe44288b86aba4bc6a1126becb888e05bbe0db8d262c3
                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction Fuzzy Hash: 5A01A478A00209EFCB44DF98C5909AEF7FAFF98310F208599D809A7341D730AE51DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction ID: 751c10c2deafe819111a347485629cbc54eca2d84d34cf36ac189fceea128bd5
                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction Fuzzy Hash: CD019278A00209EFCB44DF98C5909AEF7FAFB58310F208599D809A7745D730AE41DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1725450998.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1960000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 00EF2B30
                          • DeleteObject.GDI32(00000000), ref: 00EF2B43
                          • DestroyWindow.USER32 ref: 00EF2B52
                          • GetDesktopWindow.USER32 ref: 00EF2B6D
                          • GetWindowRect.USER32(00000000), ref: 00EF2B74
                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00EF2CA3
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00EF2CB1
                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2CF8
                          • GetClientRect.USER32(00000000,?), ref: 00EF2D04
                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00EF2D40
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2D62
                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2D75
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2D80
                          • GlobalLock.KERNEL32(00000000), ref: 00EF2D89
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2D98
                          • GlobalUnlock.KERNEL32(00000000), ref: 00EF2DA1
                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2DA8
                          • GlobalFree.KERNEL32(00000000), ref: 00EF2DB3
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2DC5
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F0FC38,00000000), ref: 00EF2DDB
                          • GlobalFree.KERNEL32(00000000), ref: 00EF2DEB
                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00EF2E11
                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00EF2E30
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF2E52
                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EF303F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                          • String ID: $AutoIt v3$DISPLAY$static
                          • API String ID: 2211948467-2373415609
                          • Opcode ID: 39fdf8563df6b7a2def5afb0fbd234fecc522a8d80df0bdcabfb78392f58b929
                          • Instruction ID: a238e873028fb142833668ab342c88918e402ce36ab6974d80fc167367f256ce
                          • Opcode Fuzzy Hash: 39fdf8563df6b7a2def5afb0fbd234fecc522a8d80df0bdcabfb78392f58b929
                          • Instruction Fuzzy Hash: 03027075600209AFDB14DF64CC89EAE7BB9FF49714F108158FA19AB2A1CB70DD01DBA0
                          APIs
                          • SetTextColor.GDI32(?,00000000), ref: 00F0712F
                          • GetSysColorBrush.USER32(0000000F), ref: 00F07160
                          • GetSysColor.USER32(0000000F), ref: 00F0716C
                          • SetBkColor.GDI32(?,000000FF), ref: 00F07186
                          • SelectObject.GDI32(?,?), ref: 00F07195
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00F071C0
                          • GetSysColor.USER32(00000010), ref: 00F071C8
                          • CreateSolidBrush.GDI32(00000000), ref: 00F071CF
                          • FrameRect.USER32(?,?,00000000), ref: 00F071DE
                          • DeleteObject.GDI32(00000000), ref: 00F071E5
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00F07230
                          • FillRect.USER32(?,?,?), ref: 00F07262
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F07284
                            • Part of subcall function 00F073E8: GetSysColor.USER32(00000012), ref: 00F07421
                            • Part of subcall function 00F073E8: SetTextColor.GDI32(?,?), ref: 00F07425
                            • Part of subcall function 00F073E8: GetSysColorBrush.USER32(0000000F), ref: 00F0743B
                            • Part of subcall function 00F073E8: GetSysColor.USER32(0000000F), ref: 00F07446
                            • Part of subcall function 00F073E8: GetSysColor.USER32(00000011), ref: 00F07463
                            • Part of subcall function 00F073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F07471
                            • Part of subcall function 00F073E8: SelectObject.GDI32(?,00000000), ref: 00F07482
                            • Part of subcall function 00F073E8: SetBkColor.GDI32(?,00000000), ref: 00F0748B
                            • Part of subcall function 00F073E8: SelectObject.GDI32(?,?), ref: 00F07498
                            • Part of subcall function 00F073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00F074B7
                            • Part of subcall function 00F073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F074CE
                            • Part of subcall function 00F073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00F074DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                          • String ID:
                          • API String ID: 4124339563-0
                          • Opcode ID: 306a4861d6ccc6be7796fe48eda943398792de05f91d913e548c972c0515925b
                          • Instruction ID: b463ea578ed7a4e1e3f8cb2d3707e8d7be69322ff6c6ecc151e290a278d10f60
                          • Opcode Fuzzy Hash: 306a4861d6ccc6be7796fe48eda943398792de05f91d913e548c972c0515925b
                          • Instruction Fuzzy Hash: 12A19172408305AFDB11AF60DC48E6BBBA9FF49320F140B19F962961E1D771E944EF91
                          APIs
                          • DestroyWindow.USER32(?,?), ref: 00E88E14
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00EC6AC5
                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00EC6AFE
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00EC6F43
                            • Part of subcall function 00E88F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E88BE8,?,00000000,?,?,?,?,00E88BBA,00000000,?), ref: 00E88FC5
                          • SendMessageW.USER32(?,00001053), ref: 00EC6F7F
                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00EC6F96
                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00EC6FAC
                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00EC6FB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                          • String ID: 0
                          • API String ID: 2760611726-4108050209
                          • Opcode ID: 4a448b5da56f22d0ae8625e819c638f0d56c0c7a79ed8c6e028c6977b4b2ab22
                          • Instruction ID: 7290dfb211d8caf7798ac6aa4b57397f45b10f5b6afffaf5a568141b5dab3cc6
                          • Opcode Fuzzy Hash: 4a448b5da56f22d0ae8625e819c638f0d56c0c7a79ed8c6e028c6977b4b2ab22
                          • Instruction Fuzzy Hash: FE129C342002059FDB25DF14CE44FAABBE5FB49304F54556DF889AB261CB32EC92EB91
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 00EF273E
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00EF286A
                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00EF28A9
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00EF28B9
                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00EF2900
                          • GetClientRect.USER32(00000000,?), ref: 00EF290C
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00EF2955
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00EF2964
                          • GetStockObject.GDI32(00000011), ref: 00EF2974
                          • SelectObject.GDI32(00000000,00000000), ref: 00EF2978
                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00EF2988
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EF2991
                          • DeleteDC.GDI32(00000000), ref: 00EF299A
                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00EF29C6
                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00EF29DD
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00EF2A1D
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00EF2A31
                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00EF2A42
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00EF2A77
                          • GetStockObject.GDI32(00000011), ref: 00EF2A82
                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00EF2A8D
                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00EF2A97
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-517079104
                          • Opcode ID: 06e631fcdf4f30abf1a5f90b67e3b2100f8cf14b4b286a856dbc6f1e0e56f374
                          • Instruction ID: de4c369a2d9989d496f5524903a6882e3a63f105c71c04046482a32e78fcc6ee
                          • Opcode Fuzzy Hash: 06e631fcdf4f30abf1a5f90b67e3b2100f8cf14b4b286a856dbc6f1e0e56f374
                          • Instruction Fuzzy Hash: FFB14B75A40219AFEB14DFA8CC49FAE7BA9FB48714F108219FA15E72D0D770AD40DB90
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00EE4AED
                          • GetDriveTypeW.KERNEL32(?,00F0CB68,?,\\.\,00F0CC08), ref: 00EE4BCA
                          • SetErrorMode.KERNEL32(00000000,00F0CB68,?,\\.\,00F0CC08), ref: 00EE4D36
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorMode$DriveType
                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                          • API String ID: 2907320926-4222207086
                          • Opcode ID: c46dc99524a686a7651286fe5be725f11d86ee8002496fa9b36ea7c152f0aa68
                          • Instruction ID: 409054d6bdec8c7355fc404c2e63b51fcfaba5577ba14bfa01fd2530a57546fe
                          • Opcode Fuzzy Hash: c46dc99524a686a7651286fe5be725f11d86ee8002496fa9b36ea7c152f0aa68
                          • Instruction Fuzzy Hash: A461A2B160514DABDB04DF25C981AA9B7E0AB04354F34E015F80AFB6D2DB35ED41EB52
                          APIs
                          • GetSysColor.USER32(00000012), ref: 00F07421
                          • SetTextColor.GDI32(?,?), ref: 00F07425
                          • GetSysColorBrush.USER32(0000000F), ref: 00F0743B
                          • GetSysColor.USER32(0000000F), ref: 00F07446
                          • CreateSolidBrush.GDI32(?), ref: 00F0744B
                          • GetSysColor.USER32(00000011), ref: 00F07463
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F07471
                          • SelectObject.GDI32(?,00000000), ref: 00F07482
                          • SetBkColor.GDI32(?,00000000), ref: 00F0748B
                          • SelectObject.GDI32(?,?), ref: 00F07498
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00F074B7
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F074CE
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00F074DB
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F0752A
                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F07554
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00F07572
                          • DrawFocusRect.USER32(?,?), ref: 00F0757D
                          • GetSysColor.USER32(00000011), ref: 00F0758E
                          • SetTextColor.GDI32(?,00000000), ref: 00F07596
                          • DrawTextW.USER32(?,00F070F5,000000FF,?,00000000), ref: 00F075A8
                          • SelectObject.GDI32(?,?), ref: 00F075BF
                          • DeleteObject.GDI32(?), ref: 00F075CA
                          • SelectObject.GDI32(?,?), ref: 00F075D0
                          • DeleteObject.GDI32(?), ref: 00F075D5
                          • SetTextColor.GDI32(?,?), ref: 00F075DB
                          • SetBkColor.GDI32(?,?), ref: 00F075E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID:
                          • API String ID: 1996641542-0
                          • Opcode ID: 4859bd21402b8e6989a23206ebff6de299e2299a54eabaa128ba7a1d64e46a9b
                          • Instruction ID: c9de4944b7ace2d5dc4a984761786c69f64f07258d422b70a32e2b124e67f2bb
                          • Opcode Fuzzy Hash: 4859bd21402b8e6989a23206ebff6de299e2299a54eabaa128ba7a1d64e46a9b
                          • Instruction Fuzzy Hash: 2F617D76D00218AFDF01AFA4DC48AEE7FB9FB08320F144251F915AB2E1D771A940EB90
                          APIs
                          • GetCursorPos.USER32(?), ref: 00F01128
                          • GetDesktopWindow.USER32 ref: 00F0113D
                          • GetWindowRect.USER32(00000000), ref: 00F01144
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F01199
                          • DestroyWindow.USER32(?), ref: 00F011B9
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F011ED
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F0120B
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F0121D
                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00F01232
                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00F01245
                          • IsWindowVisible.USER32(00000000), ref: 00F012A1
                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00F012BC
                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00F012D0
                          • GetWindowRect.USER32(00000000,?), ref: 00F012E8
                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00F0130E
                          • GetMonitorInfoW.USER32(00000000,?), ref: 00F01328
                          • CopyRect.USER32(?,?), ref: 00F0133F
                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00F013AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                          • String ID: ($0$tooltips_class32
                          • API String ID: 698492251-4156429822
                          • Opcode ID: 27cdfdec03bb7fc9116f87d0219ad8bbb457260637b5bd1b1bccd2807c0132f2
                          • Instruction ID: 69141cac76edd8635e29dd604a989a764b4c2e9afd9d0c9340ba525209f63bf8
                          • Opcode Fuzzy Hash: 27cdfdec03bb7fc9116f87d0219ad8bbb457260637b5bd1b1bccd2807c0132f2
                          • Instruction Fuzzy Hash: BCB18C71604341AFDB14DF64C884B6ABBE5FF84754F00891CF999AB2A1C731E845EB92
                          APIs
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E88968
                          • GetSystemMetrics.USER32(00000007), ref: 00E88970
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E8899B
                          • GetSystemMetrics.USER32(00000008), ref: 00E889A3
                          • GetSystemMetrics.USER32(00000004), ref: 00E889C8
                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E889E5
                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E889F5
                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E88A28
                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E88A3C
                          • GetClientRect.USER32(00000000,000000FF), ref: 00E88A5A
                          • GetStockObject.GDI32(00000011), ref: 00E88A76
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E88A81
                            • Part of subcall function 00E8912D: GetCursorPos.USER32(?), ref: 00E89141
                            • Part of subcall function 00E8912D: ScreenToClient.USER32(00000000,?), ref: 00E8915E
                            • Part of subcall function 00E8912D: GetAsyncKeyState.USER32(00000001), ref: 00E89183
                            • Part of subcall function 00E8912D: GetAsyncKeyState.USER32(00000002), ref: 00E8919D
                          • SetTimer.USER32(00000000,00000000,00000028,00E890FC), ref: 00E88AA8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                          • String ID: AutoIt v3 GUI
                          • API String ID: 1458621304-248962490
                          • Opcode ID: c619cc862de5a037f66de35a1d27e01f35a6a4995b9312cea4e172ff7387f1c1
                          • Instruction ID: 7e250294e5620b7757cdfcf141c9301a1198b230efc2e797703ba28565f985b2
                          • Opcode Fuzzy Hash: c619cc862de5a037f66de35a1d27e01f35a6a4995b9312cea4e172ff7387f1c1
                          • Instruction Fuzzy Hash: CFB17B75A00209AFDF14EFA8CD45BAE3BB5FB48314F14522AFE19A7290DB34E841DB51
                          APIs
                            • Part of subcall function 00ED10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00ED1114
                            • Part of subcall function 00ED10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1120
                            • Part of subcall function 00ED10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED112F
                            • Part of subcall function 00ED10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1136
                            • Part of subcall function 00ED10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00ED114D
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00ED0DF5
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00ED0E29
                          • GetLengthSid.ADVAPI32(?), ref: 00ED0E40
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00ED0E7A
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00ED0E96
                          • GetLengthSid.ADVAPI32(?), ref: 00ED0EAD
                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00ED0EB5
                          • HeapAlloc.KERNEL32(00000000), ref: 00ED0EBC
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00ED0EDD
                          • CopySid.ADVAPI32(00000000), ref: 00ED0EE4
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00ED0F13
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00ED0F35
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00ED0F47
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0F6E
                          • HeapFree.KERNEL32(00000000), ref: 00ED0F75
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0F7E
                          • HeapFree.KERNEL32(00000000), ref: 00ED0F85
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED0F8E
                          • HeapFree.KERNEL32(00000000), ref: 00ED0F95
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00ED0FA1
                          • HeapFree.KERNEL32(00000000), ref: 00ED0FA8
                            • Part of subcall function 00ED1193: GetProcessHeap.KERNEL32(00000008,00ED0BB1,?,00000000,?,00ED0BB1,?), ref: 00ED11A1
                            • Part of subcall function 00ED1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00ED0BB1,?), ref: 00ED11A8
                            • Part of subcall function 00ED1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00ED0BB1,?), ref: 00ED11B7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                          • String ID:
                          • API String ID: 4175595110-0
                          • Opcode ID: 8dbe52faeebac34737e75669feff317e26795b02b7d8f1ffcc38bd2a2d525663
                          • Instruction ID: 5f5ccb91fa9500bf8848d6d750e27b41710175eef73b79d6ebf1266cfe9119d1
                          • Opcode Fuzzy Hash: 8dbe52faeebac34737e75669feff317e26795b02b7d8f1ffcc38bd2a2d525663
                          • Instruction Fuzzy Hash: FB71417290020AABDF209FA5DC48FEEBBB8FF04314F185216F955F6291D7719906CBA0
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EFC4BD
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F0CC08,00000000,?,00000000,?,?), ref: 00EFC544
                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00EFC5A4
                          • _wcslen.LIBCMT ref: 00EFC5F4
                          • _wcslen.LIBCMT ref: 00EFC66F
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00EFC6B2
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00EFC7C1
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00EFC84D
                          • RegCloseKey.ADVAPI32(?), ref: 00EFC881
                          • RegCloseKey.ADVAPI32(00000000), ref: 00EFC88E
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00EFC960
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 9721498-966354055
                          • Opcode ID: 8f06848909b5596f807ba9ca79129a967d1af5bd3b0e4760310ff3b2d4c600e9
                          • Instruction ID: 3067986a58e7a3974ce6b9c20c0e93b04ba55a657d265c5a6721fb91d8e1eee5
                          • Opcode Fuzzy Hash: 8f06848909b5596f807ba9ca79129a967d1af5bd3b0e4760310ff3b2d4c600e9
                          • Instruction Fuzzy Hash: D21259756042059FDB14DF24C981A2AB7E5FF88714F24985CF98AAB3A2DB31FD41CB81
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00F009C6
                          • _wcslen.LIBCMT ref: 00F00A01
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F00A54
                          • _wcslen.LIBCMT ref: 00F00A8A
                          • _wcslen.LIBCMT ref: 00F00B06
                          • _wcslen.LIBCMT ref: 00F00B81
                            • Part of subcall function 00E8F9F2: _wcslen.LIBCMT ref: 00E8F9FD
                            • Part of subcall function 00ED2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00ED2BFA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$MessageSend$BuffCharUpper
                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                          • API String ID: 1103490817-4258414348
                          • Opcode ID: 6acdaad7dd0b2f07931b60923d10d2b54a547a0011c0bd55e017eaa67192806f
                          • Instruction ID: 69708099391e1a54b9dff471ea419bd07a48acac831723ec708496d95a3a8033
                          • Opcode Fuzzy Hash: 6acdaad7dd0b2f07931b60923d10d2b54a547a0011c0bd55e017eaa67192806f
                          • Instruction Fuzzy Hash: 41E18E716083019FC714EF24C450A2AB7E2FF99324F14895DF899AB3A2DB31ED45EB91
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$BuffCharUpper
                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                          • API String ID: 1256254125-909552448
                          • Opcode ID: 2924a8d8e767a6ae2a428c1942b4e7129347d981e2c3b20e94ddc5949d118f7d
                          • Instruction ID: 47969c470fb74d295bc30687019567e9a364aa1cd1e7a65c6e2655324806b93d
                          • Opcode Fuzzy Hash: 2924a8d8e767a6ae2a428c1942b4e7129347d981e2c3b20e94ddc5949d118f7d
                          • Instruction Fuzzy Hash: 1E71F47260052E8BCB20EE7CCA515FA3391AFA0768F352524FE5AB7285E631DD45D3A0
                          APIs
                          • _wcslen.LIBCMT ref: 00F0835A
                          • _wcslen.LIBCMT ref: 00F0836E
                          • _wcslen.LIBCMT ref: 00F08391
                          • _wcslen.LIBCMT ref: 00F083B4
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F083F2
                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00F0361A,?), ref: 00F0844E
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F08487
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F084CA
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F08501
                          • FreeLibrary.KERNEL32(?), ref: 00F0850D
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F0851D
                          • DestroyIcon.USER32(?), ref: 00F0852C
                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F08549
                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F08555
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                          • String ID: .dll$.exe$.icl
                          • API String ID: 799131459-1154884017
                          • Opcode ID: 49b456f50860e9771ad17add572492a351c96631814fff2ddec730cc52ee3470
                          • Instruction ID: 523e08d736c119909fe9b83efdfcb36e545880dc51ac78be38a34bc6f0416d66
                          • Opcode Fuzzy Hash: 49b456f50860e9771ad17add572492a351c96631814fff2ddec730cc52ee3470
                          • Instruction Fuzzy Hash: B861C0B1900219BAEB14DF64CC85FBE77A8BF04B61F104609F855E61D1DB74A982EBA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                          • API String ID: 0-1645009161
                          • Opcode ID: 446f29fd94b4f53a82204c52cbe6c0efe211f09fb3acc09bce97c070cd39353f
                          • Instruction ID: 7c795b7a1f1a24990ba8018cb5880f644392c9b1d780c351490d88863a8a019b
                          • Opcode Fuzzy Hash: 446f29fd94b4f53a82204c52cbe6c0efe211f09fb3acc09bce97c070cd39353f
                          • Instruction Fuzzy Hash: F481F4B1604605BBDB25AF64CC82FEF37E8AF15300F04A025F94CBA196EB74D911D7A2
                          APIs
                          • CharLowerBuffW.USER32(?,?), ref: 00EE3EF8
                          • _wcslen.LIBCMT ref: 00EE3F03
                          • _wcslen.LIBCMT ref: 00EE3F5A
                          • _wcslen.LIBCMT ref: 00EE3F98
                          • GetDriveTypeW.KERNEL32(?), ref: 00EE3FD6
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EE401E
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EE4059
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EE4087
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 1839972693-4113822522
                          • Opcode ID: ee13a1fe3389acd2f79ffcdc14c493fd19560cc8fbc3cb9ccde7cb886a8555b7
                          • Instruction ID: 51bcb06af0c60ce945840361acd5388407f428335cb86a9cfc147c7b74af5bda
                          • Opcode Fuzzy Hash: ee13a1fe3389acd2f79ffcdc14c493fd19560cc8fbc3cb9ccde7cb886a8555b7
                          • Instruction Fuzzy Hash: F671D2716042059FC710EF35C8818AAB7F4EF94768F10A92DF895A7292EB30DE45CB92
                          APIs
                          • LoadIconW.USER32(00000063), ref: 00ED5A2E
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00ED5A40
                          • SetWindowTextW.USER32(?,?), ref: 00ED5A57
                          • GetDlgItem.USER32(?,000003EA), ref: 00ED5A6C
                          • SetWindowTextW.USER32(00000000,?), ref: 00ED5A72
                          • GetDlgItem.USER32(?,000003E9), ref: 00ED5A82
                          • SetWindowTextW.USER32(00000000,?), ref: 00ED5A88
                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00ED5AA9
                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00ED5AC3
                          • GetWindowRect.USER32(?,?), ref: 00ED5ACC
                          • _wcslen.LIBCMT ref: 00ED5B33
                          • SetWindowTextW.USER32(?,?), ref: 00ED5B6F
                          • GetDesktopWindow.USER32 ref: 00ED5B75
                          • GetWindowRect.USER32(00000000), ref: 00ED5B7C
                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00ED5BD3
                          • GetClientRect.USER32(?,?), ref: 00ED5BE0
                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00ED5C05
                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00ED5C2F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                          • String ID:
                          • API String ID: 895679908-0
                          • Opcode ID: d76b64f91c4d3f18cf299a08134722f06e8018d620de7eff0d2dad6d1609bc38
                          • Instruction ID: c0cd4ad1d3bc4c9b1a979041b00930a267511f2ca01954162c4fc6d267098659
                          • Opcode Fuzzy Hash: d76b64f91c4d3f18cf299a08134722f06e8018d620de7eff0d2dad6d1609bc38
                          • Instruction Fuzzy Hash: B5718F32900B099FDB20DFA8CE45AAEBBF5FF48704F10561AE546B26A0D771E941DB50
                          APIs
                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00E900C6
                            • Part of subcall function 00E900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00F4070C,00000FA0,D07A849A,?,?,?,?,00EB23B3,000000FF), ref: 00E9011C
                            • Part of subcall function 00E900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00EB23B3,000000FF), ref: 00E90127
                            • Part of subcall function 00E900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00EB23B3,000000FF), ref: 00E90138
                            • Part of subcall function 00E900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00E9014E
                            • Part of subcall function 00E900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00E9015C
                            • Part of subcall function 00E900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00E9016A
                            • Part of subcall function 00E900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E90195
                            • Part of subcall function 00E900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E901A0
                          • ___scrt_fastfail.LIBCMT ref: 00E900E7
                            • Part of subcall function 00E900A3: __onexit.LIBCMT ref: 00E900A9
                          Strings
                          • kernel32.dll, xrefs: 00E90133
                          • InitializeConditionVariable, xrefs: 00E90148
                          • SleepConditionVariableCS, xrefs: 00E90154
                          • WakeAllConditionVariable, xrefs: 00E90162
                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00E90122
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                          • API String ID: 66158676-1714406822
                          • Opcode ID: 682ab82f756fd5f212da33e892936d57aa1544863b71bd88b46533b52c579151
                          • Instruction ID: e8fadfb47dab93d2ad8f6a679c64717b6fc8530f3125ba803cef55e7ab312b48
                          • Opcode Fuzzy Hash: 682ab82f756fd5f212da33e892936d57aa1544863b71bd88b46533b52c579151
                          • Instruction Fuzzy Hash: 17212932A46715AFDB206BA4AC09B6A77D4EB05B61F40122AFD05F36D1DF749800AA92
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 176396367-1603158881
                          • Opcode ID: ebdee061a7d224e92522921af17d96ad0a103b01ba50406c44d93464a0b5422a
                          • Instruction ID: c1963f0df37bde9554e55d2074bd4217b7d96b2753a52518d7aa97205f978132
                          • Opcode Fuzzy Hash: ebdee061a7d224e92522921af17d96ad0a103b01ba50406c44d93464a0b5422a
                          • Instruction Fuzzy Hash: EAE1F532A00516ABCF189FB4C4516EDFBB0FF94714F14A12BE466B7350DB30AE469791
                          APIs
                          • CharLowerBuffW.USER32(00000000,00000000,00F0CC08), ref: 00EE4527
                          • _wcslen.LIBCMT ref: 00EE453B
                          • _wcslen.LIBCMT ref: 00EE4599
                          • _wcslen.LIBCMT ref: 00EE45F4
                          • _wcslen.LIBCMT ref: 00EE463F
                          • _wcslen.LIBCMT ref: 00EE46A7
                            • Part of subcall function 00E8F9F2: _wcslen.LIBCMT ref: 00E8F9FD
                          • GetDriveTypeW.KERNEL32(?,00F36BF0,00000061), ref: 00EE4743
