Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ITC590-Script 3 V2-P-2024.exe

Overview

General Information

Sample name:ITC590-Script 3 V2-P-2024.exe
Analysis ID:1522423
MD5:ae50e6bab627b7a39408186e75821ea3
SHA1:69ce995fc2e079c7a7afc9f327a5949356ef6223
SHA256:ca7788bea6909aab6f62b8218025f2b6050c27ffac885e457c60fdc57b2c2d67
Tags:exeuser-Dyrockful
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Found pyInstaller with non standard icon
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-30T02:11:08.544585+020020499561A Network Trojan was detected192.168.2.4558461.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-30T02:11:08.544585+020020499571A Network Trojan was detected192.168.2.4558461.1.1.153UDP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ITC590-Script 3 V2-P-2024.exeReversingLabs: Detection: 13%
Source: ITC590-Script 3 V2-P-2024.exeVirustotal: Detection: 27%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python312.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmp, unicodedata.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.13 30 Jan 20243.0.13built on: Mon Feb 5 17:39:09 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650421083.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650421083.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D689280 FindFirstFileExW,FindClose,0_2_00007FF77D689280
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6883C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF77D6883C0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D689280 FindFirstFileExW,FindClose,1_2_00007FF77D689280
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6883C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF77D6883C0

Networking

barindex
Source: Network trafficSuricata IDS: 2049956 - Severity 1 - ET MALWARE Test CnC Domain in DNS Lookup (test .com) : 192.168.2.4:55846 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2049957 - Severity 1 - ET MALWARE X CnC Domain in DNS Lookup (test .com) : 192.168.2.4:55846 -> 1.1.1.1:53
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE133365E8 memset,recvfrom,1_2_00007FFE133365E8
Source: global trafficDNS traffic detected: DNS query: malicious-site.net
Source: global trafficDNS traffic detected: DNS query: suspicious-domain.org
Source: global trafficDNS traffic detected: DNS query: test.com
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000002.2671212787.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000002.2671212787.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000002.2671212787.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: unicodedata.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000002.2671212787.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000002.2671212787.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E307E000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1652602238.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1654542163.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-3.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, python312.dll.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.1658755684.000001AC6F230000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://docs.python.org/3/howto/mro.html.
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F1A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://peps.python.org/pep-0205/
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.drString found in binary or memory: https://peps.python.org/pep-0263/
Source: libcrypto-3.dll.0.drString found in binary or memory: https://www.openssl.org/H
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667195570.00007FFDFB769000.00000008.00000001.01000000.00000004.sdmp, python312.dll.0.drString found in binary or memory: https://www.python.org/psf/license/
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.drString found in binary or memory: https://www.python.org/psf/license/)
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6810000_2_00007FF77D681000
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A69640_2_00007FF77D6A6964
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6889E00_2_00007FF77D6889E0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A5E7C0_2_00007FF77D6A5E7C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D69DEF00_2_00007FF77D69DEF0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D699EA00_2_00007FF77D699EA0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D69E5700_2_00007FF77D69E570
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D691D540_2_00007FF77D691D54
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D695D300_2_00007FF77D695D30
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6935A00_2_00007FF77D6935A0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A18740_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6980E40_2_00007FF77D6980E4
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A08C80_2_00007FF77D6A08C8
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A40AC0_2_00007FF77D6A40AC
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6987940_2_00007FF77D698794
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D691F600_2_00007FF77D691F60
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6917400_2_00007FF77D691740
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A97280_2_00007FF77D6A9728
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6898000_2_00007FF77D689800
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D69DA5C0_2_00007FF77D69DA5C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68A2DB0_2_00007FF77D68A2DB
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6921640_2_00007FF77D692164
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6919440_2_00007FF77D691944
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6939A40_2_00007FF77D6939A4
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68A47B0_2_00007FF77D68A47B
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A08C80_2_00007FF77D6A08C8
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A64180_2_00007FF77D6A6418
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68ACAD0_2_00007FF77D68ACAD
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D691B500_2_00007FF77D691B50