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$BuffCharDriveLowerType
                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 2055661098-1000479233
                          • Opcode ID: e5d01ab6c93b5ff578c27263ccbde5e8353a7f9cdb69730cfbdcbdf21e4a5207
                          • Instruction ID: 6c69e3d7a15a38c8cb1cf388687fb16d6489179c8a1ad99b30f7e0c229a56729
                          • Opcode Fuzzy Hash: e5d01ab6c93b5ff578c27263ccbde5e8353a7f9cdb69730cfbdcbdf21e4a5207
                          • Instruction Fuzzy Hash: 67B123B16083469FC710DF29C890A6AB7E5BFE5724F10A91DF09AE72D1D730D844CB92
                          APIs
                          • _wcslen.LIBCMT ref: 00EFB198
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EFB1B0
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EFB1D4
                          • _wcslen.LIBCMT ref: 00EFB200
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EFB214
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EFB236
                          • _wcslen.LIBCMT ref: 00EFB332
                            • Part of subcall function 00EE05A7: GetStdHandle.KERNEL32(000000F6), ref: 00EE05C6
                          • _wcslen.LIBCMT ref: 00EFB34B
                          • _wcslen.LIBCMT ref: 00EFB366
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EFB3B6
                          • GetLastError.KERNEL32(00000000), ref: 00EFB407
                          • CloseHandle.KERNEL32(?), ref: 00EFB439
                          • CloseHandle.KERNEL32(00000000), ref: 00EFB44A
                          • CloseHandle.KERNEL32(00000000), ref: 00EFB45C
                          • CloseHandle.KERNEL32(00000000), ref: 00EFB46E
                          • CloseHandle.KERNEL32(?), ref: 00EFB4E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                          • String ID:
                          • API String ID: 2178637699-0
                          • Opcode ID: 47b8de0962c48db7a2932522b34918f87ce6a0e26777c3d09d0800aeb5ab9acd
                          • Instruction ID: d26bb3d83af254cfaecb8ef5b6111c4d12f452936effaf2cd12b7b1c0191e922
                          • Opcode Fuzzy Hash: 47b8de0962c48db7a2932522b34918f87ce6a0e26777c3d09d0800aeb5ab9acd
                          • Instruction Fuzzy Hash: D9F1BC31608344DFCB14EF24C881B6EBBE5AF85714F18955DF999AB2A2DB31EC40CB52
                          APIs
                          • GetMenuItemCount.USER32(00F41990), ref: 00EB2F8D
                          • GetMenuItemCount.USER32(00F41990), ref: 00EB303D
                          • GetCursorPos.USER32(?), ref: 00EB3081
                          • SetForegroundWindow.USER32(00000000), ref: 00EB308A
                          • TrackPopupMenuEx.USER32(00F41990,00000000,?,00000000,00000000,00000000), ref: 00EB309D
                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00EB30A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                          • String ID: 0
                          • API String ID: 36266755-4108050209
                          • Opcode ID: 9bb79562aa04cb4396c340482595999430b0f429b3c30a5c4661b01a7e368cca
                          • Instruction ID: e00e8cd04f9967933a27793289396b9a239b92e12c0ee2a7e6425ac1b312fbfa
                          • Opcode Fuzzy Hash: 9bb79562aa04cb4396c340482595999430b0f429b3c30a5c4661b01a7e368cca
                          • Instruction Fuzzy Hash: EE71F770640205BEEB219F25CC49FEBBFA8FF05368F205216F6187A1E1C7B1A910E790
                          APIs
                          • DestroyWindow.USER32(?,?), ref: 00F06DEB
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F06E5F
                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F06E81
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F06E94
                          • DestroyWindow.USER32(?), ref: 00F06EB5
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E70000,00000000), ref: 00F06EE4
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F06EFD
                          • GetDesktopWindow.USER32 ref: 00F06F16
                          • GetWindowRect.USER32(00000000), ref: 00F06F1D
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F06F35
                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F06F4D
                            • Part of subcall function 00E89944: GetWindowLongW.USER32(?,000000EB), ref: 00E89952
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                          • String ID: 0$tooltips_class32
                          • API String ID: 2429346358-3619404913
                          • Opcode ID: fde794aedc8b9e4a0dd73e4906ff30f21d0addeb38856fde36d1678a8cee51bf
                          • Instruction ID: ebc869a572032623a6d8271e3aa11f555c843710aef04e732d09f96c21ecf1a3
                          • Opcode Fuzzy Hash: fde794aedc8b9e4a0dd73e4906ff30f21d0addeb38856fde36d1678a8cee51bf
                          • Instruction Fuzzy Hash: EB719674500345AFEB21CF18DC44BAABBE9FB89314F04091DFA89C72A1D731E956EB12
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • DragQueryPoint.SHELL32(?,?), ref: 00F09147
                            • Part of subcall function 00F07674: ClientToScreen.USER32(?,?), ref: 00F0769A
                            • Part of subcall function 00F07674: GetWindowRect.USER32(?,?), ref: 00F07710
                            • Part of subcall function 00F07674: PtInRect.USER32(?,?,00F08B89), ref: 00F07720
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00F091B0
                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F091BB
                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F091DE
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F09225
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00F0923E
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00F09255
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00F09277
                          • DragFinish.SHELL32(?), ref: 00F0927E
                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F09371
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                          • API String ID: 221274066-3440237614
                          • Opcode ID: bf226936ba1c0608cea698cede36e5aa228fce7278a77f31380c4b6249383c50
                          • Instruction ID: ac9bff170d3d16ba2291849430b490b5ffaf8c754bff9fb52a435edbe59d29b8
                          • Opcode Fuzzy Hash: bf226936ba1c0608cea698cede36e5aa228fce7278a77f31380c4b6249383c50
                          • Instruction Fuzzy Hash: 23616971108304AFD711EF60DC85DAFBBE8FF89350F104A2DF995921A1DB709A49DB92
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EEC4B0
                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EEC4C3
                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EEC4D7
                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00EEC4F0
                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00EEC533
                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00EEC549
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EEC554
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EEC584
                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EEC5DC
                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EEC5F0
                          • InternetCloseHandle.WININET(00000000), ref: 00EEC5FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                          • String ID:
                          • API String ID: 3800310941-3916222277
                          • Opcode ID: c3b46393f47bb63c8c0126a79a41cb03e9df00fba00510bd15f590c200311b7e
                          • Instruction ID: 2528cde9c474dc7a793d4df9123b3ed3365de33ac12f153a907272151dac46ad
                          • Opcode Fuzzy Hash: c3b46393f47bb63c8c0126a79a41cb03e9df00fba00510bd15f590c200311b7e
                          • Instruction Fuzzy Hash: AA516DB050034DBFDB219F62C948AAB7BFCFF08748F10551AF945A6250DB30E949EBA0
                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00F08592
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00F085A2
                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00F085AD
                          • CloseHandle.KERNEL32(00000000), ref: 00F085BA
                          • GlobalLock.KERNEL32(00000000), ref: 00F085C8
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00F085D7
                          • GlobalUnlock.KERNEL32(00000000), ref: 00F085E0
                          • CloseHandle.KERNEL32(00000000), ref: 00F085E7
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00F085F8
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F0FC38,?), ref: 00F08611
                          • GlobalFree.KERNEL32(00000000), ref: 00F08621
                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00F08641
                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00F08671
                          • DeleteObject.GDI32(00000000), ref: 00F08699
                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F086AF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                          • String ID:
                          • API String ID: 3840717409-0
                          • Opcode ID: 7bb7d8f05117f375d2a5c5293d68889379b2db2fd0d3c72ad3d09b21201b3404
                          • Instruction ID: 42606cfd3fbe0f8716da180340a97439cc41c5058b159a4167685aacb0813816
                          • Opcode Fuzzy Hash: 7bb7d8f05117f375d2a5c5293d68889379b2db2fd0d3c72ad3d09b21201b3404
                          • Instruction Fuzzy Hash: 5C414B75600208EFDB119FA5CC88EAA7BB9FF89761F148158F945E72A0DB319D01EB60
                          APIs
                          • VariantInit.OLEAUT32(00000000), ref: 00EE1502
                          • VariantCopy.OLEAUT32(?,?), ref: 00EE150B
                          • VariantClear.OLEAUT32(?), ref: 00EE1517
                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00EE15FB
                          • VarR8FromDec.OLEAUT32(?,?), ref: 00EE1657
                          • VariantInit.OLEAUT32(?), ref: 00EE1708
                          • SysFreeString.OLEAUT32(?), ref: 00EE178C
                          • VariantClear.OLEAUT32(?), ref: 00EE17D8
                          • VariantClear.OLEAUT32(?), ref: 00EE17E7
                          • VariantInit.OLEAUT32(00000000), ref: 00EE1823
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                          • API String ID: 1234038744-3931177956
                          • Opcode ID: 5f7fe7c087843112bd4d4ac5edbe156e626f3e3c921ff67cd4e62184b019ab05
                          • Instruction ID: 85f326cf05ee943fb5e7308b331948bb5b476fe4fea19e8f0f1b85667f379742
                          • Opcode Fuzzy Hash: 5f7fe7c087843112bd4d4ac5edbe156e626f3e3c921ff67cd4e62184b019ab05
                          • Instruction Fuzzy Hash: 80D10131A00149DBDB10EF66D884BBDB7F5BF45700F24919AE84ABB185DB30DC88DB92
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00EFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EFB6AE,?,?), ref: 00EFC9B5
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFC9F1
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA68
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA9E
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EFB6F4
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EFB772
                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00EFB80A
                          • RegCloseKey.ADVAPI32(?), ref: 00EFB87E
                          • RegCloseKey.ADVAPI32(?), ref: 00EFB89C
                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00EFB8F2
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EFB904
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EFB922
                          • FreeLibrary.KERNEL32(00000000), ref: 00EFB983
                          • RegCloseKey.ADVAPI32(00000000), ref: 00EFB994
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 146587525-4033151799
                          • Opcode ID: 405ef54c0dbc352db1fc9ba834da3ccb3413f15fde1b05a1a381fbb01f451634
                          • Instruction ID: df8f0c22d7f1cb6f000aa2f140a9cc5062676ad36140061abfda81a9e81504b4
                          • Opcode Fuzzy Hash: 405ef54c0dbc352db1fc9ba834da3ccb3413f15fde1b05a1a381fbb01f451634
                          • Instruction Fuzzy Hash: 78C19F30204245AFD714DF14C495F2ABBE5BF84308F24955CF59AAB2A2CB71ED45CB91
                          APIs
                          • GetDC.USER32(00000000), ref: 00EF25D8
                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00EF25E8
                          • CreateCompatibleDC.GDI32(?), ref: 00EF25F4
                          • SelectObject.GDI32(00000000,?), ref: 00EF2601
                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00EF266D
                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00EF26AC
                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00EF26D0
                          • SelectObject.GDI32(?,?), ref: 00EF26D8
                          • DeleteObject.GDI32(?), ref: 00EF26E1
                          • DeleteDC.GDI32(?), ref: 00EF26E8
                          • ReleaseDC.USER32(00000000,?), ref: 00EF26F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                          • String ID: (
                          • API String ID: 2598888154-3887548279
                          • Opcode ID: 274f1d08b8522ea220204b8c2d3ad49a354a74fa88be16b53c5ace01a87c636c
                          • Instruction ID: 118da2dd2128a19aedae1eaddfd44d677e1334499f3ff4fd46522235b89183ab
                          • Opcode Fuzzy Hash: 274f1d08b8522ea220204b8c2d3ad49a354a74fa88be16b53c5ace01a87c636c
                          • Instruction Fuzzy Hash: E361C275D00219EFCF14CFA4D884AAEBBF5FF48310F20852AEA59A7250D774A951DF90
                          APIs
                          • ___free_lconv_mon.LIBCMT ref: 00EADAA1
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD659
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD66B
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD67D
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD68F
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6A1
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6B3
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6C5
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6D7
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6E9
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD6FB
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD70D
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD71F
                            • Part of subcall function 00EAD63C: _free.LIBCMT ref: 00EAD731
                          • _free.LIBCMT ref: 00EADA96
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • _free.LIBCMT ref: 00EADAB8
                          • _free.LIBCMT ref: 00EADACD
                          • _free.LIBCMT ref: 00EADAD8
                          • _free.LIBCMT ref: 00EADAFA
                          • _free.LIBCMT ref: 00EADB0D
                          • _free.LIBCMT ref: 00EADB1B
                          • _free.LIBCMT ref: 00EADB26
                          • _free.LIBCMT ref: 00EADB5E
                          • _free.LIBCMT ref: 00EADB65
                          • _free.LIBCMT ref: 00EADB82
                          • _free.LIBCMT ref: 00EADB9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                          • String ID:
                          • API String ID: 161543041-0
                          • Opcode ID: 6a8982af60e760f5b7e6dabfc903cda777670aaa649f1174c77ec25ab763856f
                          • Instruction ID: b6c5656cdfb70da12d128b78e1c98a9807cdd05fb49510096005f178cf68f46b
                          • Opcode Fuzzy Hash: 6a8982af60e760f5b7e6dabfc903cda777670aaa649f1174c77ec25ab763856f
                          • Instruction Fuzzy Hash: 06315A316086049FEB61AA38EC45B9B7BE8FF4A714F116419E54AFF591DA30BC408721
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 00ED369C
                          • _wcslen.LIBCMT ref: 00ED36A7
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00ED3797
                          • GetClassNameW.USER32(?,?,00000400), ref: 00ED380C
                          • GetDlgCtrlID.USER32(?), ref: 00ED385D
                          • GetWindowRect.USER32(?,?), ref: 00ED3882
                          • GetParent.USER32(?), ref: 00ED38A0
                          • ScreenToClient.USER32(00000000), ref: 00ED38A7
                          • GetClassNameW.USER32(?,?,00000100), ref: 00ED3921
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00ED395D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                          • String ID: %s%u
                          • API String ID: 4010501982-679674701
                          • Opcode ID: 1fcfecd4465fc49de93dbe1860dd97a865413b46657ce529301cbef53cc05905
                          • Instruction ID: 2f9d7f43fa6e2c0f21476117e2f89349320c51f13eda7240e989bf12e780d976
                          • Opcode Fuzzy Hash: 1fcfecd4465fc49de93dbe1860dd97a865413b46657ce529301cbef53cc05905
                          • Instruction Fuzzy Hash: F591A971204606AFD719DF34C895FAAF7E8FF44354F00562AF999E2290D730EA46CB92
                          APIs
                          • GetClassNameW.USER32(?,?,00000400), ref: 00ED4994
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00ED49DA
                          • _wcslen.LIBCMT ref: 00ED49EB
                          • CharUpperBuffW.USER32(?,00000000), ref: 00ED49F7
                          • _wcsstr.LIBVCRUNTIME ref: 00ED4A2C
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00ED4A64
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00ED4A9D
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00ED4AE6
                          • GetClassNameW.USER32(?,?,00000400), ref: 00ED4B20
                          • GetWindowRect.USER32(?,?), ref: 00ED4B8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                          • String ID: ThumbnailClass
                          • API String ID: 1311036022-1241985126
                          • Opcode ID: cd0a95d9e224c634eb30978101b5f28d89ccb452fd9ca5d0ab86499e7f748202
                          • Instruction ID: 358a4541b31f2aa7f6ae464ec19a03487621ff8669b9bc189d9136dcacf3aff4
                          • Opcode Fuzzy Hash: cd0a95d9e224c634eb30978101b5f28d89ccb452fd9ca5d0ab86499e7f748202
                          • Instruction Fuzzy Hash: 1191E4B10042059FDB15CF10C985BAA77E8FFA4318F04656BFD85AA2D6DB30DD46CBA1
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00EFCC64
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00EFCC8D
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00EFCD48
                            • Part of subcall function 00EFCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00EFCCAA
                            • Part of subcall function 00EFCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00EFCCBD
                            • Part of subcall function 00EFCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EFCCCF
                            • Part of subcall function 00EFCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00EFCD05
                            • Part of subcall function 00EFCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00EFCD28
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EFCCF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2734957052-4033151799
                          • Opcode ID: 2b7e2226ff285e0f6d3dc070c19028c0334946a2b350f0ad09e0f79e2c3b0522
                          • Instruction ID: 2ab2f327e7b373783a83bad91c465dc5cb195f9630d6525aac26a810cef9c01a
                          • Opcode Fuzzy Hash: 2b7e2226ff285e0f6d3dc070c19028c0334946a2b350f0ad09e0f79e2c3b0522
                          • Instruction Fuzzy Hash: 0C316D71A0112DBBDB209B54DD88EFFBB7CEF45754F204265BA06E2240DB349A45EAE0
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EE3D40
                          • _wcslen.LIBCMT ref: 00EE3D6D
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EE3D9D
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00EE3DBE
                          • RemoveDirectoryW.KERNEL32(?), ref: 00EE3DCE
                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00EE3E55
                          • CloseHandle.KERNEL32(00000000), ref: 00EE3E60
                          • CloseHandle.KERNEL32(00000000), ref: 00EE3E6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                          • String ID: :$\$\??\%s
                          • API String ID: 1149970189-3457252023
                          • Opcode ID: a1061ad93ebc83fee533dca4a7dbcdd845a36fa30ba2f4981f1457c369d88f54
                          • Instruction ID: b917e45f3445fea09a5576e32ae9d21010de1edd47b68df3c7dd47e0d3659d4d
                          • Opcode Fuzzy Hash: a1061ad93ebc83fee533dca4a7dbcdd845a36fa30ba2f4981f1457c369d88f54
                          • Instruction Fuzzy Hash: 8D31A17190024DABDB219BA1DC49FEB37BDFF88714F5051A5F509E6060E77097448B64
                          APIs
                          • timeGetTime.WINMM ref: 00EDE6B4
                            • Part of subcall function 00E8E551: timeGetTime.WINMM(?,?,00EDE6D4), ref: 00E8E555
                          • Sleep.KERNEL32(0000000A), ref: 00EDE6E1
                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00EDE705
                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00EDE727
                          • SetActiveWindow.USER32 ref: 00EDE746
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00EDE754
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00EDE773
                          • Sleep.KERNEL32(000000FA), ref: 00EDE77E
                          • IsWindow.USER32 ref: 00EDE78A
                          • EndDialog.USER32(00000000), ref: 00EDE79B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                          • String ID: BUTTON
                          • API String ID: 1194449130-3405671355
                          • Opcode ID: b9f9cbf03b4c52d9cf70ac6f1eee6b63e168053040f23be1726112a3cbb24d43
                          • Instruction ID: 75025c7c626b4f5dafcc4f7a29b2b068b0d78786541d8c42d65f83e1d19eef38
                          • Opcode Fuzzy Hash: b9f9cbf03b4c52d9cf70ac6f1eee6b63e168053040f23be1726112a3cbb24d43
                          • Instruction Fuzzy Hash: 7621C67420020CAFEB506F70EC8DA363B69F765348F402536FC19A53A1DB72AC01BB65
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00EDEA5D
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00EDEA73
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EDEA84
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00EDEA96
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00EDEAA7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: SendString$_wcslen
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 2420728520-1007645807
                          • Opcode ID: aeec94f55455440f4f41960e64b7de0cf36ac7a582684ac6d3b5941f237ff21a
                          • Instruction ID: ccb331e27c6277cb6352329f0a8951cea7529dc7a807b3a1cf68979a0a8cf42a
                          • Opcode Fuzzy Hash: aeec94f55455440f4f41960e64b7de0cf36ac7a582684ac6d3b5941f237ff21a
                          • Instruction Fuzzy Hash: F111C130A9021A79D720B3A1DC4AEFF6ABCEFD1B10F00542AB415F61D1EA704905C5B1
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 00ED5CE2
                          • GetWindowRect.USER32(00000000,?), ref: 00ED5CFB
                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00ED5D59
                          • GetDlgItem.USER32(?,00000002), ref: 00ED5D69
                          • GetWindowRect.USER32(00000000,?), ref: 00ED5D7B
                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00ED5DCF
                          • GetDlgItem.USER32(?,000003E9), ref: 00ED5DDD
                          • GetWindowRect.USER32(00000000,?), ref: 00ED5DEF
                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00ED5E31
                          • GetDlgItem.USER32(?,000003EA), ref: 00ED5E44
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00ED5E5A
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00ED5E67
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: 2f710854aaa40c9a220f16484e6780a31a209e0c50f93c84f021c761d0f345e6
                          • Instruction ID: 24e323dc4fdeb0ec41a0d8f205b70f2089d87ffebc7a7597fde8eda839f7204f
                          • Opcode Fuzzy Hash: 2f710854aaa40c9a220f16484e6780a31a209e0c50f93c84f021c761d0f345e6
                          • Instruction Fuzzy Hash: B6512171B00609AFDF18DF68DD89AAEBBB5FB48300F149229F915E7290D7709E01CB60
                          APIs
                            • Part of subcall function 00E88F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E88BE8,?,00000000,?,?,?,?,00E88BBA,00000000,?), ref: 00E88FC5
                          • DestroyWindow.USER32(?), ref: 00E88C81
                          • KillTimer.USER32(00000000,?,?,?,?,00E88BBA,00000000,?), ref: 00E88D1B
                          • DestroyAcceleratorTable.USER32(00000000), ref: 00EC6973
                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00E88BBA,00000000,?), ref: 00EC69A1
                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00E88BBA,00000000,?), ref: 00EC69B8
                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00E88BBA,00000000), ref: 00EC69D4
                          • DeleteObject.GDI32(00000000), ref: 00EC69E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                          • String ID:
                          • API String ID: 641708696-0
                          • Opcode ID: 3196be54b4c114fa267aa2fd3b32dea3881acd0397ce5baeea292ad6bdbff44a
                          • Instruction ID: 4492c51e188907c72ae5b0c87789633f9d3ad18f1732251f942fa57fef115d6e
                          • Opcode Fuzzy Hash: 3196be54b4c114fa267aa2fd3b32dea3881acd0397ce5baeea292ad6bdbff44a
                          • Instruction Fuzzy Hash: D461C034101608DFDB21AF14DB48B26B7F1FB5131AF54651DE84AA75A4CB32ACC1EF91
                          APIs
                            • Part of subcall function 00E89944: GetWindowLongW.USER32(?,000000EB), ref: 00E89952
                          • GetSysColor.USER32(0000000F), ref: 00E89862
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ColorLongWindow
                          • String ID:
                          • API String ID: 259745315-0
                          • Opcode ID: bba40956690e4a5451a85b64757fb2f18cbd9932b4612e20efb212af5e29947a
                          • Instruction ID: 831feeb3e26728a0b64a13b37267b7b6b0d7f7f9f07ddc912b4c57ef417e3e9a
                          • Opcode Fuzzy Hash: bba40956690e4a5451a85b64757fb2f18cbd9932b4612e20efb212af5e29947a
                          • Instruction Fuzzy Hash: 1841C631504644AFDB246F38DC84BB93BA5FB46334F185619F9BAA71E2C7319C42EB50
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00EBF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00ED9717
                          • LoadStringW.USER32(00000000,?,00EBF7F8,00000001), ref: 00ED9720
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00EBF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00ED9742
                          • LoadStringW.USER32(00000000,?,00EBF7F8,00000001), ref: 00ED9745
                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00ED9866
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wcslen
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                          • API String ID: 747408836-2268648507
                          • Opcode ID: ad3a0204a22a393267d90aef1cd845ff70425726b738b588a6744d8032d6f1e9
                          • Instruction ID: e24588704413bb5278f5a55249c736ba35274a776a4c512a251f4081b7acbc35
                          • Opcode Fuzzy Hash: ad3a0204a22a393267d90aef1cd845ff70425726b738b588a6744d8032d6f1e9
                          • Instruction Fuzzy Hash: DD415D72800209BADF14EBE0DD42DEEB3B8EF55340F50A025F609B2192EA356F49DB61
                          APIs
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00ED07A2
                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00ED07BE
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00ED07DA
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00ED0804
                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00ED082C
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00ED0837
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00ED083C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                          • API String ID: 323675364-22481851
                          • Opcode ID: 15b120dd0c71e6c2cfaddd90dde08e49c265f5bd0cbc2386cab2fc533c6b2b34
                          • Instruction ID: 76eaa0354ea11d0f272ac50483f2c5d67537f5551d1bf6dd91f7a8645fd169ec
                          • Opcode Fuzzy Hash: 15b120dd0c71e6c2cfaddd90dde08e49c265f5bd0cbc2386cab2fc533c6b2b34
                          • Instruction Fuzzy Hash: 63413A72C10229ABDF15EBA4DC85DEDB7B8FF44754F04912AE905B71A1EB309E04DB90
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00EF3C5C
                          • CoInitialize.OLE32(00000000), ref: 00EF3C8A
                          • CoUninitialize.OLE32 ref: 00EF3C94
                          • _wcslen.LIBCMT ref: 00EF3D2D
                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00EF3DB1
                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00EF3ED5
                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00EF3F0E
                          • CoGetObject.OLE32(?,00000000,00F0FB98,?), ref: 00EF3F2D
                          • SetErrorMode.KERNEL32(00000000), ref: 00EF3F40
                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00EF3FC4
                          • VariantClear.OLEAUT32(?), ref: 00EF3FD8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                          • String ID:
                          • API String ID: 429561992-0
                          • Opcode ID: 649e3d2fd536dc1e5c996e4ee6aba0cc955741ada6dbe068b557fb1975a3c553
                          • Instruction ID: 0ba4231e786afc80ac34ee451f964ee97752ee158005d419d6b53500ed4bb7cb
                          • Opcode Fuzzy Hash: 649e3d2fd536dc1e5c996e4ee6aba0cc955741ada6dbe068b557fb1975a3c553
                          • Instruction Fuzzy Hash: 66C168716083099FD700DF68C88496BB7E9FF89748F10591DFA8AAB251D731EE05CB92
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00EE7AF3
                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00EE7B8F
                          • SHGetDesktopFolder.SHELL32(?), ref: 00EE7BA3
                          • CoCreateInstance.OLE32(00F0FD08,00000000,00000001,00F36E6C,?), ref: 00EE7BEF
                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00EE7C74
                          • CoTaskMemFree.OLE32(?,?), ref: 00EE7CCC
                          • SHBrowseForFolderW.SHELL32(?), ref: 00EE7D57
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00EE7D7A
                          • CoTaskMemFree.OLE32(00000000), ref: 00EE7D81
                          • CoTaskMemFree.OLE32(00000000), ref: 00EE7DD6
                          • CoUninitialize.OLE32 ref: 00EE7DDC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                          • String ID:
                          • API String ID: 2762341140-0
                          • Opcode ID: 5bbf874feab89518e3b6d1cf26f7d022ee27e279c5dda4154f43e8488efc8496
                          • Instruction ID: 1a116b1ae984be51df79e66129d9987b2ffdeebc6bb7272b46b394e41c852d53
                          • Opcode Fuzzy Hash: 5bbf874feab89518e3b6d1cf26f7d022ee27e279c5dda4154f43e8488efc8496
                          • Instruction Fuzzy Hash: 73C14975A04149AFCB14DFA5C884DAEBBF9FF48304B149598E85AEB361D730EE41CB90
                          APIs
                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F05504
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F05515
                          • CharNextW.USER32(00000158), ref: 00F05544
                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F05585
                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F0559B
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F055AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$CharNext
                          • String ID:
                          • API String ID: 1350042424-0
                          • Opcode ID: 7032ad74a2cead77f6e2c9b47dd0d95484cdb8c6ad44ddf1c24e88c888dae6db
                          • Instruction ID: a61b40cfc78599b8a508f8e464c83f7560553fe96d91c4e5745ce014d810bdf2
                          • Opcode Fuzzy Hash: 7032ad74a2cead77f6e2c9b47dd0d95484cdb8c6ad44ddf1c24e88c888dae6db
                          • Instruction Fuzzy Hash: A5615939900608AADF20DF54CC94AFF7BB9FB09B24F144145F925AA2D0D7B49A81FF60
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00ECFAAF
                          • SafeArrayAllocData.OLEAUT32(?), ref: 00ECFB08
                          • VariantInit.OLEAUT32(?), ref: 00ECFB1A
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00ECFB3A
                          • VariantCopy.OLEAUT32(?,?), ref: 00ECFB8D
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00ECFBA1
                          • VariantClear.OLEAUT32(?), ref: 00ECFBB6
                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00ECFBC3
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00ECFBCC
                          • VariantClear.OLEAUT32(?), ref: 00ECFBDE
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00ECFBE9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: 46ae48fa6f6b3441f4a7b32984853641d803e038e52b924601c6573ac3622f55
                          • Instruction ID: b9bec7d25ca1d2dcc599c55126c4aef218285c5ec45d5fb6a533ec44f87777d3
                          • Opcode Fuzzy Hash: 46ae48fa6f6b3441f4a7b32984853641d803e038e52b924601c6573ac3622f55
                          • Instruction Fuzzy Hash: 8B413E35A002199FCF04DF64C964EAEBBBAFF48344F109169E945A7261CB31AD46CBA0
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00ED9CA1
                          • GetAsyncKeyState.USER32(000000A0), ref: 00ED9D22
                          • GetKeyState.USER32(000000A0), ref: 00ED9D3D
                          • GetAsyncKeyState.USER32(000000A1), ref: 00ED9D57
                          • GetKeyState.USER32(000000A1), ref: 00ED9D6C
                          • GetAsyncKeyState.USER32(00000011), ref: 00ED9D84
                          • GetKeyState.USER32(00000011), ref: 00ED9D96
                          • GetAsyncKeyState.USER32(00000012), ref: 00ED9DAE
                          • GetKeyState.USER32(00000012), ref: 00ED9DC0
                          • GetAsyncKeyState.USER32(0000005B), ref: 00ED9DD8
                          • GetKeyState.USER32(0000005B), ref: 00ED9DEA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: d75ccd758d0817e6aa468d35eddb9cf01e1b8b0d98c8316fd9f8b4302a6f418b
                          • Instruction ID: 848507aecdc148cc61a21ec4ed4a02f20a9c63851070404080147297c189ad2e
                          • Opcode Fuzzy Hash: d75ccd758d0817e6aa468d35eddb9cf01e1b8b0d98c8316fd9f8b4302a6f418b
                          • Instruction Fuzzy Hash: 7A4193346047C969FF3197608C043B5FEA1EB11348F08A05BDAC66A7C3EBA599C9C792
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 00EF05BC
                          • inet_addr.WSOCK32(?), ref: 00EF061C
                          • gethostbyname.WSOCK32(?), ref: 00EF0628
                          • IcmpCreateFile.IPHLPAPI ref: 00EF0636
                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00EF06C6
                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00EF06E5
                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00EF07B9
                          • WSACleanup.WSOCK32 ref: 00EF07BF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                          • String ID: Ping
                          • API String ID: 1028309954-2246546115
                          • Opcode ID: 08a53c6da7515c8650a11b5f7012650300636d93c98f524dd8d636606e37619e
                          • Instruction ID: b4a4b03df9b87d346f40e926d55937a9cb112998617014276f2c17b6cf7fbdcb
                          • Opcode Fuzzy Hash: 08a53c6da7515c8650a11b5f7012650300636d93c98f524dd8d636606e37619e
                          • Instruction Fuzzy Hash: 75919E756082059FD720EF15C888F2ABBE0BF44318F1495A9F569AB6A3C770ED41CF91
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$BuffCharLower
                          • String ID: cdecl$none$stdcall$winapi
                          • API String ID: 707087890-567219261
                          • Opcode ID: feb6e63b079e4e295410f19d326199d253ad29f2ee51c8b19e4407b67b3d4532
                          • Instruction ID: 229225eea5607d5daea79251c0130e79cc2812a23f5851106a34c26831bd52e3
                          • Opcode Fuzzy Hash: feb6e63b079e4e295410f19d326199d253ad29f2ee51c8b19e4407b67b3d4532
                          • Instruction Fuzzy Hash: 2A51C372A0051A9BCF24DF68CE518BEB3E5BF64328B205229E626F72C5DB31DD40C790
                          APIs
                          • CoInitialize.OLE32 ref: 00EF3774
                          • CoUninitialize.OLE32 ref: 00EF377F
                          • CoCreateInstance.OLE32(?,00000000,00000017,00F0FB78,?), ref: 00EF37D9
                          • IIDFromString.OLE32(?,?), ref: 00EF384C
                          • VariantInit.OLEAUT32(?), ref: 00EF38E4
                          • VariantClear.OLEAUT32(?), ref: 00EF3936
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 636576611-1287834457
                          • Opcode ID: 628f80124d02bc534b3b2f84dd8dfe5de53f073b556e93f51dd7f6f639f7ee2a
                          • Instruction ID: d8421c8b96fd7dacad4261b13669d6e92b1f380b1385fc48dc16837623091493
                          • Opcode Fuzzy Hash: 628f80124d02bc534b3b2f84dd8dfe5de53f073b556e93f51dd7f6f639f7ee2a
                          • Instruction Fuzzy Hash: 9861A2B0608305AFD314EF64C849F6BB7E4EF48754F10590AFA85A7291D774EE48CB92
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00EE33CF
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00EE33F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LoadString$_wcslen
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                          • API String ID: 4099089115-3080491070
                          • Opcode ID: ee43b703a86c54d67b9932fbd02a8d060164f528c2cfc8a29be33832b5ba51f2
                          • Instruction ID: 00404165995b4a985365a32f0b817c7a6f0ac66fc795205ce3344dd46b71b233
                          • Opcode Fuzzy Hash: ee43b703a86c54d67b9932fbd02a8d060164f528c2cfc8a29be33832b5ba51f2
                          • Instruction Fuzzy Hash: 8051AF31900209BADF15EBA0CD46EEEB3B8EF14344F209165F509B3192EB356F58EB61
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$BuffCharUpper
                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                          • API String ID: 1256254125-769500911
                          • Opcode ID: c8b3ec227862e9ce61d913d71593c1392e8fc79a0d3be48588fba968f6fe4377
                          • Instruction ID: 0d5edb8f91048af5bfd2204370d62ee972d85f431614ea85df90e69eb8cf38f1
                          • Opcode Fuzzy Hash: c8b3ec227862e9ce61d913d71593c1392e8fc79a0d3be48588fba968f6fe4377
                          • Instruction Fuzzy Hash: 6141A532A00026DACB105F7D88905BE77A5EBA5758B26522BE435EB384F731CD82C790
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00EE53A0
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00EE5416
                          • GetLastError.KERNEL32 ref: 00EE5420
                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00EE54A7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 6c47eb12c1aa66b621038a5c20ca88e491af1b6aaf3fbe93cab169d6c4f533b7
                          • Instruction ID: 6fe837fe7d35bdba974e312152a1446f60e1a9921b9c3196cfe9633e6e049e57
                          • Opcode Fuzzy Hash: 6c47eb12c1aa66b621038a5c20ca88e491af1b6aaf3fbe93cab169d6c4f533b7
                          • Instruction Fuzzy Hash: CF31AE36A006489FD710DF69C484AAABBF4FF0430DF149066E416EB392D771DD86CB91
                          APIs
                          • CreateMenu.USER32 ref: 00F03C79
                          • SetMenu.USER32(?,00000000), ref: 00F03C88
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F03D10
                          • IsMenu.USER32(?), ref: 00F03D24
                          • CreatePopupMenu.USER32 ref: 00F03D2E
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F03D5B
                          • DrawMenuBar.USER32 ref: 00F03D63
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                          • String ID: 0$F
                          • API String ID: 161812096-3044882817
                          • Opcode ID: 687154dadb7e41643c97cff4b88cab5608f17931a4bf8fc5c8a94958769c0c79
                          • Instruction ID: 0830ca09ff10caebc1763f037d8b8579812b98d2b7a0831ee83e0e73e571091a
                          • Opcode Fuzzy Hash: 687154dadb7e41643c97cff4b88cab5608f17931a4bf8fc5c8a94958769c0c79
                          • Instruction Fuzzy Hash: E0414E79A02209EFDF24CF64D844AEA77B9FF49350F144129F946A73A0D770AA10EF94
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00ED1F64
                          • GetDlgCtrlID.USER32 ref: 00ED1F6F
                          • GetParent.USER32 ref: 00ED1F8B
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00ED1F8E
                          • GetDlgCtrlID.USER32(?), ref: 00ED1F97
                          • GetParent.USER32(?), ref: 00ED1FAB
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00ED1FAE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 711023334-1403004172
                          • Opcode ID: 6f957fcfebce817845ba6f43cdf05223d3295b712c0635c7110731acbb31c530
                          • Instruction ID: 6ec0b59519b39a6099884e3977e0ff4f1f0e5c3759d89e8bd825a21ae27ab4ee
                          • Opcode Fuzzy Hash: 6f957fcfebce817845ba6f43cdf05223d3295b712c0635c7110731acbb31c530
                          • Instruction Fuzzy Hash: AF21C270A00218BBDF15AFA0CC85DEEBBB8FF15310F105256F965B7291CB355909DBA1
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F03A9D
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F03AA0
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F03AC7
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F03AEA
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F03B62
                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00F03BAC
                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00F03BC7
                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00F03BE2
                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00F03BF6
                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00F03C13
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow
                          • String ID:
                          • API String ID: 312131281-0
                          • Opcode ID: 5c693e93aa18e2c06ec79e163a6e5af18e46035e848ce3f157fb0171fa010a08
                          • Instruction ID: b5336edba5d055e78ef32fac82a208a64e55cb29ce0bef077d90a14ce210ae9c
                          • Opcode Fuzzy Hash: 5c693e93aa18e2c06ec79e163a6e5af18e46035e848ce3f157fb0171fa010a08
                          • Instruction Fuzzy Hash: D3616B75A00248AFEB10DF68CC81EEE77F8EB49714F104199FA15E72E1D774AA81EB50
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00EDB151
                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB165
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00EDB16C
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB17B
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EDB18D
                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB1A6
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB1B8
                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB1FD
                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB212
                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00EDA1E1,?,00000001), ref: 00EDB21D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: ab9f1d15ea9cee018b3682153fd5eccebab58f5d1ce6e5823add502d15580ea3
                          • Instruction ID: f0c8e50f25754c9b52cf925914f075932162c88078b31046997bf2440dab6aa9
                          • Opcode Fuzzy Hash: ab9f1d15ea9cee018b3682153fd5eccebab58f5d1ce6e5823add502d15580ea3
                          • Instruction Fuzzy Hash: 5231A576500208FFDB209F28EC84B6D7BB9FB62359F115206FA05E72A0E7B49D419F60
                          APIs
                          • _free.LIBCMT ref: 00EA2C94
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • _free.LIBCMT ref: 00EA2CA0
                          • _free.LIBCMT ref: 00EA2CAB
                          • _free.LIBCMT ref: 00EA2CB6
                          • _free.LIBCMT ref: 00EA2CC1
                          • _free.LIBCMT ref: 00EA2CCC
                          • _free.LIBCMT ref: 00EA2CD7
                          • _free.LIBCMT ref: 00EA2CE2
                          • _free.LIBCMT ref: 00EA2CED
                          • _free.LIBCMT ref: 00EA2CFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 83deba87fb010263f9eb08ada84b036170c013f67c218d6e5b67d25a24ac8bdb
                          • Instruction ID: 95eb86d7e13c0fb158658639525e61fa88b40950848db6980beaaa5ada3619ba
                          • Opcode Fuzzy Hash: 83deba87fb010263f9eb08ada84b036170c013f67c218d6e5b67d25a24ac8bdb
                          • Instruction Fuzzy Hash: 6F119476500108AFCB42EF58D842CDE3FA5BF4A750F4154A9FA487F222D631FA509B91
                          APIs
                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E71459
                          • OleUninitialize.OLE32(?,00000000), ref: 00E714F8
                          • UnregisterHotKey.USER32(?), ref: 00E716DD
                          • DestroyWindow.USER32(?), ref: 00EB24B9
                          • FreeLibrary.KERNEL32(?), ref: 00EB251E
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00EB254B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                          • String ID: close all
                          • API String ID: 469580280-3243417748
                          • Opcode ID: d989f4bd43f75a5383f2be5f0d693ef3ac8400f8ae03cf91a90dcb4e50902650
                          • Instruction ID: d5df0b4648e2a30556d1250193ca37cbb3bf9d6a7d1cfcbac7b465c4e3777b52
                          • Opcode Fuzzy Hash: d989f4bd43f75a5383f2be5f0d693ef3ac8400f8ae03cf91a90dcb4e50902650
                          • Instruction Fuzzy Hash: 0FD18E31702212CFDB29EF58C895A69F7A4BF05704F14A2ADE54E7B262DB30AD12CF51
                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EE7FAD
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE7FC1
                          • GetFileAttributesW.KERNEL32(?), ref: 00EE7FEB
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00EE8005
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE8017
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE8060
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EE80B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CurrentDirectory$AttributesFile
                          • String ID: *.*
                          • API String ID: 769691225-438819550
                          • Opcode ID: dba91f6739f00bc148685f439cf8ae5a02344b04427b45c4180d951e465de7f7
                          • Instruction ID: 976b30432c8b98b5f88f958faf8832d924e40d2de9274aa581a0f0df5bb69122
                          • Opcode Fuzzy Hash: dba91f6739f00bc148685f439cf8ae5a02344b04427b45c4180d951e465de7f7
                          • Instruction Fuzzy Hash: 7581C1715082899BDB24EF56C8409AEB3E8FF84314F14685EF8C9E7260EB34DD45CB92
                          APIs
                          • SetWindowLongW.USER32(?,000000EB), ref: 00E75C7A
                            • Part of subcall function 00E75D0A: GetClientRect.USER32(?,?), ref: 00E75D30
                            • Part of subcall function 00E75D0A: GetWindowRect.USER32(?,?), ref: 00E75D71
                            • Part of subcall function 00E75D0A: ScreenToClient.USER32(?,?), ref: 00E75D99
                          • GetDC.USER32 ref: 00EB46F5
                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EB4708
                          • SelectObject.GDI32(00000000,00000000), ref: 00EB4716
                          • SelectObject.GDI32(00000000,00000000), ref: 00EB472B
                          • ReleaseDC.USER32(?,00000000), ref: 00EB4733
                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00EB47C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                          • String ID: U
                          • API String ID: 4009187628-3372436214
                          • Opcode ID: 59a3a203b5d5b383d51bfa34c6d21cde877653ca486085e70560a5e7e173bce4
                          • Instruction ID: 87a164d09dc5cea9ce3e5d47852ce500e80a835b7808d840fa1d5e5e4ebc0dd6
                          • Opcode Fuzzy Hash: 59a3a203b5d5b383d51bfa34c6d21cde877653ca486085e70560a5e7e173bce4
                          • Instruction Fuzzy Hash: B271E175400209DFCF228F64C984AFB7BB5FF4A318F14526AED557A1A6C7318881EF50
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00EE35E4
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • LoadStringW.USER32(00F42390,?,00000FFF,?), ref: 00EE360A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LoadString$_wcslen
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                          • API String ID: 4099089115-2391861430
                          • Opcode ID: 8d21153686d3c9961bd142166a4d20e8843ea5804ee88a8a7a4a776298f3f496
                          • Instruction ID: d1c679e3d058da5bf93fc41dfb75447214ddfd3a3e38b1245990fab52a45223a
                          • Opcode Fuzzy Hash: 8d21153686d3c9961bd142166a4d20e8843ea5804ee88a8a7a4a776298f3f496
                          • Instruction Fuzzy Hash: 54516171800249BADF15EBA0DC46EEEBBB4EF14304F14A125F50973192EB315B99EFA1
                          APIs
                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EEC272
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EEC29A
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EEC2CA
                          • GetLastError.KERNEL32 ref: 00EEC322
                          • SetEvent.KERNEL32(?), ref: 00EEC336
                          • InternetCloseHandle.WININET(00000000), ref: 00EEC341
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                          • String ID:
                          • API String ID: 3113390036-3916222277
                          • Opcode ID: ab5daba05fded2202dca3faa2511f4c65485597a1673d488e8ab1f2aa0beb555
                          • Instruction ID: ae72fe0d3ca716f6d41d84281a62858dca350735552b4c7203ff740878615c95
                          • Opcode Fuzzy Hash: ab5daba05fded2202dca3faa2511f4c65485597a1673d488e8ab1f2aa0beb555
                          • Instruction Fuzzy Hash: B53180B160064CAFD7219F668C88AAB7BFCFB49744F24951EF446E3210DB30DD069BA1
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00EB3AAF,?,?,Bad directive syntax error,00F0CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00ED98BC
                          • LoadStringW.USER32(00000000,?,00EB3AAF,?), ref: 00ED98C3
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00ED9987
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HandleLoadMessageModuleString_wcslen
                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                          • API String ID: 858772685-4153970271
                          • Opcode ID: cb1d2748918badeecd6fd183344ee81583822946b19a7806e9fb7e4feaccb7cd
                          • Instruction ID: ac7947ea1b21ffda3333f7b585f2e214551a08fcb85d3d6a46ea1c998f98a8d3
                          • Opcode Fuzzy Hash: cb1d2748918badeecd6fd183344ee81583822946b19a7806e9fb7e4feaccb7cd
                          • Instruction Fuzzy Hash: 49217E31C0021ABBCF15AF90CC16EEE77B5FF18300F04A466F519760A2EB319618EB51
                          APIs
                          • GetParent.USER32 ref: 00ED20AB
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00ED20C0
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00ED214D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassMessageNameParentSend
                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 1290815626-3381328864
                          • Opcode ID: 3d590c0a44f9125398b7dc16d4e3071c7e1984f75ceb058077b5d4b8885179b5
                          • Instruction ID: 701944f787d1015a3531be62446c7eb2a17356ab4bf3a89a0189a9b58b7c1563
                          • Opcode Fuzzy Hash: 3d590c0a44f9125398b7dc16d4e3071c7e1984f75ceb058077b5d4b8885179b5
                          • Instruction Fuzzy Hash: D5112976688706B9FA112320DC07DE677DCDF64738F20621BFB04B51E1FEA1A8036654
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                          • String ID:
                          • API String ID: 1282221369-0
                          • Opcode ID: 1af713be7211d3581ef61eb650f448aa2725270f67e886618d9da62341ebd546
                          • Instruction ID: 6bbf1aa077ef29a3710cefb2b23f341f8ee1900a85df890a24fc9e68b9ccb495
                          • Opcode Fuzzy Hash: 1af713be7211d3581ef61eb650f448aa2725270f67e886618d9da62341ebd546
                          • Instruction Fuzzy Hash: E4614876A04304AFDF21AFB89C81A6A7BE5AF0F314F24516DFA55BF281DA31BD018750
                          APIs
                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00F05186
                          • ShowWindow.USER32(?,00000000), ref: 00F051C7
                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00F051CD
                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00F051D1
                            • Part of subcall function 00F06FBA: DeleteObject.GDI32(00000000), ref: 00F06FE6
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F0520D
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F0521A
                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F0524D
                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00F05287
                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00F05296
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                          • String ID:
                          • API String ID: 3210457359-0
                          • Opcode ID: a5377cb80885f2d19ace8dae93a05fd893dc65b9a758817e1cbad0c04461c9e6
                          • Instruction ID: 0ec5f33faee1d1b4810b0091743081ae6e313112b8373c1f488ce4588678f9fd
                          • Opcode Fuzzy Hash: a5377cb80885f2d19ace8dae93a05fd893dc65b9a758817e1cbad0c04461c9e6
                          • Instruction Fuzzy Hash: 00516E31A50A08FFEF209F64CC49B9A7BA5BF05B21F144112FA19962E1C7B5A990FF41
                          APIs
                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00EC6890
                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00EC68A9
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00EC68B9
                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00EC68D1
                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00EC68F2
                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E88874,00000000,00000000,00000000,000000FF,00000000), ref: 00EC6901
                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00EC691E
                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E88874,00000000,00000000,00000000,000000FF,00000000), ref: 00EC692D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                          • String ID:
                          • API String ID: 1268354404-0
                          • Opcode ID: 67daf4f91209f21d5e971994a0a51e0471e08a9cc13d4bd337fa8e7b03c1bf3a
                          • Instruction ID: 5b309a55933a4ff1ae2e2eb087bc691282381c79b48a23fb9c03bb1dbd534ab5
                          • Opcode Fuzzy Hash: 67daf4f91209f21d5e971994a0a51e0471e08a9cc13d4bd337fa8e7b03c1bf3a
                          • Instruction Fuzzy Hash: B651BC74600209EFDB20DF24CD91FAA7BB5FF88754F105218F90AA72A0DB71E991EB40
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EEC182
                          • GetLastError.KERNEL32 ref: 00EEC195
                          • SetEvent.KERNEL32(?), ref: 00EEC1A9
                            • Part of subcall function 00EEC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EEC272
                            • Part of subcall function 00EEC253: GetLastError.KERNEL32 ref: 00EEC322
                            • Part of subcall function 00EEC253: SetEvent.KERNEL32(?), ref: 00EEC336
                            • Part of subcall function 00EEC253: InternetCloseHandle.WININET(00000000), ref: 00EEC341
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                          • String ID:
                          • API String ID: 337547030-0
                          • Opcode ID: 004acec6be44e5dffaeb5612252c529becdbe5ddce6e0aa707b646c927781fee
                          • Instruction ID: 2406dfbdb1f8729e8b821a83a639e914ec352e8b2547a42b5550b61b348d106a
                          • Opcode Fuzzy Hash: 004acec6be44e5dffaeb5612252c529becdbe5ddce6e0aa707b646c927781fee
                          • Instruction Fuzzy Hash: 97318371100A89EFDB219FA6DD44A66BBF9FF18304B20551DFA5693620D730E816EBA0
                          APIs
                            • Part of subcall function 00ED3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED3A57
                            • Part of subcall function 00ED3A3D: GetCurrentThreadId.KERNEL32 ref: 00ED3A5E
                            • Part of subcall function 00ED3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00ED25B3), ref: 00ED3A65
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ED25BD
                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00ED25DB
                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00ED25DF
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ED25E9
                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00ED2601
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00ED2605
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ED260F
                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00ED2623
                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00ED2627
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                          • String ID:
                          • API String ID: 2014098862-0
                          • Opcode ID: a14bb1dca45375e8f1cb6886484d4a8b2e0abf4cece079239678f0b66c6b3209
                          • Instruction ID: e0c5c2070e69046ebd966586e835294596fb792b1d54d1c34317fe9107423134
                          • Opcode Fuzzy Hash: a14bb1dca45375e8f1cb6886484d4a8b2e0abf4cece079239678f0b66c6b3209
                          • Instruction Fuzzy Hash: 0601D830390214BBFB2067699C8AF597F99EB5EB11F101106F318AF1D1C9E254459AEA
                          APIs
                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00ED1449,?,?,00000000), ref: 00ED180C
                          • HeapAlloc.KERNEL32(00000000,?,00ED1449,?,?,00000000), ref: 00ED1813
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00ED1449,?,?,00000000), ref: 00ED1828
                          • GetCurrentProcess.KERNEL32(?,00000000,?,00ED1449,?,?,00000000), ref: 00ED1830
                          • DuplicateHandle.KERNEL32(00000000,?,00ED1449,?,?,00000000), ref: 00ED1833
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00ED1449,?,?,00000000), ref: 00ED1843
                          • GetCurrentProcess.KERNEL32(00ED1449,00000000,?,00ED1449,?,?,00000000), ref: 00ED184B
                          • DuplicateHandle.KERNEL32(00000000,?,00ED1449,?,?,00000000), ref: 00ED184E
                          • CreateThread.KERNEL32(00000000,00000000,00ED1874,00000000,00000000,00000000), ref: 00ED1868
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                          • String ID:
                          • API String ID: 1957940570-0
                          • Opcode ID: 458b60af547be2bfda828c4b1c7e5b36085773352758506be0866cb153468bcc
                          • Instruction ID: 4f910920dd1131c24c677922b239fc811e8db331a5cde3b98d11cc046bb0479a
                          • Opcode Fuzzy Hash: 458b60af547be2bfda828c4b1c7e5b36085773352758506be0866cb153468bcc
                          • Instruction Fuzzy Hash: F401BF75240308BFE710AB65DC4DF573B6CFB89B11F004511FA05DB192C6709800DB60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __alldvrm$_strrchr
                          • String ID: }}$}}$}}
                          • API String ID: 1036877536-1495402609
                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                          • Instruction ID: 85b93f0622df038da2aff6af76cff91de62fc009fdda8574e3ce6e2f844285e7
                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                          • Instruction Fuzzy Hash: E1A199B5E103829FDB11CF28C8917EEBBE4EFAB354F1441ADE581AF281C2B4A941C751
                          APIs
                            • Part of subcall function 00EDD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00EDD501
                            • Part of subcall function 00EDD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00EDD50F
                            • Part of subcall function 00EDD4DC: CloseHandle.KERNEL32(00000000), ref: 00EDD5DC
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EFA16D
                          • GetLastError.KERNEL32 ref: 00EFA180
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EFA1B3
                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00EFA268
                          • GetLastError.KERNEL32(00000000), ref: 00EFA273