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A3C100_2_00007FF77D6A3C10
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D692C100_2_00007FF77D692C10
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A5C000_2_00007FF77D6A5C00
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6810001_2_00007FF77D681000
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A69641_2_00007FF77D6A6964
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A5E7C1_2_00007FF77D6A5E7C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D69DEF01_2_00007FF77D69DEF0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D699EA01_2_00007FF77D699EA0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D69E5701_2_00007FF77D69E570
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D691D541_2_00007FF77D691D54
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D695D301_2_00007FF77D695D30
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6935A01_2_00007FF77D6935A0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A18741_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6980E41_2_00007FF77D6980E4
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A08C81_2_00007FF77D6A08C8
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A40AC1_2_00007FF77D6A40AC
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6987941_2_00007FF77D698794
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D691F601_2_00007FF77D691F60
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6917401_2_00007FF77D691740
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A97281_2_00007FF77D6A9728
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6898001_2_00007FF77D689800
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D69DA5C1_2_00007FF77D69DA5C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68A2DB1_2_00007FF77D68A2DB
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6921641_2_00007FF77D692164
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6919441_2_00007FF77D691944
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6889E01_2_00007FF77D6889E0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6939A41_2_00007FF77D6939A4
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68A47B1_2_00007FF77D68A47B
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A08C81_2_00007FF77D6A08C8
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A64181_2_00007FF77D6A6418
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68ACAD1_2_00007FF77D68ACAD
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D691B501_2_00007FF77D691B50
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A3C101_2_00007FF77D6A3C10
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D692C101_2_00007FF77D692C10
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A5C001_2_00007FF77D6A5C00
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE004518801_2_00007FFE00451880
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE004512F01_2_00007FFE004512F0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE133310C01_2_00007FFE133310C0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE13333B201_2_00007FFE13333B20
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE1A457CA01_2_00007FFE1A457CA0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: String function: 00007FF77D682710 appears 104 times
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: String function: 00007FF77D682910 appears 34 times
Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650421083.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651027861.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exeBinary or memory string: OriginalFilename vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667446336.00007FFDFB891000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython312.dll. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs ITC590-Script 3 V2-P-2024.exe
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs ITC590-Script 3 V2-P-2024.exe
Source: classification engineClassification label: mal64.winEXE@3/11@5/10
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802Jump to behavior
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ITC590-Script 3 V2-P-2024.exeReversingLabs: Detection: 13%
Source: ITC590-Script 3 V2-P-2024.exeVirustotal: Detection: 27%
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile read: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe "C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeProcess created: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe "C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeProcess created: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe "C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"Jump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: python3.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeSection loaded: fwpuclnt.dllJump to behavior
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: ITC590-Script 3 V2-P-2024.exeStatic file information: File size 7247553 > 1048576
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656301203.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python312.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1656477874.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmp, unicodedata.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651236079.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651445478.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650610519.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.13 30 Jan 20243.0.13built on: Mon Feb 5 17:39:09 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650421083.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1650421083.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: libcrypto-3.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: ITC590-Script 3 V2-P-2024.exe, 00000000.00000003.1651624451.00000177E3071000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ITC590-Script 3 V2-P-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: fothk
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
Source: libcrypto-3.dll.0.drStatic PE information: section name: .00cfg
Source: python312.dll.0.drStatic PE information: section name: PyRuntim