                          • CloseHandle.KERNEL32(00000000), ref: 00EFA2C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                          • String ID: SeDebugPrivilege
                          • API String ID: 2533919879-2896544425
                          • Opcode ID: 53b75b4831c2cad8d718ca1937c900a53f740825aacb1cf2ff70b4dc29d55156
                          • Instruction ID: efd8e45fb0afa0d8a9d0356e0c4e73f7bb61e0c1a7b39e579780b1eb04fab356
                          • Opcode Fuzzy Hash: 53b75b4831c2cad8d718ca1937c900a53f740825aacb1cf2ff70b4dc29d55156
                          • Instruction Fuzzy Hash: FE61ADB0204202AFE720DF18C494F29BBE5AF44318F18949CE56A5F7A3C772EC45CB92
                          APIs
                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F03925
                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00F0393A
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F03954
                          • _wcslen.LIBCMT ref: 00F03999
                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F039C6
                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F039F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$Window_wcslen
                          • String ID: SysListView32
                          • API String ID: 2147712094-78025650
                          • Opcode ID: 565340cfcf68ecca69ec5f812964397468a1023dcb5a139f6c3788040fd0de03
                          • Instruction ID: a4dea342158a4bfa3257e4bbbd28a30bb564c850a1da982a39df770f5946f0e0
                          • Opcode Fuzzy Hash: 565340cfcf68ecca69ec5f812964397468a1023dcb5a139f6c3788040fd0de03
                          • Instruction Fuzzy Hash: 65418171E00219ABEF219F64CC45BEA7BADFF08360F100566F958E72C1D7759A80EB90
                          APIs
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EDBCFD
                          • IsMenu.USER32(00000000), ref: 00EDBD1D
                          • CreatePopupMenu.USER32 ref: 00EDBD53
                          • GetMenuItemCount.USER32(018E5708), ref: 00EDBDA4
                          • InsertMenuItemW.USER32(018E5708,?,00000001,00000030), ref: 00EDBDCC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                          • String ID: 0$2
                          • API String ID: 93392585-3793063076
                          • Opcode ID: 4bc5c963637d337fc7cb79c4f808564bdce4314beb0e9449aeb2155848e39460
                          • Instruction ID: 51d27b079ad14eeda4de8c89e8331af67a9ef2318ef54bbc70de0bb61f1ea71b
                          • Opcode Fuzzy Hash: 4bc5c963637d337fc7cb79c4f808564bdce4314beb0e9449aeb2155848e39460
                          • Instruction Fuzzy Hash: 34519E70A00209DBDB10CFA8D884BAEBBF6FF49318F15525AE441FB390E7719942CB61
                          APIs
                          • _ValidateLocalCookies.LIBCMT ref: 00E92D4B
                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00E92D53
                          • _ValidateLocalCookies.LIBCMT ref: 00E92DE1
                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00E92E0C
                          • _ValidateLocalCookies.LIBCMT ref: 00E92E61
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                          • String ID: &H$csm
                          • API String ID: 1170836740-1242228090
                          • Opcode ID: 00632ac938a08ca39bbe6231c66d72ff71130dd5d12af7188cbb112bc8d81b37
                          • Instruction ID: 05bfb6a1467ee518ba05aa52c05df50de7128dd99961403d38d1cd72e72f3260
                          • Opcode Fuzzy Hash: 00632ac938a08ca39bbe6231c66d72ff71130dd5d12af7188cbb112bc8d81b37
                          • Instruction Fuzzy Hash: 23419D34A01209BBCF14DF68C885ADEBBF5BF44328F149159EA14BB392D731AA45CBD1
                          APIs
                          • LoadIconW.USER32(00000000,00007F03), ref: 00EDC913
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2457776203-404129466
                          • Opcode ID: d7054a9e8d94d1cccfbb7d61d2d17195ae12dbfd199ab87239664c17ea283950
                          • Instruction ID: 1571f4cc6636fd10ab112f39e44d678461e728fd291859ebbe48ac6e9450e7f2
                          • Opcode Fuzzy Hash: d7054a9e8d94d1cccfbb7d61d2d17195ae12dbfd199ab87239664c17ea283950
                          • Instruction Fuzzy Hash: B9110B35689307BAEB0557549C92C9A77DCDF153A8B70502BF504B63C1E7A0AD02A265
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$LocalTime
                          • String ID:
                          • API String ID: 952045576-0
                          • Opcode ID: 1b9188914577f5b13cb9719967b4921cb1568ca20e26afdb2e5b4b3150d9722c
                          • Instruction ID: 16cf4fa81f6e9ed87d08fb3a0dc5bb36a77c8c637fce0203a34e8306a9355f2c
                          • Opcode Fuzzy Hash: 1b9188914577f5b13cb9719967b4921cb1568ca20e26afdb2e5b4b3150d9722c
                          • Instruction Fuzzy Hash: 8E415E65C1021865CF11EBB48C8A9CFB7E8EF45710F50A563E918F7262EB34E256C3A5
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00EC682C,00000004,00000000,00000000), ref: 00E8F953
                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00EC682C,00000004,00000000,00000000), ref: 00ECF3D1
                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00EC682C,00000004,00000000,00000000), ref: 00ECF454
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: 12dc677e31f7979b41f46e6348737ce987e79087a43f1c9d5665320244b8b674
                          • Instruction ID: 859a9cdd96dd43ca883b9c606a9edbb3e7a23be9f8fc48a5384bdc057775898d
                          • Opcode Fuzzy Hash: 12dc677e31f7979b41f46e6348737ce987e79087a43f1c9d5665320244b8b674
                          • Instruction Fuzzy Hash: 2D414E30604680FAD739AB6CC988B6A7BD2BBD6318F14713CE48F76560C636D881DB51
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 00F02D1B
                          • GetDC.USER32(00000000), ref: 00F02D23
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F02D2E
                          • ReleaseDC.USER32(00000000,00000000), ref: 00F02D3A
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F02D76
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F02D87
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F05A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00F02DC2
                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F02DE1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                          • String ID:
                          • API String ID: 3864802216-0
                          • Opcode ID: 912108929516f6b127858cf3a89a24e355fce47db1bbf756466c182e0bce9a97
                          • Instruction ID: eae09a6728ac945c2e26d989807560c28def3375112dc36a8513992eebe2b31f
                          • Opcode Fuzzy Hash: 912108929516f6b127858cf3a89a24e355fce47db1bbf756466c182e0bce9a97
                          • Instruction Fuzzy Hash: 01315A72202214ABEB218F548C8AFAB3BA9FB09725F044155FE089A2D1C6759C51EBB4
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: 9f275430c4868aca9caaa5377fcef53f74c53babab4de4c15818fa08e47d4e6e
                          • Instruction ID: febce74e7faa2b364c1e0eac0816e0f83fe9af255cf8369e6e3b860fbca9fc00
                          • Opcode Fuzzy Hash: 9f275430c4868aca9caaa5377fcef53f74c53babab4de4c15818fa08e47d4e6e
                          • Instruction Fuzzy Hash: 4321FF63644A06BBE62595104D43FFA33ACEF10384F546023FD157ABC1F720DE1695A6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: NULL Pointer assignment$Not an Object type
                          • API String ID: 0-572801152
                          • Opcode ID: 53ed89212d22d4d5d8783238237d889bef80d944e7f2b2c7443602688574ee0e
                          • Instruction ID: 7057d57d9489498f9557c39dd3aef9d8b03647dc8790a33e8b2cfec56ff12601
                          • Opcode Fuzzy Hash: 53ed89212d22d4d5d8783238237d889bef80d944e7f2b2c7443602688574ee0e
                          • Instruction Fuzzy Hash: BDD19F72A0060EAFDB10CF98C880BBEB7B5BF58354F149169EA15BB281D770ED41CB90
                          APIs
                          • GetCPInfo.KERNEL32(?,?), ref: 00EB15CE
                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00EB1651
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EB16E4
                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00EB16FB
                            • Part of subcall function 00EA3820: RtlAllocateHeap.NTDLL(00000000,?,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6,?,00E71129), ref: 00EA3852
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EB1777
                          • __freea.LIBCMT ref: 00EB17A2
                          • __freea.LIBCMT ref: 00EB17AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                          • String ID:
                          • API String ID: 2829977744-0
                          • Opcode ID: 69434e628fb11edb75e154aca1ad63a24059d06ed7f3a757fca09d7ffb9e5229
                          • Instruction ID: 1a928742ae6b1a49b42e3703b3ff590bd8c3302a605e5cafe22b846c3c225076
                          • Opcode Fuzzy Hash: 69434e628fb11edb75e154aca1ad63a24059d06ed7f3a757fca09d7ffb9e5229
                          • Instruction Fuzzy Hash: BF91C571E112169ADF208F74C8A1AEF7BF5AF4A324F986699E901F7180DB35DC40C7A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearInit
                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 2610073882-625585964
                          • Opcode ID: da122c39edb4160d42c2c21e5a18f0380477213addcfc58edb069d2b9fbc6bcb
                          • Instruction ID: 5bbe756216ff298efc7f865cc5039d0e23698400bbbd23f262fdfcd5909ff937
                          • Opcode Fuzzy Hash: da122c39edb4160d42c2c21e5a18f0380477213addcfc58edb069d2b9fbc6bcb
                          • Instruction Fuzzy Hash: E29170B1A00219ABDF24DFA5C884FAFB7B8AF46714F10955AF605BB2C0D7709945CFA0
                          APIs
                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00EE125C
                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EE1284
                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00EE12A8
                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EE12D8
                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EE135F
                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EE13C4
                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EE1430
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                          • String ID:
                          • API String ID: 2550207440-0
                          • Opcode ID: 8284687389be9a4fa930d5fc5f71aba75adf66f92e5590f414f18bd8a9cdbda2
                          • Instruction ID: 0c42591d41388d5d21540ba11ec51389b6eb4c7c8d2c7b3e914d4bbd87fc89d6
                          • Opcode Fuzzy Hash: 8284687389be9a4fa930d5fc5f71aba75adf66f92e5590f414f18bd8a9cdbda2
                          • Instruction Fuzzy Hash: DF91BE75A0024C9FDB00DFA5C884BBEB7B5FF49314F1150A9EA50FB2A1D774A981DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: db303234b6701201caf25c05056dfc6cee1b8080ea55c9e963601810ce15e696
                          • Instruction ID: 2a2eafdc494b94848cf3115d99a4f1a1e40ca690e3027f993fdd9ff1b04dd1a9
                          • Opcode Fuzzy Hash: db303234b6701201caf25c05056dfc6cee1b8080ea55c9e963601810ce15e696
                          • Instruction Fuzzy Hash: 1D913671D00219EFCB10DFA9C984AEEBBB8FF48324F185149E519B7252D375A942DBA0
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00EF396B
                          • CharUpperBuffW.USER32(?,?), ref: 00EF3A7A
                          • _wcslen.LIBCMT ref: 00EF3A8A
                          • VariantClear.OLEAUT32(?), ref: 00EF3C1F
                            • Part of subcall function 00EE0CDF: VariantInit.OLEAUT32(00000000), ref: 00EE0D1F
                            • Part of subcall function 00EE0CDF: VariantCopy.OLEAUT32(?,?), ref: 00EE0D28
                            • Part of subcall function 00EE0CDF: VariantClear.OLEAUT32(?), ref: 00EE0D34
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                          • API String ID: 4137639002-1221869570
                          • Opcode ID: 98c4e3530d7d486d761b3a4036cc1e7edde8a83cf0b04d9fe059dc8a31c850f1
                          • Instruction ID: 59b582958ac06e078e7e9078262f572cdbc2c35457ea2c9ae3937f9a9c71edab
                          • Opcode Fuzzy Hash: 98c4e3530d7d486d761b3a4036cc1e7edde8a83cf0b04d9fe059dc8a31c850f1
                          • Instruction Fuzzy Hash: 04918B746083099FC704EF24C49196AB7E5FF88314F14992EF98AAB351DB31EE45CB92
                          APIs
                            • Part of subcall function 00ED000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?,?,00ED035E), ref: 00ED002B
                            • Part of subcall function 00ED000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?), ref: 00ED0046
                            • Part of subcall function 00ED000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?), ref: 00ED0054
                            • Part of subcall function 00ED000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?), ref: 00ED0064
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00EF4C51
                          • _wcslen.LIBCMT ref: 00EF4D59
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00EF4DCF
                          • CoTaskMemFree.OLE32(?), ref: 00EF4DDA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                          • String ID: NULL Pointer assignment
                          • API String ID: 614568839-2785691316
                          • Opcode ID: a3488aba228ce8bfa46a4f7307acf37be836c2fc829c5ef15f6fc958c367ff7b
                          • Instruction ID: 2a18c276f321fdb58337192810d2da2da7cf697bc5a8cf22692ff72d989b7c63
                          • Opcode Fuzzy Hash: a3488aba228ce8bfa46a4f7307acf37be836c2fc829c5ef15f6fc958c367ff7b
                          • Instruction Fuzzy Hash: DF9129B1D0021DAFDF14DFA4C881AEEB7B8BF48314F10916AE519BB291DB345A45CF60
                          APIs
                          • GetMenu.USER32(?), ref: 00F02183
                          • GetMenuItemCount.USER32(00000000), ref: 00F021B5
                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F021DD
                          • _wcslen.LIBCMT ref: 00F02213
                          • GetMenuItemID.USER32(?,?), ref: 00F0224D
                          • GetSubMenu.USER32(?,?), ref: 00F0225B
                            • Part of subcall function 00ED3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED3A57
                            • Part of subcall function 00ED3A3D: GetCurrentThreadId.KERNEL32 ref: 00ED3A5E
                            • Part of subcall function 00ED3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00ED25B3), ref: 00ED3A65
                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F022E3
                            • Part of subcall function 00EDE97B: Sleep.KERNEL32 ref: 00EDE9F3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                          • String ID:
                          • API String ID: 4196846111-0
                          • Opcode ID: 25f306e8237b4c3b646cc4119f27e6415b8bce33b8886d998a4a826986616fac
                          • Instruction ID: 804832b050a93bafec018d3f72c526241b84bafa1e54f3c2802a0719df7c7e3e
                          • Opcode Fuzzy Hash: 25f306e8237b4c3b646cc4119f27e6415b8bce33b8886d998a4a826986616fac
                          • Instruction Fuzzy Hash: AC716075E00205AFCB54DFA4C845AAEB7F5FF48320F148459E81AFB391D734AD41ABA0
                          APIs
                          • IsWindow.USER32(018E5528), ref: 00F07F37
                          • IsWindowEnabled.USER32(018E5528), ref: 00F07F43
                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00F0801E
                          • SendMessageW.USER32(018E5528,000000B0,?,?), ref: 00F08051
                          • IsDlgButtonChecked.USER32(?,?), ref: 00F08089
                          • GetWindowLongW.USER32(018E5528,000000EC), ref: 00F080AB
                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F080C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                          • String ID:
                          • API String ID: 4072528602-0
                          • Opcode ID: 217a984240c51dcf62996b0a6cd77e4bc74beb821d22ccda53986657ce6f89aa
                          • Instruction ID: 5f4df3ce107aeb829762344ed482c658437734b9fe2ce54f94320b8e71b3ee37
                          • Opcode Fuzzy Hash: 217a984240c51dcf62996b0a6cd77e4bc74beb821d22ccda53986657ce6f89aa
                          • Instruction Fuzzy Hash: F871A034E08349AFEF21AF54CC84FAA7BB5FF09351F144499E955932A1CB31A845FBA0
                          APIs
                          • GetParent.USER32(?), ref: 00EDAEF9
                          • GetKeyboardState.USER32(?), ref: 00EDAF0E
                          • SetKeyboardState.USER32(?), ref: 00EDAF6F
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00EDAF9D
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00EDAFBC
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00EDAFFD
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00EDB020
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 154ac6c812ae15b772c4a03b44ccb6fa62264140e8456f763f3e04f61538726c
                          • Instruction ID: 5031fb1cc91345e41721d4bf071bfa905ebc0a29ea547cd27be93c6ac3844ced
                          • Opcode Fuzzy Hash: 154ac6c812ae15b772c4a03b44ccb6fa62264140e8456f763f3e04f61538726c
                          • Instruction Fuzzy Hash: 6B5102A06043D57DFB324334CC05BBBBEE99B06308F0C959AE1D9655C2D3D8AACAD351
                          APIs
                          • GetParent.USER32(00000000), ref: 00EDAD19
                          • GetKeyboardState.USER32(?), ref: 00EDAD2E
                          • SetKeyboardState.USER32(?), ref: 00EDAD8F
                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00EDADBB
                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00EDADD8
                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00EDAE17
                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00EDAE38
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 4707b1f2820ce86e6e9c3e14426fe7ec062eeba5e8d9ab35f73249982e9f0f84
                          • Instruction ID: 1ce16fa87133a57822d38f961aa4dd2918b1280ad936b19c3b910ea616cb1227
                          • Opcode Fuzzy Hash: 4707b1f2820ce86e6e9c3e14426fe7ec062eeba5e8d9ab35f73249982e9f0f84
                          • Instruction Fuzzy Hash: 5F5127A15047D53DFB3243348C45B7A7FD9EB06308F0C959AE0D566AC2D294EEC5E362
                          APIs
                          • GetConsoleCP.KERNEL32(00EB3CD6,?,?,?,?,?,?,?,?,00EA5BA3,?,?,00EB3CD6,?,?), ref: 00EA5470
                          • __fassign.LIBCMT ref: 00EA54EB
                          • __fassign.LIBCMT ref: 00EA5506
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00EB3CD6,00000005,00000000,00000000), ref: 00EA552C
                          • WriteFile.KERNEL32(?,00EB3CD6,00000000,00EA5BA3,00000000,?,?,?,?,?,?,?,?,?,00EA5BA3,?), ref: 00EA554B
                          • WriteFile.KERNEL32(?,?,00000001,00EA5BA3,00000000,?,?,?,?,?,?,?,?,?,00EA5BA3,?), ref: 00EA5584
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                          • String ID:
                          • API String ID: 1324828854-0
                          • Opcode ID: afb2324bfb11f852857e69fda202b3c84bdbaf8e81f988fcb2ef4679beb6cdd7
                          • Instruction ID: c9bceef325ab0c03290ec355f3bdd2f551fcd5b88edbc7583175bd07605fdb77
                          • Opcode Fuzzy Hash: afb2324bfb11f852857e69fda202b3c84bdbaf8e81f988fcb2ef4679beb6cdd7
                          • Instruction Fuzzy Hash: 3A519171E006499FDB10CFA8D845AEEBBF9EF4E310F14511AF955FB291D630AA41CBA0
                          APIs
                            • Part of subcall function 00EF304E: inet_addr.WSOCK32(?), ref: 00EF307A
                            • Part of subcall function 00EF304E: _wcslen.LIBCMT ref: 00EF309B
                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00EF1112
                          • WSAGetLastError.WSOCK32 ref: 00EF1121
                          • WSAGetLastError.WSOCK32 ref: 00EF11C9
                          • closesocket.WSOCK32(00000000), ref: 00EF11F9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 2675159561-0
                          • Opcode ID: f5fd071135fead011039a48cf258a93acaac7758d552a069f49d52b7183e7598
                          • Instruction ID: c7bacd79cbc8dc0a7f673ffe0a36a4e2ca9ea36ed09d45175729c42c82697973
                          • Opcode Fuzzy Hash: f5fd071135fead011039a48cf258a93acaac7758d552a069f49d52b7183e7598
                          • Instruction Fuzzy Hash: 7841B13160021CEFDB109F24C884BB9B7EAFF45368F149199FA19AB291C774AD41CBE1
                          APIs
                            • Part of subcall function 00EDDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EDCF22,?), ref: 00EDDDFD
                            • Part of subcall function 00EDDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EDCF22,?), ref: 00EDDE16
                          • lstrcmpiW.KERNEL32(?,?), ref: 00EDCF45
                          • MoveFileW.KERNEL32(?,?), ref: 00EDCF7F
                          • _wcslen.LIBCMT ref: 00EDD005
                          • _wcslen.LIBCMT ref: 00EDD01B
                          • SHFileOperationW.SHELL32(?), ref: 00EDD061
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                          • String ID: \*.*
                          • API String ID: 3164238972-1173974218
                          • Opcode ID: e5950ebc5f8b5685e69ab300ea64e91ec184193ec828f2529e3561f59a4d496f
                          • Instruction ID: d08c6ec987df235c6d88e9ba05ea898167a312d7dbfbd1f905f90eca5a1b5206
                          • Opcode Fuzzy Hash: e5950ebc5f8b5685e69ab300ea64e91ec184193ec828f2529e3561f59a4d496f
                          • Instruction Fuzzy Hash: B64133719452195FDF12EBA4CD81ADEB7F9EF48380F1410E7E509FB242EA34A649CB50
                          APIs
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F02E1C
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00F02E4F
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00F02E84
                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00F02EB6
                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00F02EE0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00F02EF1
                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F02F0B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID:
                          • API String ID: 2178440468-0
                          • Opcode ID: ed56f2b02cda87bbb9f365a3b7091b119a99da4ef625716b7c367d649fa1487c
                          • Instruction ID: bd913e4941e5a2edf7923bd929a5219887fe84a2649da467c167b01444a23ccf
                          • Opcode Fuzzy Hash: ed56f2b02cda87bbb9f365a3b7091b119a99da4ef625716b7c367d649fa1487c
                          • Instruction Fuzzy Hash: 8D310535A84158AFEB61CF58DC88F6537E5FB5A760F150164FA048B2F2CB71A880FB61
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ED7769
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ED778F
                          • SysAllocString.OLEAUT32(00000000), ref: 00ED7792
                          • SysAllocString.OLEAUT32(?), ref: 00ED77B0
                          • SysFreeString.OLEAUT32(?), ref: 00ED77B9
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00ED77DE
                          • SysAllocString.OLEAUT32(?), ref: 00ED77EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: 161fc56fce4770ea3e2fc4799e9abab80f38b1eabd0ccead01ce4ee99fecb9b4
                          • Instruction ID: 1f2d15d5f93ef0027b367551d3d13b685a1088e7abcf9580624df3efe394e5a0
                          • Opcode Fuzzy Hash: 161fc56fce4770ea3e2fc4799e9abab80f38b1eabd0ccead01ce4ee99fecb9b4
                          • Instruction Fuzzy Hash: 18218376604219AFDB10DFA8CC84CBB77ACFB097657048527F955EB290E670DC42C7A4
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ED7842
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ED7868
                          • SysAllocString.OLEAUT32(00000000), ref: 00ED786B
                          • SysAllocString.OLEAUT32 ref: 00ED788C
                          • SysFreeString.OLEAUT32 ref: 00ED7895
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00ED78AF
                          • SysAllocString.OLEAUT32(?), ref: 00ED78BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: c6f3e75a01b799049e920ad2138a0bd2b467856b3b2f00172ebc9aad6fcae5c4
                          • Instruction ID: 858c117549393c59743c1cd442644f58cfb62efab53582859fae88b278afa714
                          • Opcode Fuzzy Hash: c6f3e75a01b799049e920ad2138a0bd2b467856b3b2f00172ebc9aad6fcae5c4
                          • Instruction Fuzzy Hash: BC21B639604118AFDB14EFB8DC8DDAA77ECFB083647108126F955DB2A1E670DC42DB64
                          APIs
                          • GetStdHandle.KERNEL32(0000000C), ref: 00EE04F2
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EE052E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateHandlePipe
                          • String ID: nul
                          • API String ID: 1424370930-2873401336
                          • Opcode ID: 6d2607d45c572b9ece82a92798ea3d8e72c9a6249c3685df687426fe102842e4
                          • Instruction ID: 018ff2f589b2a0f421ab2cd048b4b9081cb98c35df9778ebc1506aa00aff7fba
                          • Opcode Fuzzy Hash: 6d2607d45c572b9ece82a92798ea3d8e72c9a6249c3685df687426fe102842e4
                          • Instruction Fuzzy Hash: EB215C75500349ABDB309F2ADC44A9A77B4BF45728F604A19E8E1E62E0D7B0D984DF60
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 00EE05C6
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EE0601
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateHandlePipe
                          • String ID: nul
                          • API String ID: 1424370930-2873401336
                          • Opcode ID: f53fcd0d6706fbc5e57e2daa64964a60009b7b0fad68cb9d90b862e6f914357e
                          • Instruction ID: 8dde7244fa3f291e7807b7fae6901fe679846a3dcc2470d547813518811b9ddf
                          • Opcode Fuzzy Hash: f53fcd0d6706fbc5e57e2daa64964a60009b7b0fad68cb9d90b862e6f914357e
                          • Instruction Fuzzy Hash: 9521817550034A9BDB209F6A9C04B9A77E4BF95734F240B19F8A1F72E0D7F098A0DB50
                          APIs
                            • Part of subcall function 00E7600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E7604C
                            • Part of subcall function 00E7600E: GetStockObject.GDI32(00000011), ref: 00E76060
                            • Part of subcall function 00E7600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E7606A
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F04112
                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F0411F
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F0412A
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F04139
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F04145
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectStockWindow
                          • String ID: Msctls_Progress32
                          • API String ID: 1025951953-3636473452
                          • Opcode ID: a250763622a5c5a02807649d3e5b7b05d987c1a92c09ba866dc0e7d5ca687602
                          • Instruction ID: 3562f178a3a21a88e1edb9b39acbf147fbcbcf7fc97fbe0b0dda38f55821f87a
                          • Opcode Fuzzy Hash: a250763622a5c5a02807649d3e5b7b05d987c1a92c09ba866dc0e7d5ca687602
                          • Instruction Fuzzy Hash: 8911B9B214011DBEEF215F64CC85EE77F5DEF08798F004110BB18A2090C672DC61EBA4
                          APIs
                            • Part of subcall function 00EAD7A3: _free.LIBCMT ref: 00EAD7CC
                          • _free.LIBCMT ref: 00EAD82D
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • _free.LIBCMT ref: 00EAD838
                          • _free.LIBCMT ref: 00EAD843
                          • _free.LIBCMT ref: 00EAD897
                          • _free.LIBCMT ref: 00EAD8A2
                          • _free.LIBCMT ref: 00EAD8AD
                          • _free.LIBCMT ref: 00EAD8B8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                          • Instruction ID: 7a14740361050685d85a66d7363c091873734387064162a14f0ab48bd7523415
                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                          • Instruction Fuzzy Hash: F8115171544B04AAD525BFB0CC47FCB7BDC6F4A700F40182AB29ABE8A2DA65B5054751
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00EDDA74
                          • LoadStringW.USER32(00000000), ref: 00EDDA7B
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00EDDA91
                          • LoadStringW.USER32(00000000), ref: 00EDDA98
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00EDDADC
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 00EDDAB9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 4072794657-3128320259
                          • Opcode ID: 5960f1884b83ee77d19f79dea10ab2942dcdae0c35bc1c7b63d183d52e109a31
                          • Instruction ID: 608b571b6df763581c5da7b889d3e4451d2df8645d838ff38e6e221737eedfd9
                          • Opcode Fuzzy Hash: 5960f1884b83ee77d19f79dea10ab2942dcdae0c35bc1c7b63d183d52e109a31
                          • Instruction Fuzzy Hash: 9B0186F690020CBFE710DBA4DD89EEB336CE708701F405592B706E2081E6749E855FB4
                          APIs
                          • InterlockedExchange.KERNEL32(018DE408,018DE408), ref: 00EE097B
                          • EnterCriticalSection.KERNEL32(018DE3E8,00000000), ref: 00EE098D
                          • TerminateThread.KERNEL32(454D414E,000001F6), ref: 00EE099B
                          • WaitForSingleObject.KERNEL32(454D414E,000003E8), ref: 00EE09A9
                          • CloseHandle.KERNEL32(454D414E), ref: 00EE09B8
                          • InterlockedExchange.KERNEL32(018DE408,000001F6), ref: 00EE09C8
                          • LeaveCriticalSection.KERNEL32(018DE3E8), ref: 00EE09CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: ed058b545c82f301180ad3f59fed497b153c2a53b083a29663c7ffd247db62e3
                          • Instruction ID: e8cd5c4e3f2f511a2f1d7e5529da5d92292d08f70f1cf7ca406a443ebbb13253
                          • Opcode Fuzzy Hash: ed058b545c82f301180ad3f59fed497b153c2a53b083a29663c7ffd247db62e3
                          • Instruction Fuzzy Hash: 81F03C32442A06BBD7525FA5EE8CBD6BB39FF41702F402225F202A0CA1C7759465DFD0
                          APIs
                          • GetClientRect.USER32(?,?), ref: 00E75D30
                          • GetWindowRect.USER32(?,?), ref: 00E75D71
                          • ScreenToClient.USER32(?,?), ref: 00E75D99
                          • GetClientRect.USER32(?,?), ref: 00E75ED7
                          • GetWindowRect.USER32(?,?), ref: 00E75EF8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Rect$Client$Window$Screen
                          • String ID:
                          • API String ID: 1296646539-0
                          • Opcode ID: 83e619c173c2af6f65fc18227ae643a045476b6ba6a5064c7cdf0d279878da8d
                          • Instruction ID: edc2500546ed6989ef921367d1378c39e64064cb79161478adb358ffedb31e55
                          • Opcode Fuzzy Hash: 83e619c173c2af6f65fc18227ae643a045476b6ba6a5064c7cdf0d279878da8d
                          • Instruction Fuzzy Hash: 29B18B75A00B4ADBDB14CFA9C4407EEB7F1FF48314F14A51AE8A9E7290DB30AA51DB50
                          APIs
                          • __allrem.LIBCMT ref: 00EA00BA
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA00D6
                          • __allrem.LIBCMT ref: 00EA00ED
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA010B
                          • __allrem.LIBCMT ref: 00EA0122
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0140
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 1992179935-0
                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                          • Instruction ID: c8c4e6f22b19169421b8f794d38f0f77fd82e5ae99b601d11327fc07e5cabf39
                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                          • Instruction Fuzzy Hash: F481E871B01706ABEB249F68CC41BAB73E9AF5A328F24553EF551FB281E770E9008750
                          APIs
                            • Part of subcall function 00EF3149: select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00EF3195
                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00EF1DC0
                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00EF1DE1
                          • WSAGetLastError.WSOCK32 ref: 00EF1DF2
                          • inet_ntoa.WSOCK32(?), ref: 00EF1E8C
                          • htons.WSOCK32(?), ref: 00EF1EDB
                          • _strlen.LIBCMT ref: 00EF1F35
                            • Part of subcall function 00ED39E8: _strlen.LIBCMT ref: 00ED39F2
                            • Part of subcall function 00E76D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00E8CF58,?,?,?), ref: 00E76DBA
                            • Part of subcall function 00E76D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00E8CF58,?,?,?), ref: 00E76DED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                          • String ID:
                          • API String ID: 1923757996-0
                          • Opcode ID: 2489d053267b49752885cc2dbe54a1f861180721ccf7ef30abccdba8ec7e267f
                          • Instruction ID: 060cd3978b5b10ff3f56030bead668a4ed1278bbef9837d066068f806a12bd61
                          • Opcode Fuzzy Hash: 2489d053267b49752885cc2dbe54a1f861180721ccf7ef30abccdba8ec7e267f
                          • Instruction Fuzzy Hash: FAA1C231204348AFD324DF24C895F3A77E5AF84318F54A98CF55A6B2A2DB31ED45CB92
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00E982D9,00E982D9,?,?,?,00EA644F,00000001,00000001,?), ref: 00EA6258
                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00EA644F,00000001,00000001,?,?,?,?), ref: 00EA62DE
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00EA63D8
                          • __freea.LIBCMT ref: 00EA63E5
                            • Part of subcall function 00EA3820: RtlAllocateHeap.NTDLL(00000000,?,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6,?,00E71129), ref: 00EA3852
                          • __freea.LIBCMT ref: 00EA63EE
                          • __freea.LIBCMT ref: 00EA6413
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                          • String ID:
                          • API String ID: 1414292761-0
                          • Opcode ID: 794852b6fd68348542cfcc4025de56be1b071fac841ca8904881cc38dfb58b0e
                          • Instruction ID: 3480b8bea73d879ffef1b9aa220ed84afd7b99b5c63481ccf88f6a7bf1ee49f4
                          • Opcode Fuzzy Hash: 794852b6fd68348542cfcc4025de56be1b071fac841ca8904881cc38dfb58b0e
                          • Instruction Fuzzy Hash: 4451D372A00216ABDF258F64CC81EAF77E9EF9B714F185629F805FA150DB34EC45C6A0
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00EFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EFB6AE,?,?), ref: 00EFC9B5
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFC9F1
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA68
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA9E
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EFBCCA
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EFBD25
                          • RegCloseKey.ADVAPI32(00000000), ref: 00EFBD6A
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00EFBD99
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EFBDF3
                          • RegCloseKey.ADVAPI32(?), ref: 00EFBDFF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                          • String ID:
                          • API String ID: 1120388591-0
                          • Opcode ID: ae211b796653ab6031721ced69042bdcdc515f2f47432b6b36bd72faac826c20
                          • Instruction ID: 5000b73e00b2fe55d10911a4b21d16c56781cd0540ea3cb9e354637e0c496eaf
                          • Opcode Fuzzy Hash: ae211b796653ab6031721ced69042bdcdc515f2f47432b6b36bd72faac826c20
                          • Instruction Fuzzy Hash: E5819E30208245EFD714DF24C885E6ABBE5FF84308F14995CF6599B2A2DB32ED45CB92
                          APIs
                          • VariantInit.OLEAUT32(00000035), ref: 00ECF7B9
                          • SysAllocString.OLEAUT32(00000001), ref: 00ECF860
                          • VariantCopy.OLEAUT32(00ECFA64,00000000), ref: 00ECF889
                          • VariantClear.OLEAUT32(00ECFA64), ref: 00ECF8AD
                          • VariantCopy.OLEAUT32(00ECFA64,00000000), ref: 00ECF8B1
                          • VariantClear.OLEAUT32(?), ref: 00ECF8BB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearCopy$AllocInitString
                          • String ID:
                          • API String ID: 3859894641-0
                          • Opcode ID: 59c1981f78e0937fa3a1d513ba8e4c080c559da45473df5c8c4625707ebb4817
                          • Instruction ID: 16a93150a5c007c8a74d07b01e04cd2c853ceaeb0856e814b53fc026f06fa813
                          • Opcode Fuzzy Hash: 59c1981f78e0937fa3a1d513ba8e4c080c559da45473df5c8c4625707ebb4817
                          • Instruction Fuzzy Hash: 8551D435600300ABCF24ABA5D995F69B3E6EF85310B20A46BE905FF291DB718C41C797
                          APIs
                            • Part of subcall function 00E77620: _wcslen.LIBCMT ref: 00E77625
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00EE94E5
                          • _wcslen.LIBCMT ref: 00EE9506
                          • _wcslen.LIBCMT ref: 00EE952D
                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00EE9585
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$FileName$OpenSave
                          • String ID: X
                          • API String ID: 83654149-3081909835
                          • Opcode ID: 79fce430116d272017f600448e39a2810cd5fa9c1379e99281a1abfadc8d3dfa
                          • Instruction ID: fe7fcbfad4770f7933d59310c36e473149d4d97b023dd2d3a22672d27da692b7
                          • Opcode Fuzzy Hash: 79fce430116d272017f600448e39a2810cd5fa9c1379e99281a1abfadc8d3dfa
                          • Instruction Fuzzy Hash: F6E1AF31508340DFD724EF25C881A6AB7E5BF84314F14996DF89DAB2A2DB31DD05CB92
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • BeginPaint.USER32(?,?,?), ref: 00E89241
                          • GetWindowRect.USER32(?,?), ref: 00E892A5
                          • ScreenToClient.USER32(?,?), ref: 00E892C2
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E892D3
                          • EndPaint.USER32(?,?,?,?,?), ref: 00E89321
                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00EC71EA
                            • Part of subcall function 00E89339: BeginPath.GDI32(00000000), ref: 00E89357
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                          • String ID:
                          • API String ID: 3050599898-0
                          • Opcode ID: aee1bc88cd05e41f4cae2a81c1f0a8ebed603f9f9018c471ec1d82de2229baed
                          • Instruction ID: b009f04d0571a8c38056066f64ddd663feb555b0ca573f50894a060dcb082c3c
                          • Opcode Fuzzy Hash: aee1bc88cd05e41f4cae2a81c1f0a8ebed603f9f9018c471ec1d82de2229baed
                          • Instruction Fuzzy Hash: 1041A130505204AFD721EF24DC84FBA7BE8FB56724F180229F998A72F2C7719845EB61
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00EE080C
                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00EE0847
                          • EnterCriticalSection.KERNEL32(?), ref: 00EE0863
                          • LeaveCriticalSection.KERNEL32(?), ref: 00EE08DC
                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00EE08F3
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EE0921
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                          • String ID:
                          • API String ID: 3368777196-0
                          • Opcode ID: 4421de8248c1d16aab75587746b2e3cc7d0144978f9499c5ba3eb67ca08b4376
                          • Instruction ID: da546fd1e7ff5a8e70b4551d10684e31df535f1f0695298752128935af2dfa85
                          • Opcode Fuzzy Hash: 4421de8248c1d16aab75587746b2e3cc7d0144978f9499c5ba3eb67ca08b4376
                          • Instruction Fuzzy Hash: DB419A31900209EFDF14EF54DC85AAA77B9FF44310F1040A9ED04AA297DB70DEA0DBA4
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00ECF3AB,00000000,?,?,00000000,?,00EC682C,00000004,00000000,00000000), ref: 00F0824C
                          • EnableWindow.USER32(00000000,00000000), ref: 00F08272
                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00F082D1
                          • ShowWindow.USER32(00000000,00000004), ref: 00F082E5
                          • EnableWindow.USER32(00000000,00000001), ref: 00F0830B
                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00F0832F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID:
                          • API String ID: 642888154-0
                          • Opcode ID: a22d477dd7a95897914911a47a599ec197964b2cadd11cd9b0245371f7692bc2
                          • Instruction ID: 75554ff648989e6e8ebfa6ed197432320214f47b87c848f7f25c87b4b7c0dc0f
                          • Opcode Fuzzy Hash: a22d477dd7a95897914911a47a599ec197964b2cadd11cd9b0245371f7692bc2
                          • Instruction Fuzzy Hash: 90418734A01648AFDF25CF15CC99BE47BE1FB5A764F184269E9884B2E2CB315842FF50
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00ED4C95
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00ED4CB2
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00ED4CEA
                          • _wcslen.LIBCMT ref: 00ED4D08
                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00ED4D10
                          • _wcsstr.LIBVCRUNTIME ref: 00ED4D1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                          • String ID:
                          • API String ID: 72514467-0
                          • Opcode ID: ca6390504c8cce580090bddb234026845e9497356245420a6d6fd9c94807e576
                          • Instruction ID: 920929ffbbac6709af3c8f69f265db251ccfe7ae6edbce571e5f3505b34e786d
                          • Opcode Fuzzy Hash: ca6390504c8cce580090bddb234026845e9497356245420a6d6fd9c94807e576
                          • Instruction Fuzzy Hash: 3F2107B1204204BBEB255B25DC49E7B7BDDDF55750F10502AF809EA2D1DA71CC4297A0
                          APIs
                            • Part of subcall function 00E73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E73A97,?,?,00E72E7F,?,?,?,00000000), ref: 00E73AC2
                          • _wcslen.LIBCMT ref: 00EE587B
                          • CoInitialize.OLE32(00000000), ref: 00EE5995
                          • CoCreateInstance.OLE32(00F0FCF8,00000000,00000001,00F0FB68,?), ref: 00EE59AE
                          • CoUninitialize.OLE32 ref: 00EE59CC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                          • String ID: .lnk
                          • API String ID: 3172280962-24824748
                          • Opcode ID: 13e5dd306798eac4a9ded1c7e2e8db8eca37151d29aaecb6f734af541c7768d4
                          • Instruction ID: 3fb8189009b4ee1d9872727930cc0de5f4778b467a120b7dd566b83a592e81b9
                          • Opcode Fuzzy Hash: 13e5dd306798eac4a9ded1c7e2e8db8eca37151d29aaecb6f734af541c7768d4
                          • Instruction Fuzzy Hash: FDD185726047059FC714DF25C48096ABBE1FF89718F14985DF889AB362C732EC05CB92
                          APIs
                            • Part of subcall function 00ED0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00ED0FCA
                            • Part of subcall function 00ED0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00ED0FD6
                            • Part of subcall function 00ED0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00ED0FE5
                            • Part of subcall function 00ED0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00ED0FEC
                            • Part of subcall function 00ED0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00ED1002
                          • GetLengthSid.ADVAPI32(?,00000000,00ED1335), ref: 00ED17AE
                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00ED17BA
                          • HeapAlloc.KERNEL32(00000000), ref: 00ED17C1
                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00ED17DA
                          • GetProcessHeap.KERNEL32(00000000,00000000,00ED1335), ref: 00ED17EE
                          • HeapFree.KERNEL32(00000000), ref: 00ED17F5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                          • String ID:
                          • API String ID: 3008561057-0
                          • Opcode ID: 35154978434738a4baa5c63c08bfef5c7c04b5ac963eb81bcdb8ad547c3e94a0
                          • Instruction ID: 341a8461718f4ac391640b3d182607ea84517f95cdb86b7b92c70164ce7de153
                          • Opcode Fuzzy Hash: 35154978434738a4baa5c63c08bfef5c7c04b5ac963eb81bcdb8ad547c3e94a0
                          • Instruction Fuzzy Hash: B311BE31604209FFDB209FA4CC49BAF7BB9FB46359F10425AF441A7221C735A941DBA0
                          APIs
                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00ED14FF
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00ED1506
                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00ED1515
                          • CloseHandle.KERNEL32(00000004), ref: 00ED1520
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00ED154F
                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00ED1563
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                          • String ID:
                          • API String ID: 1413079979-0
                          • Opcode ID: bacb761e7811fb543f23eaadcbd783468f30bc8c2edec71c5ba2be66f5118bcf
                          • Instruction ID: 49ca953fec392bff0a49d1b5c9e701aac541e8618528354bce926afcc9374332
                          • Opcode Fuzzy Hash: bacb761e7811fb543f23eaadcbd783468f30bc8c2edec71c5ba2be66f5118bcf
                          • Instruction Fuzzy Hash: DB11297250420DBBDF118F98ED49BDE7BA9FF48748F048155FA05A21A0C3758E61EBA1
                          APIs
                          • GetLastError.KERNEL32(?,?,00E93379,00E92FE5), ref: 00E93390
                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E9339E
                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E933B7
                          • SetLastError.KERNEL32(00000000,?,00E93379,00E92FE5), ref: 00E93409
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLastValue___vcrt_
                          • String ID:
                          • API String ID: 3852720340-0
                          • Opcode ID: f8bb772a4a1d5271c44b04ee01b737d5f0aa49ed2fdf040704bd278721a492b3
                          • Instruction ID: 51cb7a6ad6e64b7ab44bc90aac1eb34e9599c98577480611ec6e49fd2364aaea
                          • Opcode Fuzzy Hash: f8bb772a4a1d5271c44b04ee01b737d5f0aa49ed2fdf040704bd278721a492b3
                          • Instruction Fuzzy Hash: BE01247260D315BEEF2867747D859673E94EB153793202329F420F01F1EF114E016284
                          APIs
                          • GetLastError.KERNEL32(?,?,00EA5686,00EB3CD6,?,00000000,?,00EA5B6A,?,?,?,?,?,00E9E6D1,?,00F38A48), ref: 00EA2D78
                          • _free.LIBCMT ref: 00EA2DAB
                          • _free.LIBCMT ref: 00EA2DD3
                          • SetLastError.KERNEL32(00000000,?,?,?,?,00E9E6D1,?,00F38A48,00000010,00E74F4A,?,?,00000000,00EB3CD6), ref: 00EA2DE0
                          • SetLastError.KERNEL32(00000000,?,?,?,?,00E9E6D1,?,00F38A48,00000010,00E74F4A,?,?,00000000,00EB3CD6), ref: 00EA2DEC
                          • _abort.LIBCMT ref: 00EA2DF2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$_free$_abort
                          • String ID:
                          • API String ID: 3160817290-0
                          • Opcode ID: 17782dbe87003814b837dbf5ec5058d6c21a252d1add90b00718dd354233a15c
                          • Instruction ID: a60646dd4e1ff8e2d46f261c436003b2fa3428c85a49cfd1b187dc988a68d642
                          • Opcode Fuzzy Hash: 17782dbe87003814b837dbf5ec5058d6c21a252d1add90b00718dd354233a15c
                          • Instruction Fuzzy Hash: ADF0A93150550027C222373D7C06B5B2A96AFCB775B25251CFA24BE1D3EF24B8016161
                          APIs
                            • Part of subcall function 00E89639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E89693
                            • Part of subcall function 00E89639: SelectObject.GDI32(?,00000000), ref: 00E896A2
                            • Part of subcall function 00E89639: BeginPath.GDI32(?), ref: 00E896B9
                            • Part of subcall function 00E89639: SelectObject.GDI32(?,00000000), ref: 00E896E2
                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00F08A4E
                          • LineTo.GDI32(?,00000003,00000000), ref: 00F08A62
                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00F08A70
                          • LineTo.GDI32(?,00000000,00000003), ref: 00F08A80
                          • EndPath.GDI32(?), ref: 00F08A90
                          • StrokePath.GDI32(?), ref: 00F08AA0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                          • String ID:
                          • API String ID: 43455801-0
                          • Opcode ID: 5c10f26fdbab7869f052c250236c3e4065dfdb8fa721394614018e15bd416417
                          • Instruction ID: d087571ae6a4d048435d1b886ec23722cc7f65b7c91e7bad60593afd52b47906
                          • Opcode Fuzzy Hash: 5c10f26fdbab7869f052c250236c3e4065dfdb8fa721394614018e15bd416417
                          • Instruction Fuzzy Hash: 2811097640010CFFEB129F90DC88EAA7F6DFB08390F048112FA199A1A1C7719D55EBA0
                          APIs
                          • GetDC.USER32(00000000), ref: 00ED5218
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00ED5229
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00ED5230
                          • ReleaseDC.USER32(00000000,00000000), ref: 00ED5238
                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00ED524F
                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00ED5261
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: ca242e201e8034fdcd17ff8b256e48530296f09d6c744f208dbbcd7300faaa7b
                          • Instruction ID: ab6027ec7aaffcfc8de7e7442732616d8b0359919b2fa02b7a0ac4e62b4f91ab
                          • Opcode Fuzzy Hash: ca242e201e8034fdcd17ff8b256e48530296f09d6c744f208dbbcd7300faaa7b
                          • Instruction Fuzzy Hash: 3C018F75A00708BBEB109BA59D49F4EBFB8FB48351F044166FA04A7390D6709805DBA0
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E71BF4
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E71BFC
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E71C07
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E71C12
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E71C1A
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E71C22
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: 6f92590c3d0c2bac8bce027f106a2faf61d3455d05757b9a9fe54b4f9abd0b82
                          • Instruction ID: 0b5d4fb6d38cccd8409e37fb4db7bf2f32982bc958864aa2a3e3757625ee5aa5
                          • Opcode Fuzzy Hash: 6f92590c3d0c2bac8bce027f106a2faf61d3455d05757b9a9fe54b4f9abd0b82
                          • Instruction Fuzzy Hash: 64016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                          APIs
                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00EDEB30
                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00EDEB46
                          • GetWindowThreadProcessId.USER32(?,?), ref: 00EDEB55
                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EDEB64
                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EDEB6E
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EDEB75
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                          • String ID:
                          • API String ID: 839392675-0
                          • Opcode ID: 69eb99a75c207a862e19cea8e7ef094754bc4f014a5c04ff586c24125dca9bd9
                          • Instruction ID: e041265999da6b5dfd3e9aebb0c7a9f12bbbee7d2783dd074a1aa2d052568ac9
                          • Opcode Fuzzy Hash: 69eb99a75c207a862e19cea8e7ef094754bc4f014a5c04ff586c24125dca9bd9
                          • Instruction Fuzzy Hash: EBF01772240158BBE6315B629C0EEAB3A7CFBCAB15F004259FA01E119196A15A01AAF5
                          APIs
                          • GetClientRect.USER32(?), ref: 00EC7452
                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00EC7469
                          • GetWindowDC.USER32(?), ref: 00EC7475
                          • GetPixel.GDI32(00000000,?,?), ref: 00EC7484
                          • ReleaseDC.USER32(?,00000000), ref: 00EC7496
                          • GetSysColor.USER32(00000005), ref: 00EC74B0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                          • String ID:
                          • API String ID: 272304278-0
                          • Opcode ID: eab988412466392429c6207136497007b5bdae9f02ad3a28335734e4cce4a6f9
                          • Instruction ID: 9420838feaf729974bb4175684355f4d61cd254b18a69fa82590e5e413bd4363
                          • Opcode Fuzzy Hash: eab988412466392429c6207136497007b5bdae9f02ad3a28335734e4cce4a6f9
                          • Instruction Fuzzy Hash: 0E014B31400619EFDB615F64DD08FFA7BB5FB04321F550264FE69A21A1CB321E52AF90
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00ED187F
                          • UnloadUserProfile.USERENV(?,?), ref: 00ED188B
                          • CloseHandle.KERNEL32(?), ref: 00ED1894
                          • CloseHandle.KERNEL32(?), ref: 00ED189C
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00ED18A5
                          • HeapFree.KERNEL32(00000000), ref: 00ED18AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                          • String ID:
                          • API String ID: 146765662-0
                          • Opcode ID: 590dba6c549c34dc772f2be29ed6cede4f309567b32183508d084c4efcf00171
                          • Instruction ID: 9d385d1665dc4c7600d383bf98b600e7ca7f47b55470611eb24fcb79a4e67756
                          • Opcode Fuzzy Hash: 590dba6c549c34dc772f2be29ed6cede4f309567b32183508d084c4efcf00171
                          • Instruction Fuzzy Hash: 17E07576104509BBEB015FA6ED0C94ABF79FF49B22B508725F265814B1CB329461EFD0
                          APIs
                            • Part of subcall function 00E90242: EnterCriticalSection.KERNEL32(00F4070C,00F41884,?,?,00E8198B,00F42518,?,?,?,00E712F9,00000000), ref: 00E9024D
                            • Part of subcall function 00E90242: LeaveCriticalSection.KERNEL32(00F4070C,?,00E8198B,00F42518,?,?,?,00E712F9,00000000), ref: 00E9028A
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00E900A3: __onexit.LIBCMT ref: 00E900A9
                          • __Init_thread_footer.LIBCMT ref: 00EF7BFB
                            • Part of subcall function 00E901F8: EnterCriticalSection.KERNEL32(00F4070C,?,?,00E88747,00F42514), ref: 00E90202
                            • Part of subcall function 00E901F8: LeaveCriticalSection.KERNEL32(00F4070C,?,00E88747,00F42514), ref: 00E90235
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                          • String ID: +T$5$G$Variable must be of type 'Object'.
                          • API String ID: 535116098-4125810065
                          • Opcode ID: 87b80418432b30acdf91c5cf6d7e56f3ae5904d90f235ce89a79a567518102a6
                          • Instruction ID: 741578cea5840a8f52dc0bf10fdb460084747035a09e800c12813dd96edc709e
                          • Opcode Fuzzy Hash: 87b80418432b30acdf91c5cf6d7e56f3ae5904d90f235ce89a79a567518102a6
                          • Instruction Fuzzy Hash: DA919A70A04209EFCB04EF54D881DBDB7B1FF49308F549059FA8AAB292DB31AE41DB51
                          APIs
                            • Part of subcall function 00E77620: _wcslen.LIBCMT ref: 00E77625
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EDC6EE
                          • _wcslen.LIBCMT ref: 00EDC735
                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EDC79C
                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00EDC7CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ItemMenu$Info_wcslen$Default
                          • String ID: 0
                          • API String ID: 1227352736-4108050209
                          • Opcode ID: b182b2765c111502ec6e3373faa3cf0240abd4829e6dfe172209361a0e3cf305
                          • Instruction ID: cb1b4476340ba10f0728e28f4214912496fad403ac1dc009c8bdf7c0821a0f49
                          • Opcode Fuzzy Hash: b182b2765c111502ec6e3373faa3cf0240abd4829e6dfe172209361a0e3cf305
                          • Instruction Fuzzy Hash: C251E0716043029BD7149F38C884B6A77E4EF89398F242A2BF995F22D0DB70D846DB52
                          APIs
                          • ShellExecuteExW.SHELL32(0000003C), ref: 00EFAEA3
                            • Part of subcall function 00E77620: _wcslen.LIBCMT ref: 00E77625
                          • GetProcessId.KERNEL32(00000000), ref: 00EFAF38
                          • CloseHandle.KERNEL32(00000000), ref: 00EFAF67
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseExecuteHandleProcessShell_wcslen
                          • String ID: <$@
                          • API String ID: 146682121-1426351568
                          • Opcode ID: 6c2caf3923bb66be671543ab06047a61a73ec9a323d36174a8bcb786391d91fa
                          • Instruction ID: fa8b21096dee945819ecba9a9a226880f8e1ee53a61c86e1180963036ed728af
                          • Opcode Fuzzy Hash: 6c2caf3923bb66be671543ab06047a61a73ec9a323d36174a8bcb786391d91fa
                          • Instruction Fuzzy Hash: 39714871A00219DFCB14DF54C484AAEBBF5BF08314F1894A9E95AAF352C774ED41CB91
                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00ED7206
                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00ED723C
                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00ED724D
                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00ED72CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorMode$AddressCreateInstanceProc
                          • String ID: DllGetClassObject
                          • API String ID: 753597075-1075368562
                          • Opcode ID: 39a88e302bb0b936bba0dc59d3593d61261b706d78d0a769c1f9cc18a710ef12
                          • Instruction ID: 38e30f5c3300a0035dbe80aaf86cd5f9cdc0d4576744246cd1e62fb3c56892bd
                          • Opcode Fuzzy Hash: 39a88e302bb0b936bba0dc59d3593d61261b706d78d0a769c1f9cc18a710ef12
                          • Instruction Fuzzy Hash: AA41AEB1A04204EFDB15CF54C884A9A7BA9EF44314F1090AEBD45AF31AE7B1DD46DBA0
                          APIs
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F03E35
                          • IsMenu.USER32(?), ref: 00F03E4A
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F03E92
                          • DrawMenuBar.USER32 ref: 00F03EA5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert
                          • String ID: 0
                          • API String ID: 3076010158-4108050209
                          • Opcode ID: e81e70a83634fc2f2face8683abd4f19a171d48c47e85b43c731a1c98e2bee97
                          • Instruction ID: 1e472d20e56315a95f05154333e849b70448c7f3937f8eb629cc3dfb37cca1a2
                          • Opcode Fuzzy Hash: e81e70a83634fc2f2face8683abd4f19a171d48c47e85b43c731a1c98e2bee97
                          • Instruction Fuzzy Hash: 8B413B75A01209EFDB10DF50D884EEABBB9FF49364F044229F905A7290D730AE49EF90
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00ED1E66
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00ED1E79
                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00ED1EA9
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$_wcslen$ClassName
                          • String ID: ComboBox$ListBox
                          • API String ID: 2081771294-1403004172
                          • Opcode ID: a14fb0118698e5ff21761af7725e3946ad98bc66c141918de969e1a89601d190
                          • Instruction ID: 29dbf9f9157377012ee12a1d3018c21b09c390a1ed1bcef47a0bd78f7f5934a8
                          • Opcode Fuzzy Hash: a14fb0118698e5ff21761af7725e3946ad98bc66c141918de969e1a89601d190
                          • Instruction Fuzzy Hash: 33212771A00104BEDB14AB64DC46CFFB7F9EF45368B14A11AFC29B72E1DB35490B9660
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                          • API String ID: 176396367-4004644295
                          • Opcode ID: 2d6cd66d35cf1f86671fedb6dab3c4b9387b2ffd5faceb217d8fdb7128d842e2
                          • Instruction ID: e5bbe6b667758072860fedc2d3648c1685ecc8de25e6d315740c95f6f023b5e4
                          • Opcode Fuzzy Hash: 2d6cd66d35cf1f86671fedb6dab3c4b9387b2ffd5faceb217d8fdb7128d842e2
                          • Instruction Fuzzy Hash: 39310973A0096E4BCB20EF6C8A514BE33915BA1758F356029ED477B245EA71ED40D3A0
                          APIs
                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F02F8D
                          • LoadLibraryW.KERNEL32(?), ref: 00F02F94
                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F02FA9
                          • DestroyWindow.USER32(?), ref: 00F02FB1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$DestroyLibraryLoadWindow
                          • String ID: SysAnimate32
                          • API String ID: 3529120543-1011021900
                          • Opcode ID: 4839e12e9956961abf2221e6518bbb08a83ee10018e571886952523c9ef034f0
                          • Instruction ID: 832a39a20d81d622872014be9c0b5d8c091e671c01f02d86ac29ee24fae85cdc
                          • Opcode Fuzzy Hash: 4839e12e9956961abf2221e6518bbb08a83ee10018e571886952523c9ef034f0
                          • Instruction Fuzzy Hash: 1921B872A0020AEBEB215F649C88EBB77B9EB593B5F100218FA10921D0C771DC81B7B0
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00E94D1E,00EA28E9,(,00E94CBE,00000000,00F388B8,0000000C,00E94E15,(,00000002), ref: 00E94D8D
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E94DA0
                          • FreeLibrary.KERNEL32(00000000,?,?,?,00E94D1E,00EA28E9,(,00E94CBE,00000000,00F388B8,0000000C,00E94E15,(,00000002,00000000), ref: 00E94DC3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 7b5f9266d967e2afe892522f4d6e988e4b4d7d629460a634fce54c5023d1b1ab
                          • Instruction ID: b58a395c6bf8b9d32783b83bdb79183786595299c21252b80bdcda3888fbde08
                          • Opcode Fuzzy Hash: 7b5f9266d967e2afe892522f4d6e988e4b4d7d629460a634fce54c5023d1b1ab
                          • Instruction Fuzzy Hash: F7F03C74A4020CABDB159B90DC49BEDBBA5EB44756F0402A4F809A22A0DB709981EBD1
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E74EDD,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E9C
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E74EAE
                          • FreeLibrary.KERNEL32(00000000,?,?,00E74EDD,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74EC0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 145871493-3689287502
                          • Opcode ID: b994d5247bb1685eec9ad18d5435caf5e684379b4c3d218f1947daa60973d288
                          • Instruction ID: e25547401fc4dffbd9244191f289f12c2f33fca29d1225174027e25fbdcd7b66
                          • Opcode Fuzzy Hash: b994d5247bb1685eec9ad18d5435caf5e684379b4c3d218f1947daa60973d288
                          • Instruction Fuzzy Hash: 1AE0CD76A015225BD23117256C18F6F7554FFC1F76B054215FC04F7180DB64CD01A1E1
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EB3CDE,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E62
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E74E74
                          • FreeLibrary.KERNEL32(00000000,?,?,00EB3CDE,?,00F41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E74E87
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 145871493-1355242751
                          • Opcode ID: 52253553adb7955a9f20c587f517b451e72957e3b0043511ae5e0e39a495c4f8
                          • Instruction ID: a6dddf9133a752ae96ed242a565801d3e4295539d87458be657a8ea743947385
                          • Opcode Fuzzy Hash: 52253553adb7955a9f20c587f517b451e72957e3b0043511ae5e0e39a495c4f8
                          • Instruction Fuzzy Hash: 6AD0C23250262257C7221B246C08D8B7A1CFF85B393055311BC08F6194CF60CD01A2D0
                          APIs
                          • GetCurrentProcessId.KERNEL32 ref: 00EFA427
                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00EFA435
                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00EFA468
                          • CloseHandle.KERNEL32(?), ref: 00EFA63D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$CloseCountersCurrentHandleOpen
                          • String ID:
                          • API String ID: 3488606520-0
                          • Opcode ID: 98cd89f6a0b9f885b9cecba07bd582da741faadf10c5a77e54a7c767a2039c19
                          • Instruction ID: 4476acc5009240c8b6a559062cc31c794731b37d8f949e5afdba6520c17e8e01
                          • Opcode Fuzzy Hash: 98cd89f6a0b9f885b9cecba07bd582da741faadf10c5a77e54a7c767a2039c19
                          • Instruction Fuzzy Hash: 07A172B16043019FD724DF24C886F2AB7E5AF84714F18986DF95EAB392D770EC418B92
                          APIs
                            • Part of subcall function 00EDDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EDCF22,?), ref: 00EDDDFD
                            • Part of subcall function 00EDDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EDCF22,?), ref: 00EDDE16
                            • Part of subcall function 00EDE199: GetFileAttributesW.KERNEL32(?,00EDCF95), ref: 00EDE19A
                          • lstrcmpiW.KERNEL32(?,?), ref: 00EDE473
                          • MoveFileW.KERNEL32(?,?), ref: 00EDE4AC
                          • _wcslen.LIBCMT ref: 00EDE5EB
                          • _wcslen.LIBCMT ref: 00EDE603
                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00EDE650
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                          • String ID:
                          • API String ID: 3183298772-0
                          • Opcode ID: 6036a27c64b293de3f4aa3fda951f36724ded7305d8f36c6fc9dfaeea9c03981
                          • Instruction ID: 6dbc869f0d093fccb8e3180300180ef43d6fb8c5ce7d5a3cd7ffadabcf6dde63
                          • Opcode Fuzzy Hash: 6036a27c64b293de3f4aa3fda951f36724ded7305d8f36c6fc9dfaeea9c03981
                          • Instruction Fuzzy Hash: A55181B24083455BC724EB90DC859DFB3ECEF84344F00591FF599E7291EE34A5898766
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00EFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EFB6AE,?,?), ref: 00EFC9B5
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFC9F1
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA68
                            • Part of subcall function 00EFC998: _wcslen.LIBCMT ref: 00EFCA9E
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EFBAA5
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EFBB00
                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00EFBB63
                          • RegCloseKey.ADVAPI32(?,?), ref: 00EFBBA6
                          • RegCloseKey.ADVAPI32(00000000), ref: 00EFBBB3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                          • String ID:
                          • API String ID: 826366716-0
                          • Opcode ID: 6ec3c985ac17ee131b64ba6fd315199f611ec36a6cbcade1e2c5aa1458b34af7
                          • Instruction ID: 1cfae001fa0b7cbeda145309e10910fcf80b815b1c4e1acdafd9a87407f4f6ee
                          • Opcode Fuzzy Hash: 6ec3c985ac17ee131b64ba6fd315199f611ec36a6cbcade1e2c5aa1458b34af7
                          • Instruction Fuzzy Hash: 1261AF31208245AFD714DF14C891E3ABBE5FF84308F14999CF5999B2A2DB31ED45CB92
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00ED8BCD
                          • VariantClear.OLEAUT32 ref: 00ED8C3E
                          • VariantClear.OLEAUT32 ref: 00ED8C9D
                          • VariantClear.OLEAUT32(?), ref: 00ED8D10
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00ED8D3B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeInitType
                          • String ID:
                          • API String ID: 4136290138-0
                          • Opcode ID: 5fb8ccdc13c90e0c3c8ba591505cdcfab24988a4c1c4babd439d40ea2cc68c84
                          • Instruction ID: 1add4a50caaa652cfb023487d64ae562995a6383f567bf443b437a42eaa6c1c3
                          • Opcode Fuzzy Hash: 5fb8ccdc13c90e0c3c8ba591505cdcfab24988a4c1c4babd439d40ea2cc68c84
                          • Instruction Fuzzy Hash: 1A515DB5A00619EFCB14CF58C894AAAB7F9FF89314B15855AF905EB350E730E912CF90
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00EE8BAE
                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00EE8BDA
                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00EE8C32
                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00EE8C57
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00EE8C5F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String
                          • String ID:
                          • API String ID: 2832842796-0
                          • Opcode ID: 6cb52a97722a8f9fb86e1bba1b912c6fdc2cfdfa6799af2d9bcb7bf07b5e5660
                          • Instruction ID: 8eb4cb5947761bf23528743e1bd16e9842a7d6c1fa07af8820f6b6fe39819fe6
                          • Opcode Fuzzy Hash: 6cb52a97722a8f9fb86e1bba1b912c6fdc2cfdfa6799af2d9bcb7bf07b5e5660
                          • Instruction Fuzzy Hash: 88513735A00218AFCB05DF65C881A6ABBF5FF49314F18D458E84DAB3A2CB31ED51CB91
                          APIs
                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00EF8F40
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00EF8FD0
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EF8FEC
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00EF9032
                          • FreeLibrary.KERNEL32(00000000), ref: 00EF9052
                            • Part of subcall function 00E8F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00EE1043,?,753CE610), ref: 00E8F6E6
                            • Part of subcall function 00E8F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00ECFA64,00000000,00000000,?,?,00EE1043,?,753CE610,?,00ECFA64), ref: 00E8F70D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                          • String ID:
                          • API String ID: 666041331-0
                          • Opcode ID: ecc54340b81f63e43048a097935687639a35d451d178a4d91bc481fae4099099
                          • Instruction ID: c1f8bfd6ac71056acbb332440072d2306cbc523d37f22f2f89201acde249050a
                          • Opcode Fuzzy Hash: ecc54340b81f63e43048a097935687639a35d451d178a4d91bc481fae4099099
                          • Instruction Fuzzy Hash: 2C514B35600209DFC715DF58C484DADBBF1FF49318B0891A9E94AAB362DB31ED85CB91
                          APIs
                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00F06C33
                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00F06C4A
                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00F06C73
                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00EEAB79,00000000,00000000), ref: 00F06C98
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00F06CC7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Long$MessageSendShow
                          • String ID:
                          • API String ID: 3688381893-0
                          • Opcode ID: fa82c1cafac3653e6d6a9cf1623ee35f34ef36913a3a0877350cbad303c16d24
                          • Instruction ID: 31a685e8fb5489892abf596b1b979e53e309dad9ed8b9bd401309b3dd641b4ca
                          • Opcode Fuzzy Hash: fa82c1cafac3653e6d6a9cf1623ee35f34ef36913a3a0877350cbad303c16d24
                          • Instruction Fuzzy Hash: D641D375A00104AFE724CF28CC58FA97BA5EB09360F154228FC99E72E0C371AD61FA80
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free
                          • String ID:
                          • API String ID: 269201875-0
                          • Opcode ID: 27338cb05e6bada451b124aec8c4573d1cc92355672431bef23a7ae28cee1eb9
                          • Instruction ID: 91939099ad6a693100365f9241a8f7dbaf0a5007e57808deccaa13e8f8840f33
                          • Opcode Fuzzy Hash: 27338cb05e6bada451b124aec8c4573d1cc92355672431bef23a7ae28cee1eb9
                          • Instruction Fuzzy Hash: 5C41DE72A002049FCB24DF7CC880A5AB7E6EF8A724B1545ADE615FF391DA31BD01CB81
                          APIs
                          • GetCursorPos.USER32(?), ref: 00E89141
                          • ScreenToClient.USER32(00000000,?), ref: 00E8915E
                          • GetAsyncKeyState.USER32(00000001), ref: 00E89183
                          • GetAsyncKeyState.USER32(00000002), ref: 00E8919D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorScreen
                          • String ID:
                          • API String ID: 4210589936-0
                          • Opcode ID: 067887daeedfac221788f0a8bf877416f550e8d500611ccbe6250abef6c3e4a5
                          • Instruction ID: 9659c6e27a89fbc2b65f8fe11668a122bc2a7ded59ad88dbb38559452e1f5360
                          • Opcode Fuzzy Hash: 067887daeedfac221788f0a8bf877416f550e8d500611ccbe6250abef6c3e4a5
                          • Instruction Fuzzy Hash: 99419D31A0861ABBDF05AF64C848BFEB774FB05324F288219E869B32D1C7356950DF91
                          APIs
                          • GetInputState.USER32 ref: 00EE38CB
                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00EE3922
                          • TranslateMessage.USER32(?), ref: 00EE394B
                          • DispatchMessageW.USER32(?), ref: 00EE3955
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EE3966
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                          • String ID:
                          • API String ID: 2256411358-0
                          • Opcode ID: 2c38af37ae4f380b31e632682423191d696048969026d2415258cadbb4c26707
                          • Instruction ID: f5274e742941a492ae917f7a5cca3c393fcafdab9efe57cdf0aba3c4cb99bf2b
                          • Opcode Fuzzy Hash: 2c38af37ae4f380b31e632682423191d696048969026d2415258cadbb4c26707
                          • Instruction Fuzzy Hash: 1231F9745043CD9EEB35CB36DC0CBB637A8BB52308F041569E852A31D5E3B69684DB21
                          APIs
                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00EEC21E,00000000), ref: 00EECF38
                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00EECF6F
                          • GetLastError.KERNEL32(?,00000000,?,?,?,00EEC21E,00000000), ref: 00EECFB4
                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EEC21E,00000000), ref: 00EECFC8
                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EEC21E,00000000), ref: 00EECFF2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                          • String ID:
                          • API String ID: 3191363074-0
                          • Opcode ID: 6d9f9d5d56285b9c8f7055fd57f5dde5e647f13dd089c8600fa768d5d53fcd7b
                          • Instruction ID: 6f1ee5f2c8d43177aa2d2f47f761145d6941983bae521c6d6182d8ddeb59d17e
                          • Opcode Fuzzy Hash: 6d9f9d5d56285b9c8f7055fd57f5dde5e647f13dd089c8600fa768d5d53fcd7b
                          • Instruction Fuzzy Hash: 2F315071604649EFDB20DFA6C884AABBBF9FF14355B20542EF50AE2150D730ED42DBA0
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00ED1915
                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00ED19C1
                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00ED19C9
                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00ED19DA
                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00ED19E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessagePostSleep$RectWindow
                          • String ID:
                          • API String ID: 3382505437-0
                          • Opcode ID: fd50d66fab71faba01aa2fc47e874534e7552b94f4d9b7d666354c5e7bfeb717
                          • Instruction ID: b8a1da79b9406c135678582d90249c6dc88dc537b9a425f076e92f3ee91f0def
                          • Opcode Fuzzy Hash: fd50d66fab71faba01aa2fc47e874534e7552b94f4d9b7d666354c5e7bfeb717
                          • Instruction Fuzzy Hash: 5F31CD71A00219EFCB10CFA8C9A8ADE3BB5FB44318F00536AF921AB2D1C3709945DB90
                          APIs
                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F05745
                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F0579D
                          • _wcslen.LIBCMT ref: 00F057AF
                          • _wcslen.LIBCMT ref: 00F057BA
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F05816
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$_wcslen
                          • String ID:
                          • API String ID: 763830540-0
                          • Opcode ID: 800d6d6bd30ba19dcae6e58e8dfc35946c5e404ae329a2b6140fc799a883d06a
                          • Instruction ID: cd81f429f2aef39405530bcbb42d1342ad1008f2d34e9d4fd5a320a304ebab9b
                          • Opcode Fuzzy Hash: 800d6d6bd30ba19dcae6e58e8dfc35946c5e404ae329a2b6140fc799a883d06a
                          • Instruction Fuzzy Hash: EF214175D04618AADF20DFA4CC85AEE77B8FF44B24F108256ED19AA1C0D7B09985FF50
                          APIs
                          • IsWindow.USER32(00000000), ref: 00EF0951
                          • GetForegroundWindow.USER32 ref: 00EF0968
                          • GetDC.USER32(00000000), ref: 00EF09A4
                          • GetPixel.GDI32(00000000,?,00000003), ref: 00EF09B0
                          • ReleaseDC.USER32(00000000,00000003), ref: 00EF09E8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ForegroundPixelRelease
                          • String ID:
                          • API String ID: 4156661090-0
                          • Opcode ID: f2c1421b311129ac241ae86dcabbeed00d025b4da36877b8bfcf072936e5abf5
                          • Instruction ID: f5fab17156c373dd34a2834202c661febeea5a86a44b500ff5b2d7d5204869be
                          • Opcode Fuzzy Hash: f2c1421b311129ac241ae86dcabbeed00d025b4da36877b8bfcf072936e5abf5
                          • Instruction Fuzzy Hash: B5218435600208AFD714EF65C945AAEB7E9FF84700F048169F94AA7362DB70AC44DB90
                          APIs
                          • GetEnvironmentStringsW.KERNEL32 ref: 00EACDC6
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00EACDE9
                            • Part of subcall function 00EA3820: RtlAllocateHeap.NTDLL(00000000,?,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6,?,00E71129), ref: 00EA3852
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00EACE0F
                          • _free.LIBCMT ref: 00EACE22
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EACE31
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                          • String ID:
                          • API String ID: 336800556-0
                          • Opcode ID: 59cc8423d673fd3b7c5d73e81679187c10570f1313a33e6c6e64f86786d99557
                          • Instruction ID: 43b5b99c7b8348ba712053608da951111821392e0e336a9a6327750ee56b56da
                          • Opcode Fuzzy Hash: 59cc8423d673fd3b7c5d73e81679187c10570f1313a33e6c6e64f86786d99557
                          • Instruction Fuzzy Hash: 5C01FC726012157F672117B66C4CC7B7E6DEECBBA53255229FD05FB201EA609D0191F0
                          APIs
                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E89693
                          • SelectObject.GDI32(?,00000000), ref: 00E896A2
                          • BeginPath.GDI32(?), ref: 00E896B9
                          • SelectObject.GDI32(?,00000000), ref: 00E896E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: c2b360f5521b51c0c3fd5fd53c0a93e51bade334cf93145522c1fe0b1d94a149
                          • Instruction ID: ef4e8c491b383640cda99845c3cb9561d330b8ed0b72885d66440534139f494f
                          • Opcode Fuzzy Hash: c2b360f5521b51c0c3fd5fd53c0a93e51bade334cf93145522c1fe0b1d94a149
                          • Instruction Fuzzy Hash: A8215074802309EFDB11AF64DC14BBD3BA8BB61359F144216F828B61B1E3705895FF94
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: ca06ce6b071b49aaa19daf68bb49e4c610bc96d7a6495f7dbba3b6ebe5c2c4c5
                          • Instruction ID: 7e83766520e2625da23b14810c7eb32490eebcc95f7688b5887047d60d743ea9
                          • Opcode Fuzzy Hash: ca06ce6b071b49aaa19daf68bb49e4c610bc96d7a6495f7dbba3b6ebe5c2c4c5
                          • Instruction Fuzzy Hash: 8501D6A3641606FAE61891109D42EFA739CDB61398B205023FD04BA781F620ED2596A1
                          APIs
                          • GetLastError.KERNEL32(?,?,?,00E9F2DE,00EA3863,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6), ref: 00EA2DFD
                          • _free.LIBCMT ref: 00EA2E32
                          • _free.LIBCMT ref: 00EA2E59
                          • SetLastError.KERNEL32(00000000,00E71129), ref: 00EA2E66
                          • SetLastError.KERNEL32(00000000,00E71129), ref: 00EA2E6F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$_free
                          • String ID:
                          • API String ID: 3170660625-0
                          • Opcode ID: 8ef044d6ca62be369f4cc453445339081c5c474e501ddca4764291bbfdf9437d
                          • Instruction ID: 8af2d65ed589b539662dd8fc3683d6b1bd44394bd0495740ac7e0b19c3000ed4
                          • Opcode Fuzzy Hash: 8ef044d6ca62be369f4cc453445339081c5c474e501ddca4764291bbfdf9437d
                          • Instruction Fuzzy Hash: F30149322046002BC623233D2C45D2B3699ABCF774720A12CF624FA1D2EF30EC412160
                          APIs
                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?,?,00ED035E), ref: 00ED002B
                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?), ref: 00ED0046
                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?), ref: 00ED0054
                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?), ref: 00ED0064
                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00ECFF41,80070057,?,?), ref: 00ED0070
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: From$Prog$FreeStringTasklstrcmpi
                          • String ID:
                          • API String ID: 3897988419-0
                          • Opcode ID: 57e7953d421487597cba66a5059bbb85b8d914edbd162473a3139beb8b59edd5
                          • Instruction ID: ad639f8d77ab5b3c4f1575f92da9403b1b8e56621849a3711f9f0b24aaf4485f
                          • Opcode Fuzzy Hash: 57e7953d421487597cba66a5059bbb85b8d914edbd162473a3139beb8b59edd5
                          • Instruction Fuzzy Hash: 5201AD72600208BFDB114F68DC04BAA7AEDFF84792F189625F905E2310E771DD41ABA0
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?), ref: 00EDE997
                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00EDE9A5
                          • Sleep.KERNEL32(00000000), ref: 00EDE9AD
                          • QueryPerformanceCounter.KERNEL32(?), ref: 00EDE9B7
                          • Sleep.KERNEL32 ref: 00EDE9F3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: e0b445745af4d2adea4344423ef11b8697180ba6f77e3e2b7f5d7e1046901e06
                          • Instruction ID: f133d15b8248ef22efab2fb90c9bbbf0b4f085ca9409757478c01ca1244fdd7d
                          • Opcode Fuzzy Hash: e0b445745af4d2adea4344423ef11b8697180ba6f77e3e2b7f5d7e1046901e06
                          • Instruction Fuzzy Hash: DD015731C0262DDBCF04ABE5D86DAEEBB78FF48300F001696E502B6341CB3095529BA1
                          APIs
                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00ED1114
                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1120
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED112F
                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00ED0B9B,?,?,?), ref: 00ED1136
                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00ED114D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 842720411-0
                          • Opcode ID: a85ba79d5d51a078f816a9dbef58d8a65819b42c3179d04ed849087a2523723f
                          • Instruction ID: fd2c265c6aa34f13e59f66d04640b9cd03ef80e8669956291e08998e90263d03
                          • Opcode Fuzzy Hash: a85ba79d5d51a078f816a9dbef58d8a65819b42c3179d04ed849087a2523723f
                          • Instruction Fuzzy Hash: B0018C75201209BFEB114FA5DC49E6A3F7EFF893A4B210559FA45D3360DB31DC00AAA0
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00ED0FCA
                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00ED0FD6
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00ED0FE5
                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00ED0FEC
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00ED1002
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 65b629044bd61206ddc084d6f15e4754e3f647cd613e9ae121b4974848e5d0cf
                          • Instruction ID: 472f92fb9cf24f94f3dd931a930e6471383861da4ca4f4efc692315835ab587e
                          • Opcode Fuzzy Hash: 65b629044bd61206ddc084d6f15e4754e3f647cd613e9ae121b4974848e5d0cf
                          • Instruction Fuzzy Hash: 45F0A935200309BBDB211FA5AC49F563BAEFF89762F100519FA49D6291CA30DC409AA0
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00ED102A
                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1036
                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1045
                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED104C
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1062
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 32ebb004106960f85279a9df131766333a268a5b9dbf21ef9874db79a22bba76
                          • Instruction ID: 3f9ee33c6a336e7e5c2a8836653fd1c31fec8b28ef7db09773735b1b41a606a5
                          • Opcode Fuzzy Hash: 32ebb004106960f85279a9df131766333a268a5b9dbf21ef9874db79a22bba76
                          • Instruction Fuzzy Hash: B3F06D35200309FBDB216FA5EC49F563BADFF897A1F100515FA45D7251CA70D841EAA0
                          APIs
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE0324
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE0331
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE033E
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE034B
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE0358
                          • CloseHandle.KERNEL32(?,?,?,?,00EE017D,?,00EE32FC,?,00000001,00EB2592,?), ref: 00EE0365
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: fdbbba0e479be38a168456e3393b8ff104b48cce9aa348f8587591a92fd39c76
                          • Instruction ID: 0c2a495f3f5b6299d0fb39d7499f244a1a5b395fa7cc9e2873bb80a3f1f1e1eb
                          • Opcode Fuzzy Hash: fdbbba0e479be38a168456e3393b8ff104b48cce9aa348f8587591a92fd39c76
                          • Instruction Fuzzy Hash: F101A272800B599FC7309F66D880412F7F5BF503193159A3FD19662931C3B1A994DF80
                          APIs
                          • _free.LIBCMT ref: 00EAD752
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • _free.LIBCMT ref: 00EAD764
                          • _free.LIBCMT ref: 00EAD776
                          • _free.LIBCMT ref: 00EAD788
                          • _free.LIBCMT ref: 00EAD79A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: bfe3fcfb8e7ffa8bfc26cc3b3504114c98e21b5421a33a897b5c0dcfee84cf7e
                          • Instruction ID: 2657a8ebdf6be4e87f448c9b08c4ac282304a462d86925ff2af88469ec9d1c01
                          • Opcode Fuzzy Hash: bfe3fcfb8e7ffa8bfc26cc3b3504114c98e21b5421a33a897b5c0dcfee84cf7e
                          • Instruction Fuzzy Hash: DDF04432509208AF8655EB58FDC1C177BDEBB4E724795280AF145FB911C720FC8047A1
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00ED5C58
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00ED5C6F
                          • MessageBeep.USER32(00000000), ref: 00ED5C87
                          • KillTimer.USER32(?,0000040A), ref: 00ED5CA3
                          • EndDialog.USER32(?,00000001), ref: 00ED5CBD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: 53dd8c0e9f8e5a3ec0cbd25b901fbc61fccabeae87fff68e40c38385ccb78d84
                          • Instruction ID: e69226db23da39aef4b5fcef6b77cc90e3d892f50b2ffab1f9e976ab7ffdf6b1
                          • Opcode Fuzzy Hash: 53dd8c0e9f8e5a3ec0cbd25b901fbc61fccabeae87fff68e40c38385ccb78d84
                          • Instruction Fuzzy Hash: 0C018631510B08ABEB305B10DD4EFA6BBB8FB00B45F04165AA587B11E1DBF1A9859E90
                          APIs
                          • _free.LIBCMT ref: 00EA22BE
                            • Part of subcall function 00EA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000), ref: 00EA29DE
                            • Part of subcall function 00EA29C8: GetLastError.KERNEL32(00000000,?,00EAD7D1,00000000,00000000,00000000,00000000,?,00EAD7F8,00000000,00000007,00000000,?,00EADBF5,00000000,00000000), ref: 00EA29F0
                          • _free.LIBCMT ref: 00EA22D0
                          • _free.LIBCMT ref: 00EA22E3
                          • _free.LIBCMT ref: 00EA22F4
                          • _free.LIBCMT ref: 00EA2305
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: fb63b88ae4a3bcb79b7b01a878c2deac5630e0be9dfd29f9a771913807b63dc0
                          • Instruction ID: 736fe4c95b2db66ff7615c126ae3d663321467d41c2b113a926b0af1c08a4e76
                          • Opcode Fuzzy Hash: fb63b88ae4a3bcb79b7b01a878c2deac5630e0be9dfd29f9a771913807b63dc0
                          • Instruction Fuzzy Hash: FBF030784002188F8752AF68BC0180A3FA5F76FB71700151EFA10FA371CB302651BBE5
                          APIs
                          • EndPath.GDI32(?), ref: 00E895D4
                          • StrokeAndFillPath.GDI32(?,?,00EC71F7,00000000,?,?,?), ref: 00E895F0
                          • SelectObject.GDI32(?,00000000), ref: 00E89603
                          • DeleteObject.GDI32 ref: 00E89616
                          • StrokePath.GDI32(?), ref: 00E89631
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Path$ObjectStroke$DeleteFillSelect
                          • String ID:
                          • API String ID: 2625713937-0
                          • Opcode ID: dab2ff35648d55751a0766e0b6c9b55e285e5d2d1c554b1dba8f245e335a632b
                          • Instruction ID: 84ee6ec56308f55a39b11eb56e878725eef89e372272c483d36c4d1a05d2f7b2
                          • Opcode Fuzzy Hash: dab2ff35648d55751a0766e0b6c9b55e285e5d2d1c554b1dba8f245e335a632b
                          • Instruction Fuzzy Hash: 0FF0193840620CEFDB126F65ED187643B61BB12326F089314F92DA51F1D7308995FF60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: __freea$_free
                          • String ID: a/p$am/pm
                          • API String ID: 3432400110-3206640213
                          • Opcode ID: 0bbf34c190939de5888a6815691521a6a899afaed1a5ae2742eb67d5e7eebef1
                          • Instruction ID: d93509f2953d7fb4f37c66ab548f035f5cd31c3a7b281571104f7e877512e5ae
                          • Opcode Fuzzy Hash: 0bbf34c190939de5888a6815691521a6a899afaed1a5ae2742eb67d5e7eebef1
                          • Instruction Fuzzy Hash: 1DD1F1359002069ACF249F68C895BFAB7B1EF0F314F292199E501BF650D375BD84CBA1
                          APIs
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00EA8B6E
                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00EA8B7A
                          • __dosmaperr.LIBCMT ref: 00EA8B81
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide__dosmaperr
                          • String ID: .
                          • API String ID: 2434981716-3963672497
                          • Opcode ID: b8099c4df856df69fab8aa87aab364504801142a6ebb4f41cea5ecd56b7eeb22
                          • Instruction ID: 6c86f4ef418e08825f50cf54c42adb80d167c144ddb5a9114754ae080edad479
                          • Opcode Fuzzy Hash: b8099c4df856df69fab8aa87aab364504801142a6ebb4f41cea5ecd56b7eeb22
                          • Instruction Fuzzy Hash: AE418074604045AFCB249F14C980ABD7FE5DF8F314B285169F885AF152DD31EC0297A0
                          APIs
                            • Part of subcall function 00EDB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00ED21D0,?,?,00000034,00000800,?,00000034), ref: 00EDB42D
                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00ED2760
                            • Part of subcall function 00EDB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00ED21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00EDB3F8
                            • Part of subcall function 00EDB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00EDB355
                            • Part of subcall function 00EDB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00ED2194,00000034,?,?,00001004,00000000,00000000), ref: 00EDB365
                            • Part of subcall function 00EDB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00ED2194,00000034,?,?,00001004,00000000,00000000), ref: 00EDB37B
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ED27CD
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ED281A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @
                          • API String ID: 4150878124-2766056989
                          • Opcode ID: 6eba84a72e0e493124e49f6c824ef56cc13c4b720bbaf2df525d14668de8521a
                          • Instruction ID: f3397a705a9d96e3d172b7307bc948e11eafe58af13eed2076be21ce6f98df05
                          • Opcode Fuzzy Hash: 6eba84a72e0e493124e49f6c824ef56cc13c4b720bbaf2df525d14668de8521a
                          • Instruction Fuzzy Hash: BD413D76900218AFDB10DFA4CD45ADEBBB8EF09300F00509AFA55B7281DB716E46DBA0
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Arrival Notice.exe,00000104), ref: 00EA1769
                          • _free.LIBCMT ref: 00EA1834
                          • _free.LIBCMT ref: 00EA183E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free$FileModuleName
                          • String ID: C:\Users\user\Desktop\Arrival Notice.exe
                          • API String ID: 2506810119-2828020761
                          • Opcode ID: 1303b30ad68ec1e092d233602384c1fba6454bd9ff38ee691e1c9245d969d4a6
                          • Instruction ID: 20ad3fde599a8b3d14adea77bc87885ba717c2feb48fcd2fc440e91e778facdd
                          • Opcode Fuzzy Hash: 1303b30ad68ec1e092d233602384c1fba6454bd9ff38ee691e1c9245d969d4a6
                          • Instruction Fuzzy Hash: 0F318475A04218AFDB25DB99D881D9EBBFCEB9B310F1051AAF904EB211D6706E40DB90
                          APIs
                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00EDC306
                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00EDC34C
                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F41990,018E5708), ref: 00EDC395
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem
                          • String ID: 0
                          • API String ID: 135850232-4108050209
                          • Opcode ID: 34471a85a4bc5765ad948f3edd6b1b7441322b61974416465724c6ed7b519844
                          • Instruction ID: 6c84efdc3e67a107c338ab1b1cfc956578b3b128de26d0561fc6fee6c222c816
                          • Opcode Fuzzy Hash: 34471a85a4bc5765ad948f3edd6b1b7441322b61974416465724c6ed7b519844
                          • Instruction Fuzzy Hash: 9341D431204342AFDB20DF28D884B6ABBE4EF85354F24966EF965A73D1D730E805CB52
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F0CC08,00000000,?,?,?,?), ref: 00F044AA
                          • GetWindowLongW.USER32 ref: 00F044C7
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F044D7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: 636b2f4420e8271eb3d22a5e8e8d38340ea7a81c1ecc314fd0548aea67a3c794
                          • Instruction ID: 529c376c1ae7fc10588b8559b84f167111d08d02e6773c6b377d534dddb21ece
                          • Opcode Fuzzy Hash: 636b2f4420e8271eb3d22a5e8e8d38340ea7a81c1ecc314fd0548aea67a3c794
                          • Instruction Fuzzy Hash: 12319C76610209ABDB219F38DC45BEA77A9EB08334F244315FA79A21D0D770EC50BB50
                          APIs
                          • SysReAllocString.OLEAUT32(?,?), ref: 00ED6EED
                          • VariantCopyInd.OLEAUT32(?,?), ref: 00ED6F08
                          • VariantClear.OLEAUT32(?), ref: 00ED6F12
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyString
                          • String ID: *j
                          • API String ID: 2173805711-1845181700
                          • Opcode ID: dbcc0484afb917a108cf3826567ec45d75b2703961a3bb1b323f7be9b61e2d44
                          • Instruction ID: 8fbddc235a1459fea753e98d7abcd91974dd27dfe444c64aca865ac973b19d8d
                          • Opcode Fuzzy Hash: dbcc0484afb917a108cf3826567ec45d75b2703961a3bb1b323f7be9b61e2d44
                          • Instruction Fuzzy Hash: 98317EB1704645DBCB05AFA4E8919BE37B6FF85304B10549AF9066F3A1C7349912DBD0
                          APIs
                            • Part of subcall function 00EF335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00EF3077,?,?), ref: 00EF3378
                          • inet_addr.WSOCK32(?), ref: 00EF307A
                          • _wcslen.LIBCMT ref: 00EF309B
                          • htons.WSOCK32(00000000), ref: 00EF3106
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                          • String ID: 255.255.255.255
                          • API String ID: 946324512-2422070025
                          • Opcode ID: ed3b0f5211c01f9e90da34b26d8d0d57a38040ab2e69874ebe2a19a2982cd825
                          • Instruction ID: 293e0308c2147ac54e17a35db67f7eb132d3c4fee7a59dacc750f9b8af6df2fd
                          • Opcode Fuzzy Hash: ed3b0f5211c01f9e90da34b26d8d0d57a38040ab2e69874ebe2a19a2982cd825
                          • Instruction Fuzzy Hash: DA31D5356002099FCB20CF38C485EBA77E0EF54318F24D15AEA15AB392DB72DE45C761
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F03F40
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F03F54
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F03F78
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: 39417660a4f0e0cbf3ed02d4a9d413c64893405dedf13094bda2938b8b81a625
                          • Instruction ID: 7bd211aac6b6a04aaedb80a6aa07ae9022dc4fba3c0ed4c61e49e9e3d2f49fee
                          • Opcode Fuzzy Hash: 39417660a4f0e0cbf3ed02d4a9d413c64893405dedf13094bda2938b8b81a625
                          • Instruction Fuzzy Hash: D6219F32A00219BBDF259F50DC46FEA3B79EF48724F110214FE196B1D0DAB5A991EB90
                          APIs
                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F04705
                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F04713
                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F0471A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$DestroyWindow
                          • String ID: msctls_updown32
                          • API String ID: 4014797782-2298589950
                          • Opcode ID: 901fefad1d9b5783bf0ec89ab43e86f9af1fc4eaf60b0b531cc9e536dc97dbe6
                          • Instruction ID: 91f2de19922ac81a1ec6d67f89212fa0faeb1a45a9194cdfdd7da138a70cb970
                          • Opcode Fuzzy Hash: 901fefad1d9b5783bf0ec89ab43e86f9af1fc4eaf60b0b531cc9e536dc97dbe6
                          • Instruction Fuzzy Hash: 66215EF5600208AFEB10DF68DC91DA737EDEF5A3A4B040459FA049B2A1DB31FC51EA60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                          • API String ID: 176396367-2734436370
                          • Opcode ID: 7e21399b4911e754584c7328d0074d53bff52f491d7195f6922e1b81d2e7a995
                          • Instruction ID: dd24fae2b8a6c0d7db4d3fa01afddedcea1b0937351186a898a11954d3c2340f
                          • Opcode Fuzzy Hash: 7e21399b4911e754584c7328d0074d53bff52f491d7195f6922e1b81d2e7a995
                          • Instruction Fuzzy Hash: 2B2123B220421166C731BA24AC02FAB73D8DF91314F106027F959B7282EB55ED97D3A5
                          APIs
                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F03840
                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F03850
                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F03876
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend$MoveWindow
                          • String ID: Listbox
                          • API String ID: 3315199576-2633736733
                          • Opcode ID: f99aba6ce406e0315fe36b0b472a7292a6d553d2d3ed4776fd9ee37438aff5d3
                          • Instruction ID: 11455164c3dcc35ad582e3a7b9b070a69cc24ad6d6f3b65061b033664734d999
                          • Opcode Fuzzy Hash: f99aba6ce406e0315fe36b0b472a7292a6d553d2d3ed4776fd9ee37438aff5d3
                          • Instruction Fuzzy Hash: CD21BE72A10218BBEF218F54CC81FAB37AEEF89760F108124F9449B1D0CA71DC52A7A0
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00EE4A08
                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00EE4A5C
                          • SetErrorMode.KERNEL32(00000000,?,?,00F0CC08), ref: 00EE4AD0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume
                          • String ID: %lu
                          • API String ID: 2507767853-685833217
                          • Opcode ID: dbec877bf27f72b105bfd5bccfd5aef3a565323c274c0026a3a92975f2f41be9
                          • Instruction ID: cce74a4e6a169ae61fa230933a22bc5121cc46d2dda7c6213923fe5b5df294a3
                          • Opcode Fuzzy Hash: dbec877bf27f72b105bfd5bccfd5aef3a565323c274c0026a3a92975f2f41be9
                          • Instruction Fuzzy Hash: EA316275A00109AFDB10DF54C885EAABBF8EF08318F1480A5F909EB392D771ED45DBA1
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F0424F
                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F04264
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F04271
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: b99a9428e1e6bb6a04e6ab2cac0656197dec3972e637474918eb5e66baa591c0
                          • Instruction ID: 1f4e31d2a10f6d68ef1f466fa140c936e2ea9dc36f6007af98e6bf851b93c35b
                          • Opcode Fuzzy Hash: b99a9428e1e6bb6a04e6ab2cac0656197dec3972e637474918eb5e66baa591c0
                          • Instruction Fuzzy Hash: F511E371740208BEEF205F28CC06FAB3BACEF95B64F010114FA55E20D0D671E861BB10
                          APIs
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                            • Part of subcall function 00ED2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00ED2DC5
                            • Part of subcall function 00ED2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED2DD6
                            • Part of subcall function 00ED2DA7: GetCurrentThreadId.KERNEL32 ref: 00ED2DDD
                            • Part of subcall function 00ED2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00ED2DE4
                          • GetFocus.USER32 ref: 00ED2F78
                            • Part of subcall function 00ED2DEE: GetParent.USER32(00000000), ref: 00ED2DF9
                          • GetClassNameW.USER32(?,?,00000100), ref: 00ED2FC3
                          • EnumChildWindows.USER32(?,00ED303B), ref: 00ED2FEB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                          • String ID: %s%d
                          • API String ID: 1272988791-1110647743
                          • Opcode ID: cec6658ad2df7cbf399c67e4cca3b46f1d03def780a2aa27a825a5a91083fe0a
                          • Instruction ID: a0de2477bfa82eb4f46c6ba6faf593e1a59c5307fc361005dea3e07f9e0268de
                          • Opcode Fuzzy Hash: cec6658ad2df7cbf399c67e4cca3b46f1d03def780a2aa27a825a5a91083fe0a
                          • Instruction Fuzzy Hash: C311EB712002056BCF107F708C85EED37AAEF94308F049076F90DB7292DE31990A9B61
                          APIs
                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F058C1
                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F058EE
                          • DrawMenuBar.USER32(?), ref: 00F058FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Menu$InfoItem$Draw
                          • String ID: 0
                          • API String ID: 3227129158-4108050209
                          • Opcode ID: b97cd9d3f2f8a4dea6bad9d3419eb7a16c4c09863c6df4c882e9444e2a5c5225
                          • Instruction ID: a61377c966f4415269e181a38d2e6a165daa1a8fa6c96f96ca47006379f5c603
                          • Opcode Fuzzy Hash: b97cd9d3f2f8a4dea6bad9d3419eb7a16c4c09863c6df4c882e9444e2a5c5225
                          • Instruction Fuzzy Hash: 72018C36900218EFDB219F11DC44BAFBBB4FF45761F1480A9E849E6191DBB08A94FF61
                          APIs
                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00ECD3BF
                          • FreeLibrary.KERNEL32 ref: 00ECD3E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: GetSystemWow64DirectoryW$X64
                          • API String ID: 3013587201-2590602151
                          • Opcode ID: 51e44b0f640af6dc5e4db1f4e981fdeca894bdcfd0108a410797c91a271d106e
                          • Instruction ID: 39f47c6f473d722af6b54d575d7c77479ba9154e1700a6308b89ce2444391ddd
                          • Opcode Fuzzy Hash: 51e44b0f640af6dc5e4db1f4e981fdeca894bdcfd0108a410797c91a271d106e
                          • Instruction Fuzzy Hash: 0EF0557280D6209BC73923104E24FAA7310EF10715F65763DE80AF20A5D723CC42A2C2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dec84f25905952c6ac398381b5be0965d2dec01c600e0f5607d5f3389cfc05b6
                          • Instruction ID: 04b7b1fdd73167a358e2235744a4354ae1688b43e450acb636d9e3bdf194b09e
                          • Opcode Fuzzy Hash: dec84f25905952c6ac398381b5be0965d2dec01c600e0f5607d5f3389cfc05b6
                          • Instruction Fuzzy Hash: 99C13875A0020AEFDB14CFA4C894BAEB7B5FF48704F249599E505EB251D731EE42CB90
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Variant$ClearInitInitializeUninitialize
                          • String ID:
                          • API String ID: 1998397398-0
                          • Opcode ID: 010da137f43793e8967f43ac04780b13bcaf5cae3577b26c1b04a12cc6c5e0b3
                          • Instruction ID: ef0fb3c863599506065e2f061b7aeed18ebcbb751809af431820b5b4df30e135
                          • Opcode Fuzzy Hash: 010da137f43793e8967f43ac04780b13bcaf5cae3577b26c1b04a12cc6c5e0b3
                          • Instruction Fuzzy Hash: 4AA13A756043049FC710EF28C485A2AB7E5FF88714F15995DFA8AAB362DB30EE05CB91
                          APIs
                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F0FC08,?), ref: 00ED05F0
                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F0FC08,?), ref: 00ED0608
                          • CLSIDFromProgID.OLE32(?,?,00000000,00F0CC40,000000FF,?,00000000,00000800,00000000,?,00F0FC08,?), ref: 00ED062D
                          • _memcmp.LIBVCRUNTIME ref: 00ED064E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FromProg$FreeTask_memcmp
                          • String ID:
                          • API String ID: 314563124-0
                          • Opcode ID: 8cc927415f94169184a6aeb798fee156deed2f10ab85fc53f4eb90570b2fc4cc
                          • Instruction ID: 21973b1863f560b134e3f9f2bebe0b81c84cf240da648883b937789c5cf46913
                          • Opcode Fuzzy Hash: 8cc927415f94169184a6aeb798fee156deed2f10ab85fc53f4eb90570b2fc4cc
                          • Instruction Fuzzy Hash: 49811C71A00109EFCB04DF94C984EEEB7B9FF89315F244599E516BB250DB71AE06CBA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _free
                          • String ID:
                          • API String ID: 269201875-0
                          • Opcode ID: a683e7c5c22771f1283e68dcb824c58b201f66b3c4d87bf71be39958e8c82a80
                          • Instruction ID: 1193374f1a65e87aa7e1a1b1c4b512e105b5d436b136d038229d6b14e8b75c11
                          • Opcode Fuzzy Hash: a683e7c5c22771f1283e68dcb824c58b201f66b3c4d87bf71be39958e8c82a80
                          • Instruction Fuzzy Hash: 93416C31600200ABDF216BBD8C567FF3AE5EF46374F6422A5F438F61A2E63449415262
                          APIs
                          • GetWindowRect.USER32(018EE960,?), ref: 00F062E2
                          • ScreenToClient.USER32(?,?), ref: 00F06315
                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00F06382
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID:
                          • API String ID: 3880355969-0
                          • Opcode ID: 1ce37f813f128a1e9790b80b95e3f9b21f8852395b066ba5f07dc74516671c67
                          • Instruction ID: 0f2e70fd26f266141ef41d4086cda5cc4af9e46f6678a1ca0ee0619152511ecf
                          • Opcode Fuzzy Hash: 1ce37f813f128a1e9790b80b95e3f9b21f8852395b066ba5f07dc74516671c67
                          • Instruction Fuzzy Hash: 4F510B75A00209EFDF20DF54D881AAE7BB6FB55360F108269F915D72D0D730AD91EB90
                          APIs
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00EF1AFD
                          • WSAGetLastError.WSOCK32 ref: 00EF1B0B
                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00EF1B8A
                          • WSAGetLastError.WSOCK32 ref: 00EF1B94
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorLast$socket
                          • String ID:
                          • API String ID: 1881357543-0
                          • Opcode ID: 4f76d79390e7506cb67ee542434248cd82621797a092bc5453581aca643f89ee
                          • Instruction ID: 09db431d85af660e12740787e5b85b619eba17c7030272bd96df5272dded9f8b
                          • Opcode Fuzzy Hash: 4f76d79390e7506cb67ee542434248cd82621797a092bc5453581aca643f89ee
                          • Instruction Fuzzy Hash: 62417C34640204EFE720AF24C886F2A77E5AB44718F54D598FA5AAF2D3D672ED418B90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 472fd193774f32efef5a8c10d9c224d8bae0bd08b669f3a7c3114b8596993356
                          • Instruction ID: 5ecdfd7d00181ab5999e07b26284b90521c5fdbee946a0ee97797cb7a8584b8d
                          • Opcode Fuzzy Hash: 472fd193774f32efef5a8c10d9c224d8bae0bd08b669f3a7c3114b8596993356
                          • Instruction Fuzzy Hash: D141E271A00304AFD7249F78C841BAABBE9EB8D720F10566EF551EF292E771B9018780
                          APIs
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00EE5783
                          • GetLastError.KERNEL32(?,00000000), ref: 00EE57A9
                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00EE57CE
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00EE57FA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: 1c48708f9b95c6edc3c047a644336da2f306e5b68f11ea1b14c398b1020bd502
                          • Instruction ID: 23e8561122ffa2920b87583efab9ca08cf2ca38d41d7e6f7535159e99d5980db
                          • Opcode Fuzzy Hash: 1c48708f9b95c6edc3c047a644336da2f306e5b68f11ea1b14c398b1020bd502
                          • Instruction Fuzzy Hash: AD413B3A600654DFCB15EF15C544A5EBBE6EF89724B18D499E84AAB362CB30FD00CB91
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00E982D9,?,00E982D9,?,00000001,?,?,00000001,00E982D9,00E982D9), ref: 00EAD910
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EAD999
                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00EAD9AB
                          • __freea.LIBCMT ref: 00EAD9B4
                            • Part of subcall function 00EA3820: RtlAllocateHeap.NTDLL(00000000,?,00F41444,?,00E8FDF5,?,?,00E7A976,00000010,00F41440,00E713FC,?,00E713C6,?,00E71129), ref: 00EA3852
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                          • String ID:
                          • API String ID: 2652629310-0
                          • Opcode ID: e349ab3908f4633f45f91c8f6a9c9f3ffb5a4de5aa5fb8e912ae87d314fd284d
                          • Instruction ID: 14ad1c5693f348feda3bcf2e44743b27cd6af98f8342d5e048ddbd90bc7c1d5c
                          • Opcode Fuzzy Hash: e349ab3908f4633f45f91c8f6a9c9f3ffb5a4de5aa5fb8e912ae87d314fd284d
                          • Instruction Fuzzy Hash: 2731C072A0020AABDF24DF64DC45EEF7BA5EB85314B050168FC05EA150E775ED54CB90
                          APIs
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00F05352
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F05375
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F05382
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F053A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LongWindow$InvalidateMessageRectSend
                          • String ID:
                          • API String ID: 3340791633-0
                          • Opcode ID: 4c0cf7980782a25ae9a29e6647cda6aae40ede1ac24fb4b11a81f918b1405c8c
                          • Instruction ID: 9696f6a7b51040927f66746424fa9a44efdd486a2894673c7d8712a19cd81935
                          • Opcode Fuzzy Hash: 4c0cf7980782a25ae9a29e6647cda6aae40ede1ac24fb4b11a81f918b1405c8c
                          • Instruction Fuzzy Hash: 7331B235E55A0CAFEB309B54CC06BEA7767AB05BA0F984101FA14961E1C7F1A980BF41
                          APIs
                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00EDABF1
                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00EDAC0D
                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00EDAC74
                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00EDACC6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: cf546645f88da047c56d45360de0a88d9991ed6f6f49e635db04fea72aa504a5
                          • Instruction ID: 1d081a5bb9118a39930c0b732aa946fcccbe1fb3e21b4e76b05f7e9d3dc459d8
                          • Opcode Fuzzy Hash: cf546645f88da047c56d45360de0a88d9991ed6f6f49e635db04fea72aa504a5
                          • Instruction Fuzzy Hash: FA31FA30A606186FEB35CB658C047FAB7A5EB85324F0C632BE485663D1C3758A469792
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 00F0769A
                          • GetWindowRect.USER32(?,?), ref: 00F07710
                          • PtInRect.USER32(?,?,00F08B89), ref: 00F07720
                          • MessageBeep.USER32(00000000), ref: 00F0778C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: 953f4c7488601554a5bef3ada6f1187456ec4b26a5d8a697ba361eeabf3bb68d
                          • Instruction ID: 30285c73bae319fd352b732ab7a65641046aaba9970f667b012606366ffabd6e
                          • Opcode Fuzzy Hash: 953f4c7488601554a5bef3ada6f1187456ec4b26a5d8a697ba361eeabf3bb68d
                          • Instruction Fuzzy Hash: 51418D38E05318DFDB11EF58C894EA9BBF4BB49350F1841E8E8149B2A1C371B981FB90
                          APIs
                          • GetForegroundWindow.USER32 ref: 00F016EB
                            • Part of subcall function 00ED3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED3A57
                            • Part of subcall function 00ED3A3D: GetCurrentThreadId.KERNEL32 ref: 00ED3A5E
                            • Part of subcall function 00ED3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00ED25B3), ref: 00ED3A65
                          • GetCaretPos.USER32(?), ref: 00F016FF
                          • ClientToScreen.USER32(00000000,?), ref: 00F0174C
                          • GetForegroundWindow.USER32 ref: 00F01752
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: 158413c8b1ee64238b71d786f5522a9ac17668f7c20e9e52883be6d02a3a5860
                          • Instruction ID: 3f97965f5e5218fe51957bd90e030e96e2931e9fa0055c0450868d3f3c0f385c
                          • Opcode Fuzzy Hash: 158413c8b1ee64238b71d786f5522a9ac17668f7c20e9e52883be6d02a3a5860
                          • Instruction Fuzzy Hash: 92315075E00149AFC704EFA9C881CAEBBFDFF48304B5490AAE415E7251E7319E45DBA0
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00EDD501
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00EDD50F
                          • Process32NextW.KERNEL32(00000000,?), ref: 00EDD52F
                          • CloseHandle.KERNEL32(00000000), ref: 00EDD5DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                          • String ID:
                          • API String ID: 420147892-0
                          • Opcode ID: f9c6eeabdaee75f1f8d769975bdcc08066255f89e7c9c881127b7e865704f247
                          • Instruction ID: e79b600afd0204d2867a7c0acad83c7a89001b53fcbe9f105375bcf88adbc8e9
                          • Opcode Fuzzy Hash: f9c6eeabdaee75f1f8d769975bdcc08066255f89e7c9c881127b7e865704f247
                          • Instruction Fuzzy Hash: CB31AF311083009FD304EF64DC81AAFBBF8EFD9354F14592DF585A62A2EB719945CB92
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • GetCursorPos.USER32(?), ref: 00F09001
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00EC7711,?,?,?,?,?), ref: 00F09016
                          • GetCursorPos.USER32(?), ref: 00F0905E
                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00EC7711,?,?,?), ref: 00F09094
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                          • String ID:
                          • API String ID: 2864067406-0
                          • Opcode ID: 77a484af4774877274c7d17cb58cf960b667f6943795a25107427e39f24ef481
                          • Instruction ID: 4f6cb6a4750906f4d41f4fdabf1ce070aebb156506a1b075617778e97ea9c8b0
                          • Opcode Fuzzy Hash: 77a484af4774877274c7d17cb58cf960b667f6943795a25107427e39f24ef481
                          • Instruction Fuzzy Hash: 51219F35A00018EFDB258FA4CC58EFB7BB9FB8A360F044155F9455B2A2D3719990FBA0
                          APIs
                          • GetFileAttributesW.KERNEL32(?,00F0CB68), ref: 00EDD2FB
                          • GetLastError.KERNEL32 ref: 00EDD30A
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EDD319
                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F0CB68), ref: 00EDD376
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateDirectory$AttributesErrorFileLast
                          • String ID:
                          • API String ID: 2267087916-0
                          • Opcode ID: c65fe2de2e2623f1f41868e502af935eb0bcb192b6afcc69181646f12af317a8
                          • Instruction ID: 84928d30814b7affb487a1fdd3bc9529c282d1120196f9946386e36abdba5525
                          • Opcode Fuzzy Hash: c65fe2de2e2623f1f41868e502af935eb0bcb192b6afcc69181646f12af317a8
                          • Instruction Fuzzy Hash: 60215C705092019FC710DF28C8818AA77E4EF56368F105A1AF499E73A1D731D946DB93
                          APIs
                            • Part of subcall function 00ED1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00ED102A
                            • Part of subcall function 00ED1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1036
                            • Part of subcall function 00ED1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1045
                            • Part of subcall function 00ED1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED104C
                            • Part of subcall function 00ED1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ED1062
                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00ED15BE
                          • _memcmp.LIBVCRUNTIME ref: 00ED15E1
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00ED1617
                          • HeapFree.KERNEL32(00000000), ref: 00ED161E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                          • String ID:
                          • API String ID: 1592001646-0
                          • Opcode ID: 8d30c73d98832db6ce2f7cf1c63888cf017d23bbcfb8d87174d4f374794d5133
                          • Instruction ID: bde31e8d4ace86a73f8d92d19e82ece4e443098769c59f02e5493ea05783bcdb
                          • Opcode Fuzzy Hash: 8d30c73d98832db6ce2f7cf1c63888cf017d23bbcfb8d87174d4f374794d5133
                          • Instruction Fuzzy Hash: E0216971E00109BFDB10DFA4C945BEEB7B8EF44348F08559AE451BB281E734AA46DBA0
                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 00F0280A
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F02824
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F02832
                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00F02840
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Long$AttributesLayered
                          • String ID:
                          • API String ID: 2169480361-0
                          • Opcode ID: 6b65f673003fc0cb47ba7dcafa1ed5e9c755e0c6a824153087ded80d521f0a1d
                          • Instruction ID: 020b5895b43b29328ec19be77d893be604bb5bb1d717362804eef256b48647b7
                          • Opcode Fuzzy Hash: 6b65f673003fc0cb47ba7dcafa1ed5e9c755e0c6a824153087ded80d521f0a1d
                          • Instruction Fuzzy Hash: A921F435704110AFD7549B24CC48F6A7799AF45324F248259F4168B6D2CB75FC42E7E0
                          APIs
                            • Part of subcall function 00ED8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00ED790A,?,000000FF,?,00ED8754,00000000,?,0000001C,?,?), ref: 00ED8D8C
                            • Part of subcall function 00ED8D7D: lstrcpyW.KERNEL32(00000000,?,?,00ED790A,?,000000FF,?,00ED8754,00000000,?,0000001C,?,?,00000000), ref: 00ED8DB2
                            • Part of subcall function 00ED8D7D: lstrcmpiW.KERNEL32(00000000,?,00ED790A,?,000000FF,?,00ED8754,00000000,?,0000001C,?,?), ref: 00ED8DE3
                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00ED8754,00000000,?,0000001C,?,?,00000000), ref: 00ED7923
                          • lstrcpyW.KERNEL32(00000000,?,?,00ED8754,00000000,?,0000001C,?,?,00000000), ref: 00ED7949
                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00ED8754,00000000,?,0000001C,?,?,00000000), ref: 00ED7984
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: lstrcmpilstrcpylstrlen
                          • String ID: cdecl
                          • API String ID: 4031866154-3896280584
                          • Opcode ID: 06608564c9a90cf2ad912cb9fa02deb4c3cd3d116dbc3039b9393ca6557f0f83
                          • Instruction ID: acf8472d1cd359854f550c55c363070665dbd4f7654ad4b2d61ef64b2d337737
                          • Opcode Fuzzy Hash: 06608564c9a90cf2ad912cb9fa02deb4c3cd3d116dbc3039b9393ca6557f0f83
                          • Instruction Fuzzy Hash: 8411E13A200202ABCB15AF34C855D7A77E9FF89354B00602BE886D73A4FB319812D7A1
                          APIs
                          • GetWindowLongW.USER32(?,000000F0), ref: 00F07D0B
                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00F07D2A
                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F07D42
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00EEB7AD,00000000), ref: 00F07D6B
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID:
                          • API String ID: 847901565-0
                          • Opcode ID: 3b756baaf983c450c5bcd8e94b53d6b364af6adffa79e3cab2b24db47e323a99
                          • Instruction ID: 3e293735f83b898a2f65a5ac995649f6056b2c1037da0b1da94a726351963132
                          • Opcode Fuzzy Hash: 3b756baaf983c450c5bcd8e94b53d6b364af6adffa79e3cab2b24db47e323a99
                          • Instruction Fuzzy Hash: 7A119335A05619AFDB20AF28CC04A763BA5BF45370B154764F839D71F0E731A950FB90
                          APIs
                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00F056BB
                          • _wcslen.LIBCMT ref: 00F056CD
                          • _wcslen.LIBCMT ref: 00F056D8
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F05816
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend_wcslen
                          • String ID:
                          • API String ID: 455545452-0
                          • Opcode ID: 9f3c38ffe4c03c0407598f08ac704e87571242ec8d90e17f38ba54a9af888a94
                          • Instruction ID: 411bc607f45148e6f05c656415e56d2cecf2dd79c95273ecf7e023a4eaf408d4
                          • Opcode Fuzzy Hash: 9f3c38ffe4c03c0407598f08ac704e87571242ec8d90e17f38ba54a9af888a94
                          • Instruction Fuzzy Hash: 4B11AF76A00609A6DF20DB61CC85AEF77ACEF11B60B504126FD15960C1EBB0CA81FF60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 75d364725000ca7477ae611e8814ba76bc5679927281c6bdf534f0cbaf762d03
                          • Instruction ID: a3ba2013cc604765c892c501175dbd708c41de5088f2889abbe5cdde46a651a4
                          • Opcode Fuzzy Hash: 75d364725000ca7477ae611e8814ba76bc5679927281c6bdf534f0cbaf762d03
                          • Instruction Fuzzy Hash: E601A2B220961A3EF61116786CC0F67665CEF8B7B9F302369F621791D2DB60AC005160
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00ED1A47
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ED1A59
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ED1A6F
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ED1A8A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: fa1e253370953280cf76f5287917c31de2a8ae84f1c018e03f166996ca5f5773
                          • Instruction ID: a211d995139754f29467b6225745ec9ce24ae76293a0fb883a9a4948201eec58
                          • Opcode Fuzzy Hash: fa1e253370953280cf76f5287917c31de2a8ae84f1c018e03f166996ca5f5773
                          • Instruction Fuzzy Hash: 5A11093AD01219FFEB11DBA5CD85FADBB78FB08754F200092EA04B7290D6716E51DB94
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00EDE1FD
                          • MessageBoxW.USER32(?,?,?,?), ref: 00EDE230
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00EDE246
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00EDE24D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                          • String ID:
                          • API String ID: 2880819207-0
                          • Opcode ID: 6cb9ce2f69c2f6a3728ba3ce08f76cf875a567ca9c627a6bb19b438c405a106f
                          • Instruction ID: 4f416ae7a183b7b809df441a8ef03a61566bd5ad9415070f825914e60944e6ac
                          • Opcode Fuzzy Hash: 6cb9ce2f69c2f6a3728ba3ce08f76cf875a567ca9c627a6bb19b438c405a106f
                          • Instruction Fuzzy Hash: EA11DB7690425CBBD701AFA89C09AAF7FACFB45314F14435AF924E7391D670DD0497A0
                          APIs
                          • CreateThread.KERNEL32(00000000,?,00E9CFF9,00000000,00000004,00000000), ref: 00E9D218
                          • GetLastError.KERNEL32 ref: 00E9D224
                          • __dosmaperr.LIBCMT ref: 00E9D22B
                          • ResumeThread.KERNEL32(00000000), ref: 00E9D249
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                          • String ID:
                          • API String ID: 173952441-0
                          • Opcode ID: 78254b07294eaab3e85397ed4b7bc34f839c7da1a05b90428ffb76b73dc98824
                          • Instruction ID: caf8e546ba3717966cab9dea80b797edcc200a7f3aa16afa80f8455974dbbfc7
                          • Opcode Fuzzy Hash: 78254b07294eaab3e85397ed4b7bc34f839c7da1a05b90428ffb76b73dc98824
                          • Instruction Fuzzy Hash: C301F936809228BBCF115BA5DC05BAF7AADEF81730F201319F925B61E0CB70C941D6A0
                          APIs
                            • Part of subcall function 00E89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E89BB2
                          • GetClientRect.USER32(?,?), ref: 00F09F31
                          • GetCursorPos.USER32(?), ref: 00F09F3B
                          • ScreenToClient.USER32(?,?), ref: 00F09F46
                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00F09F7A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Client$CursorLongProcRectScreenWindow
                          • String ID:
                          • API String ID: 4127811313-0
                          • Opcode ID: 89baa520687cc0e709a39380eae9f1339370d1d76bc798da5241fa8ad26f840d
                          • Instruction ID: 6f543418b725748d03611e7e3534a6af22b1eac4620368f42b93557e888e2619
                          • Opcode Fuzzy Hash: 89baa520687cc0e709a39380eae9f1339370d1d76bc798da5241fa8ad26f840d
                          • Instruction Fuzzy Hash: 1E11483690411AABDB10EF68DC899FE77B8FB05312F000551F911E3182E774BA81EBA1
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E7604C
                          • GetStockObject.GDI32(00000011), ref: 00E76060
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E7606A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CreateMessageObjectSendStockWindow
                          • String ID:
                          • API String ID: 3970641297-0
                          • Opcode ID: 705873bc28ac39b5dffa7c605f28d76d325cf777705e6c96b3fc22d07b0ff793
                          • Instruction ID: 5c928f2784ff3cd4c0c4ad90a30094ab90d5b959abea25a8662a2c944a004dda
                          • Opcode Fuzzy Hash: 705873bc28ac39b5dffa7c605f28d76d325cf777705e6c96b3fc22d07b0ff793
                          • Instruction Fuzzy Hash: 88115B72501909BFEF224FA49C44AEABB69FF193A8F045215FA1866150D732DC60ABA0
                          APIs
                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00E93B56
                            • Part of subcall function 00E93AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00E93AD2
                            • Part of subcall function 00E93AA3: ___AdjustPointer.LIBCMT ref: 00E93AED
                          • _UnwindNestedFrames.LIBCMT ref: 00E93B6B
                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00E93B7C
                          • CallCatchBlock.LIBVCRUNTIME ref: 00E93BA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                          • String ID:
                          • API String ID: 737400349-0
                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                          • Instruction ID: 81064c38b903973db14ce2a33e96fb9a991329b6f1e4a8484fa2165e117ee384
                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                          • Instruction Fuzzy Hash: 2E012D72100148BBDF115EA5CC42DEB7BA9EF48758F045014FE4866121D732D961EBA0
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00E713C6,00000000,00000000,?,00EA301A,00E713C6,00000000,00000000,00000000,?,00EA328B,00000006,FlsSetValue), ref: 00EA30A5
                          • GetLastError.KERNEL32(?,00EA301A,00E713C6,00000000,00000000,00000000,?,00EA328B,00000006,FlsSetValue,00F12290,FlsSetValue,00000000,00000364,?,00EA2E46), ref: 00EA30B1
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00EA301A,00E713C6,00000000,00000000,00000000,?,00EA328B,00000006,FlsSetValue,00F12290,FlsSetValue,00000000), ref: 00EA30BF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID:
                          • API String ID: 3177248105-0
                          • Opcode ID: d45e837adda2c15b7ee6cec0f54ae1378428fcfb2d8cb96d0be0f1b435a9f3ee
                          • Instruction ID: d75d0b7a16030585b2d0cd61a1fe88c48b44e92ed185cfa23560beb54e039689
                          • Opcode Fuzzy Hash: d45e837adda2c15b7ee6cec0f54ae1378428fcfb2d8cb96d0be0f1b435a9f3ee
                          • Instruction Fuzzy Hash: BB01A736711226ABCB314B799CC49977B98AF4BBA5B215720F905FB180D721E901C6E0
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00ED747F
                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00ED7497
                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00ED74AC
                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00ED74CA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Type$Register$FileLoadModuleNameUser
                          • String ID:
                          • API String ID: 1352324309-0
                          • Opcode ID: c272d2edb826bc2622369173ad92ad6eb5d1b260503304f610de2920e29cba93
                          • Instruction ID: 6893d0265ee781cd39b55bc799ecd619fd845ebbcdeff389c3f9408c829cd792
                          • Opcode Fuzzy Hash: c272d2edb826bc2622369173ad92ad6eb5d1b260503304f610de2920e29cba93
                          • Instruction Fuzzy Hash: 2D11A1B52053149BE721CF14DD08B96BFFCFB00B04F10856AA6A6E6291E770E905DB90
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EDACD3,?,00008000), ref: 00EDB0C4
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EDACD3,?,00008000), ref: 00EDB0E9
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EDACD3,?,00008000), ref: 00EDB0F3
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EDACD3,?,00008000), ref: 00EDB126
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID:
                          • API String ID: 2875609808-0
                          • Opcode ID: 241c4bd93c7c8bb459533375f3fae9818346acc75920dcb3607b2f668f130dec
                          • Instruction ID: ccc7d0258384959bc6d8a27fbb6ed00364b59142fffced2b867193abd215e4bd
                          • Opcode Fuzzy Hash: 241c4bd93c7c8bb459533375f3fae9818346acc75920dcb3607b2f668f130dec
                          • Instruction Fuzzy Hash: FD11C030C0162CE7CF00AFE4EA696EEBF78FF09310F125186D941B2281DB308652DB91
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00ED2DC5
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED2DD6
                          • GetCurrentThreadId.KERNEL32 ref: 00ED2DDD
                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00ED2DE4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                          • String ID:
                          • API String ID: 2710830443-0
                          • Opcode ID: 45769f80327856593b09c8a92528997f16f486fef5386ba6cac8ab2dd04e704c
                          • Instruction ID: 03df8e87c1778655f6ef2c709525ea434d405a4ed09fdcf10b63ef5b54168105
                          • Opcode Fuzzy Hash: 45769f80327856593b09c8a92528997f16f486fef5386ba6cac8ab2dd04e704c
                          • Instruction Fuzzy Hash: 59E092711012287BD7301B739C0DFEB3E6DFF56BA1F00121AF209E11809AA1C841D6F0
                          APIs
                            • Part of subcall function 00E89639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E89693
                            • Part of subcall function 00E89639: SelectObject.GDI32(?,00000000), ref: 00E896A2
                            • Part of subcall function 00E89639: BeginPath.GDI32(?), ref: 00E896B9
                            • Part of subcall function 00E89639: SelectObject.GDI32(?,00000000), ref: 00E896E2
                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00F08887
                          • LineTo.GDI32(?,?,?), ref: 00F08894
                          • EndPath.GDI32(?), ref: 00F088A4
                          • StrokePath.GDI32(?), ref: 00F088B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                          • String ID:
                          • API String ID: 1539411459-0
                          • Opcode ID: 240e562c703ca300f72d5ccf7a993b76b515f1068f9148604507e30218e0b8df
                          • Instruction ID: c27a7eae9d44344e4b9d6a279444803f8e822d5ad63a39256889f3a01efc71e4
                          • Opcode Fuzzy Hash: 240e562c703ca300f72d5ccf7a993b76b515f1068f9148604507e30218e0b8df
                          • Instruction Fuzzy Hash: 90F03A36041258FAEB126F94AC09FCA3E59BF16310F448100FA11A51E2C7755551FBE5
                          APIs
                          • GetSysColor.USER32(00000008), ref: 00E898CC
                          • SetTextColor.GDI32(?,?), ref: 00E898D6
                          • SetBkMode.GDI32(?,00000001), ref: 00E898E9
                          • GetStockObject.GDI32(00000005), ref: 00E898F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Color$ModeObjectStockText
                          • String ID:
                          • API String ID: 4037423528-0
                          • Opcode ID: 196cb8230cfad8fa71299ff91d132dea6aa50dbd5f773d34c0478283d54916cd
                          • Instruction ID: aae4928419d03e405a534e0bef18508cfa30327dbaae179743cad16fb0ab612d
                          • Opcode Fuzzy Hash: 196cb8230cfad8fa71299ff91d132dea6aa50dbd5f773d34c0478283d54916cd
                          • Instruction Fuzzy Hash: 01E06531244244AEDB215B74AC09BE83F10BB11736F048319F6F9540E1C3724651AF50
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 00ED1634
                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00ED11D9), ref: 00ED163B
                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00ED11D9), ref: 00ED1648
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00ED11D9), ref: 00ED164F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CurrentOpenProcessThreadToken
                          • String ID:
                          • API String ID: 3974789173-0
                          • Opcode ID: 2949273ac9ee73f146a41bef60f1a6f7cd44ca0186c15a0110a6c0405aa36b5a
                          • Instruction ID: 0ad915c9f69aca4f1ce153e6d4d08b6cb61ceda57249fe2157ded208855ca665
                          • Opcode Fuzzy Hash: 2949273ac9ee73f146a41bef60f1a6f7cd44ca0186c15a0110a6c0405aa36b5a
                          • Instruction Fuzzy Hash: 0EE08C32602215EBEB201FA0AE0DB863B7CFF44796F148949F285D9080E6348441DBA0
                          APIs
                          • GetDesktopWindow.USER32 ref: 00ECD858
                          • GetDC.USER32(00000000), ref: 00ECD862
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00ECD882
                          • ReleaseDC.USER32(?), ref: 00ECD8A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: 741ecb67c2db153313bd12de286675eef941ceff01ac69da9ab82be142b2bef0
                          • Instruction ID: c133e8d0f2adad10b29e559eb2c98c724dbd8ec0117beef68e023699279ba8e0
                          • Opcode Fuzzy Hash: 741ecb67c2db153313bd12de286675eef941ceff01ac69da9ab82be142b2bef0
                          • Instruction Fuzzy Hash: C3E01AB1804208DFCF51AFA0D908A6DBBF6FB08310F249119F84AE7250CB3A8901AF90
                          APIs
                          • GetDesktopWindow.USER32 ref: 00ECD86C
                          • GetDC.USER32(00000000), ref: 00ECD876
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00ECD882
                          • ReleaseDC.USER32(?), ref: 00ECD8A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: 80d340a3a7291c7a7d84338ad0da0d80f8a409527290e1896b8e53f2b534ec35
                          • Instruction ID: 92fb1eba2c2d7d21bd4c6f642fde98e61260e97af32e37d168a3a3eb50f46555
                          • Opcode Fuzzy Hash: 80d340a3a7291c7a7d84338ad0da0d80f8a409527290e1896b8e53f2b534ec35
                          • Instruction Fuzzy Hash: 2DE092B5904208EFCF61AFA0D90866DBBF6BB08311F249549E94EE7290CB395901AF90
                          APIs
                            • Part of subcall function 00E77620: _wcslen.LIBCMT ref: 00E77625
                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00EE4ED4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Connection_wcslen
                          • String ID: *$LPT
                          • API String ID: 1725874428-3443410124
                          • Opcode ID: dd0e83df561e542f0efe4576bf117a38a4b77aae8d38ce52bb5d9c6c734fbda3
                          • Instruction ID: 9a42bba42014382fd41a0483401f32a35401b6d623849ec816a4980395bbeb3a
                          • Opcode Fuzzy Hash: dd0e83df561e542f0efe4576bf117a38a4b77aae8d38ce52bb5d9c6c734fbda3
                          • Instruction Fuzzy Hash: A39195B5A00248DFCB14DF55C484EA9BBF1BF44708F19A099E44AAF3A2C731ED85CB91
                          APIs
                          • __startOneArgErrorHandling.LIBCMT ref: 00E9E30D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ErrorHandling__start
                          • String ID: pow
                          • API String ID: 3213639722-2276729525
                          • Opcode ID: 434ba806b88cb5152dbe6545213367e17d493f6d898db060d77c7377e3440a1e
                          • Instruction ID: 8f2df42efcde547eeb17bf7d663b21cc7919e5bc0eb8c1b33b84d2d4192386ae
                          • Opcode Fuzzy Hash: 434ba806b88cb5152dbe6545213367e17d493f6d898db060d77c7377e3440a1e
                          • Instruction Fuzzy Hash: A2519A61A0C20296CF15F714CD013BA3BE4EF46744F30BDA8E1D56A3A9EB319CD19A46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID:
                          • String ID: #
                          • API String ID: 0-1885708031
                          • Opcode ID: 445ac65820b8500b1026e1acd0a540faad1a6c4dd3b9934f5ca03c10023ccddb
                          • Instruction ID: ab05f9230269960bbb1ef39c89a836aba0c64adbb177b97f2a67a52f091852fa
                          • Opcode Fuzzy Hash: 445ac65820b8500b1026e1acd0a540faad1a6c4dd3b9934f5ca03c10023ccddb
                          • Instruction Fuzzy Hash: D7512371500246DFDB19EF68C481AFA7BA8EF25314F24A05AE859BB3D0D6359D43CB90
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00E8F2A2
                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E8F2BB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: a746498986218af8cae3f6bbb2fa6fe9451d70a27b22ab59b6c4d8572fbbde0b
                          • Instruction ID: b444ca2b0bc69ef3535c6f95d3d5066d6986a6dfca2e5f56814347f768dfbe45
                          • Opcode Fuzzy Hash: a746498986218af8cae3f6bbb2fa6fe9451d70a27b22ab59b6c4d8572fbbde0b
                          • Instruction Fuzzy Hash: FE5144725087489BD320EF20DC86BAFBBF8FB95304F81985DF1D9511A5EB308529CB66
                          APIs
                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00EF57E0
                          • _wcslen.LIBCMT ref: 00EF57EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: BuffCharUpper_wcslen
                          • String ID: CALLARGARRAY
                          • API String ID: 157775604-1150593374
                          • Opcode ID: fe7b9ee86058fb11ce748887122cde606b70a19d8f5637e288fedf967e6bdb28
                          • Instruction ID: f537ee969c8a7c7504f324e52423641ad3faa4a2f083ebf7458c8c1e17bafb48
                          • Opcode Fuzzy Hash: fe7b9ee86058fb11ce748887122cde606b70a19d8f5637e288fedf967e6bdb28
                          • Instruction Fuzzy Hash: 0141A671A001499FCB18DF68C4828BEBBF5FF69354F545129E605B7291D7349D41CB90
                          APIs
                          • _wcslen.LIBCMT ref: 00EED130
                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00EED13A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CrackInternet_wcslen
                          • String ID: |
                          • API String ID: 596671847-2343686810
                          • Opcode ID: d340eb2235cbc6bb423a31ac81379cbdcbad645de555d3075eaa38457bdc15c7
                          • Instruction ID: 3dbdb44a8b9aad166eed9a9204a87fb2f85acd7d03551d750135c1afb268fbd7
                          • Opcode Fuzzy Hash: d340eb2235cbc6bb423a31ac81379cbdcbad645de555d3075eaa38457bdc15c7
                          • Instruction Fuzzy Hash: 5D312A71D01219ABCF15EFA5CC85AEEBFB9FF04304F005019F819B6166E731AA06DB61
                          APIs
                          • DestroyWindow.USER32(?,?,?,?), ref: 00F03621
                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F0365C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$DestroyMove
                          • String ID: static
                          • API String ID: 2139405536-2160076837
                          • Opcode ID: a7b292dfb5a4843258f6287e32f31d09674dc211dcfb4d1088aa54a8bc028227
                          • Instruction ID: 3e18be6ec4447dc513bc0d826d3bbb56be1ffe1d87dbd24b3fa5f45ea24c2ddb
                          • Opcode Fuzzy Hash: a7b292dfb5a4843258f6287e32f31d09674dc211dcfb4d1088aa54a8bc028227
                          • Instruction Fuzzy Hash: 33318D71500604AADB209F68DC80EFB73ADFF88764F109619F8A997290DA31AD91E760
                          APIs
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00F0461F
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F04634
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: '
                          • API String ID: 3850602802-1997036262
                          • Opcode ID: 29d399e12e4961e444eb31655b348b43efbd905f62fc6d76864095c228708c3a
                          • Instruction ID: 2862d108c1ad0bb65fcea22032eec5055f1ec2eccf6bf984e23ec249cf3ab6aa
                          • Opcode Fuzzy Hash: 29d399e12e4961e444eb31655b348b43efbd905f62fc6d76864095c228708c3a
                          • Instruction Fuzzy Hash: 61313EB5A013099FDF14CFA5C980BEABBB5FF49300F144069EA04AB381E771A941EF90
                          APIs
                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00EB33A2
                            • Part of subcall function 00E76B57: _wcslen.LIBCMT ref: 00E76B6A
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E73A04
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_wcslen
                          • String ID: Line:
                          • API String ID: 2289894680-1585850449
                          • Opcode ID: bff949e43f3f57a97ba6e834aa04f21f73ebc0ad43162fa8abba0decba03678a
                          • Instruction ID: f5e03c04662b35cc9c79b5f2f12abdbe1b375182d0aabd0151be1e4e552a7aec
                          • Opcode Fuzzy Hash: bff949e43f3f57a97ba6e834aa04f21f73ebc0ad43162fa8abba0decba03678a
                          • Instruction Fuzzy Hash: 4431E571408304AAD764EB30DC46BEBB7E8AB85714F00A92AF59DA2191EB709648D7C2
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F0327C
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F03287
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: 7d018ffff1fc39ee38f523e588da46a28c67d7a0a1b6264d58c0d9aeea434e6d
                          • Instruction ID: caacc47fd84126c6896b0c5a6f80501d470b9da424cfe771d86c1f0eaaa8748d
                          • Opcode Fuzzy Hash: 7d018ffff1fc39ee38f523e588da46a28c67d7a0a1b6264d58c0d9aeea434e6d
                          • Instruction Fuzzy Hash: 3411B2717002087FEF219F54DC81EBB37AEEB943A4F104125F918972D0D6319D51B760
                          APIs
                            • Part of subcall function 00E7600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E7604C
                            • Part of subcall function 00E7600E: GetStockObject.GDI32(00000011), ref: 00E76060
                            • Part of subcall function 00E7600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E7606A
                          • GetWindowRect.USER32(00000000,?), ref: 00F0377A
                          • GetSysColor.USER32(00000012), ref: 00F03794
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                          • String ID: static
                          • API String ID: 1983116058-2160076837
                          • Opcode ID: 6d76047708a7190ec51567411f5d504888bfb1caa89f33dcab171a3a4c0ad347
                          • Instruction ID: 743a6f47a3c426d0a95cae95f710c04289110d5d9b0b30d2590d206439e8fb73
                          • Opcode Fuzzy Hash: 6d76047708a7190ec51567411f5d504888bfb1caa89f33dcab171a3a4c0ad347
                          • Instruction Fuzzy Hash: 571129B2610209AFDF10DFA8CC45AEA7BB8FB08354F004A15FD55E2290D735E851AB50
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00EECD7D
                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00EECDA6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Internet$OpenOption
                          • String ID: <local>
                          • API String ID: 942729171-4266983199
                          • Opcode ID: 5725f5bac83dcc46deb4ac1eff4762c72630e9622097cd99ffeeedb101015597
                          • Instruction ID: e1f7c711e15005a92d9ad1f065478575cbc351ad1bbc7b7e3ec441d3ed435752
                          • Opcode Fuzzy Hash: 5725f5bac83dcc46deb4ac1eff4762c72630e9622097cd99ffeeedb101015597
                          • Instruction Fuzzy Hash: D511C67120567ABAD7344B678C45EE7BEACEF127A8F205226B509A3080D7759882D6F0
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 00F034AB
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F034BA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: edit
                          • API String ID: 2978978980-2167791130
                          • Opcode ID: cdf28d87e2d3708c67aa1db8c2b435aebe05a12476c687712d40cc0d805358dd
                          • Instruction ID: 482c308ba66ac6b39b9264d4d5cf19465b493ad7e01c1bd46a95c1a9018b4641
                          • Opcode Fuzzy Hash: cdf28d87e2d3708c67aa1db8c2b435aebe05a12476c687712d40cc0d805358dd
                          • Instruction Fuzzy Hash: F4119D75500108AAEB218F64DC40AAA376EEB05374F504324F9649B1D0C771DC51B750
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                          • CharUpperBuffW.USER32(?,?,?), ref: 00ED6CB6
                          • _wcslen.LIBCMT ref: 00ED6CC2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen$BuffCharUpper
                          • String ID: STOP
                          • API String ID: 1256254125-2411985666
                          • Opcode ID: a36c02de85183022206324c24cc964609e33929676ab66b3a2f98db87d77550d
                          • Instruction ID: 3ff533c22521137ead20f5da1f94d00a30a3cfb2bf825b2a2849951289361ae1
                          • Opcode Fuzzy Hash: a36c02de85183022206324c24cc964609e33929676ab66b3a2f98db87d77550d
                          • Instruction Fuzzy Hash: F30104326105278ACB20AFBDDC809BFB3F5EFA07147102926E852B2291EA31D802C750
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00ED1D4C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 624084870-1403004172
                          • Opcode ID: 6c428195d8ee0c9ed4834c04a791c40d4b266102233eaf7ca948ee5fc90396e9
                          • Instruction ID: 3c7f80f1a8789e7f52cdb544a18f2fc26f4766b510efda4e7f5df669c1eeb2ad
                          • Opcode Fuzzy Hash: 6c428195d8ee0c9ed4834c04a791c40d4b266102233eaf7ca948ee5fc90396e9
                          • Instruction Fuzzy Hash: 58012831600218BBCB08EBA0CC11CFEB3A9FF52350B10160AF826773C2EB3059098661
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00ED1C46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 624084870-1403004172
                          • Opcode ID: 5aba250b0c1133f683ad4884456438bc93ed0d4e27ee32e75113a86b679f194a
                          • Instruction ID: d75466361ddacea64b9a6764d3e2e47a7049901bd12e4181f67d62cfc392757b
                          • Opcode Fuzzy Hash: 5aba250b0c1133f683ad4884456438bc93ed0d4e27ee32e75113a86b679f194a
                          • Instruction Fuzzy Hash: 9A01A77579110876DF18EBA0CD52EFFF7E8DF51340F14205AA80A773C2EA249E0996B2
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00ED1CC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 624084870-1403004172
                          • Opcode ID: d29ac6c3c20a34ed869c591b23891a683d924e145e906f8e0711eb8cf001753e
                          • Instruction ID: 4fe253939e714ed6d4cb3149d87e01f8dda47b8f0a2f8720d79b4e02d97617dd
                          • Opcode Fuzzy Hash: d29ac6c3c20a34ed869c591b23891a683d924e145e906f8e0711eb8cf001753e
                          • Instruction Fuzzy Hash: 5901A27179011876DB18EBA0CA02EFEF3E8DF11340F142016B80673382EA219F0A9672
                          APIs
                            • Part of subcall function 00E79CB3: _wcslen.LIBCMT ref: 00E79CBD
                            • Part of subcall function 00ED3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00ED3CCA
                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00ED1DD3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 624084870-1403004172
                          • Opcode ID: 218e400545a210678015b1be9fff89ba3c3c864a0e4f5968b32f020df78be0a2
                          • Instruction ID: ee8dc31149075606120a55c1fe31e0e101e634151dd28ad9d798ba68c29f5b9e
                          • Opcode Fuzzy Hash: 218e400545a210678015b1be9fff89ba3c3c864a0e4f5968b32f020df78be0a2
                          • Instruction Fuzzy Hash: 20F0F471B5021876DB08E7A4CC52EFEB3A8EF51354F042916B826733C2DB6099098271
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: _wcslen
                          • String ID: 3, 3, 16, 1
                          • API String ID: 176396367-3042988571
                          • Opcode ID: c84e38c787c20b3d337dac7922ba9b3dca5ac5c05fc170e9fff28d704eb08ab5
                          • Instruction ID: 2a220f6bac386120bc5b3859660b16ca385379400e53a90930c146ae348bc211
                          • Opcode Fuzzy Hash: c84e38c787c20b3d337dac7922ba9b3dca5ac5c05fc170e9fff28d704eb08ab5
                          • Instruction Fuzzy Hash: 0BE02B4220432510933122799CC1D7F5AC9CFC9760710382BFAD1E22A6EAA4CD9293A1
                          APIs
                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00ED0B23
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: AutoIt$Error allocating memory.
                          • API String ID: 2030045667-4017498283
                          • Opcode ID: b2857f9cf28be413964d73d705ca99388909072dc9f2253e33da72ac316be886
                          • Instruction ID: bd159047a7092c4704500f686e57c780e282fd73adac9cf4fc7c7fb5027728af
                          • Opcode Fuzzy Hash: b2857f9cf28be413964d73d705ca99388909072dc9f2253e33da72ac316be886
                          • Instruction Fuzzy Hash: 76E0D83124430866D21437547C03F897BC48F05F65F105427F74CB55C38AD1649026EA
                          APIs
                            • Part of subcall function 00E8F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E90D71,?,?,?,00E7100A), ref: 00E8F7CE
                          • IsDebuggerPresent.KERNEL32(?,?,?,00E7100A), ref: 00E90D75
                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E7100A), ref: 00E90D84
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E90D7F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 55579361-631824599
                          • Opcode ID: dd69946c346dc0f4534f9491411d7e5b9ba8967162f48cfd8dc92ebd6220e16a
                          • Instruction ID: 589b9d531e8e6a0b76a15e13563305d6aaaf01b2f03e760073f0e21c865772a7
                          • Opcode Fuzzy Hash: dd69946c346dc0f4534f9491411d7e5b9ba8967162f48cfd8dc92ebd6220e16a
                          • Instruction Fuzzy Hash: D2E09B742003018FD7309F78D4043427BE4BF10744F00492DE895D6A51D7B1E4449BD1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: LocalTime
                          • String ID: %.3d$X64
                          • API String ID: 481472006-1077770165
                          • Opcode ID: 15c817fe79008dd6eea5d2bd5915eac749d12129d0c571efee3e34887bc632aa
                          • Instruction ID: bfbef61b3058e2117c5b7e65a29ef053dd2b3be228a5f5c634d8fb2370b23598
                          • Opcode Fuzzy Hash: 15c817fe79008dd6eea5d2bd5915eac749d12129d0c571efee3e34887bc632aa
                          • Instruction Fuzzy Hash: 71D012A1C0C108E9CB54B7D0CD45EFAB3BCFB09311F509476F80EB2050D636C54A6B61
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F0236C
                          • PostMessageW.USER32(00000000), ref: 00F02373
                            • Part of subcall function 00EDE97B: Sleep.KERNEL32 ref: 00EDE9F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: ca714e9569b8c161c661bba0484a73ba121e09d05ab7d1cd6af9d7379f0650bb
                          • Instruction ID: e84751c2247f9f8c08bf527d84a094dfb56aaf783822f7f43e51e8b334cb70b5
                          • Opcode Fuzzy Hash: ca714e9569b8c161c661bba0484a73ba121e09d05ab7d1cd6af9d7379f0650bb
                          • Instruction Fuzzy Hash: EFD0C9763813147AE668B7709C0FFC67659AB44B14F504A167645EA2D0C9A0A8019A94
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F0232C
                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F0233F
                            • Part of subcall function 00EDE97B: Sleep.KERNEL32 ref: 00EDE9F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 5a7b8984b8eb020c42bee7033c3fd5bab26106d33212229914ab0a85fd15eabf
                          • Instruction ID: 77337bd4085a82be35e612a27b8dac6efba85f2d84df0755d68a9ec82e819c7b
                          • Opcode Fuzzy Hash: 5a7b8984b8eb020c42bee7033c3fd5bab26106d33212229914ab0a85fd15eabf
                          • Instruction Fuzzy Hash: 37D02236380300B7E278B330DC0FFC67A08EB00B10F004A027709EA2D0C8F0E801CA90
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00EABE93
                          • GetLastError.KERNEL32 ref: 00EABEA1
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EABEFC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1724934928.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                          • Associated: 00000000.00000002.1724919453.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1724988687.0000000000F32000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725027374.0000000000F3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1725042302.0000000000F44000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_e70000_Arrival Notice.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast
                          • String ID:
                          • API String ID: 1717984340-0
                          • Opcode ID: 1f0d74b1881eb055697c48fb4b81bed91027647eeadf91f7215c85447f326dc0
                          • Instruction ID: ee80048911b4983c99103118b60bde9eb27370a6b8c4093f0c2eacfd25a75153
                          • Opcode Fuzzy Hash: 1f0d74b1881eb055697c48fb4b81bed91027647eeadf91f7215c85447f326dc0
                          • Instruction Fuzzy Hash: D9411A38705246AFCF218F64CC54ABA7BA5EF4B314F185269F959BF1A2DB30AD00DB50