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeProcess created: "C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\python312.dllJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\select.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\libcrypto-3.dllJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68802\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6876C0 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,0_2_00007FF77D6876C0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\python312.dllJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\select.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\libcrypto-3.dllJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68802\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17547
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeAPI coverage: 4.5 %
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D689280 FindFirstFileExW,FindClose,0_2_00007FF77D689280
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6883C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF77D6883C0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D689280 FindFirstFileExW,FindClose,1_2_00007FF77D689280
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6A1874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF77D6A1874
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D6883C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF77D6883C0
Source: ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663088912.000001AC6F651000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664800905.000001AC6F660000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666127202.000001AC6F668000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D69A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77D69A614
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A3480 GetProcessHeap,0_2_00007FF77D6A3480
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D69A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77D69A614
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68C8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF77D68C8A0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68D30C SetUnhandledExceptionFilter,0_2_00007FF77D68D30C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68D12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77D68D12C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D69A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF77D69A614
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68C8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF77D68C8A0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68D30C SetUnhandledExceptionFilter,1_2_00007FF77D68D30C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FF77D68D12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF77D68D12C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE00452A70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE00452A70
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE00453028 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE00453028
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE13332D70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE13332D70
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE13333328 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE13333328
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE148E14E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE148E14E0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE148E1AA0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE148E1AA0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE1A460AA8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE1A460AA8
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeProcess created: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe "C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"Jump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A9570 cpuid 0_2_00007FF77D6A9570
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\_socket.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\select.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68802\unicodedata.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D68D010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF77D68D010
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 0_2_00007FF77D6A5E7C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF77D6A5E7C
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE133350C0 PySys_Audit,PyEval_SaveThread,bind,PyEval_RestoreThread,_Py_NoneStruct,1_2_00007FFE133350C0
Source: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exeCode function: 1_2_00007FFE133360CC _PyArg_ParseTuple_SizeT,PyEval_SaveThread,listen,PyEval_RestoreThread,_Py_NoneStruct,1_2_00007FFE133360CC
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS22
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ITC590-Script 3 V2-P-2024.exe13%ReversingLabs
ITC590-Script 3 V2-P-2024.exe27%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI68802\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\VCRUNTIME140.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\_bz2.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\_decimal.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\_decimal.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\_hashlib.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\_lzma.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\_socket.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\libcrypto-3.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\libcrypto-3.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\python312.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\python312.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\select.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI68802\unicodedata.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI68802\unicodedata.pyd0%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
test.com3%VirustotalBrowse
malicious-site.net0%VirustotalBrowse
suspicious-domain.org0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.openssl.org/H0%URL Reputationsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module0%VirustotalBrowse
https://peps.python.org/pep-0205/0%VirustotalBrowse
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package0%VirustotalBrowse
https://docs.python.org/3/howto/mro.html.1%VirustotalBrowse
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data0%VirustotalBrowse
https://www.python.org/psf/license/)0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches0%VirustotalBrowse
https://peps.python.org/pep-0263/0%VirustotalBrowse
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module0%VirustotalBrowse
https://www.python.org/psf/license/0%VirustotalBrowse
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%VirustotalBrowse
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
test.com
34.224.149.186
truefalseunknown
malicious-site.net
unknown
unknownfalseunknown
suspicious-domain.org
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_codeITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_sourceITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://www.openssl.org/Hlibcrypto-3.dll.0.drfalse
  • URL Reputation: safe
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_moduleITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_specITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://peps.python.org/pep-0205/ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalseunknown
https://docs.python.org/3/howto/mro.html.ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.1658755684.000001AC6F230000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F15C000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_packageITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F1A4000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_cachesITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665778516.000001AC6F450000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://www.python.org/psf/license/)ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.drfalseunknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_dataITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_moduleITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662185314.000001AC6D8C3000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664033273.000001AC6D8CC000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665220554.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663055050.000001AC6D8EF000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2662498447.000001AC6D8C6000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2664062665.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665171674.000001AC6D8CD000.00000004.00000020.00020000.00000000.sdmp, ITC590-Script 3 V2-P-2024.exe, 00000001.00000003.2663467952.000001AC6D8F0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://peps.python.org/pep-0263/ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmp, python312.dll.0.drfalseunknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filenameITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2665311859.000001AC6F0E0000.00000004.00001000.00020000.00000000.sdmpfalseunknown
https://www.python.org/psf/license/ITC590-Script 3 V2-P-2024.exe, 00000001.00000002.2667195570.00007FFDFB769000.00000008.00000001.01000000.00000004.sdmp, python312.dll.0.drfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
IP
172.16.69.225
172.16.177.209
172.16.77.202
172.16.63.22
172.16.246.98
172.16.9.240
172.16.97.133
172.16.56.13
172.16.237.12
172.16.89.192
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522423
Start date and time:2024-09-30 02:09:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ITC590-Script 3 V2-P-2024.exe
Detection:MAL
Classification:mal64.winEXE@3/11@5/10
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
test.comDev_Project.xlsGet hashmaliciousUnknownBrowse
  • 51.68.214.101
Dev_Project.xlsGet hashmaliciousUnknownBrowse
  • 51.68.214.101
http://propertyinaustralia.github.io/propertyinaustralia/property.htmlGet hashmaliciousHTMLPhisherBrowse
  • 172.67.192.119
http://propertyinaustralia.github.io/propertyinaustralia/property.htmlGet hashmaliciousHTMLPhisherBrowse
  • 172.67.192.119
https://bit.ly/2zH1V5kGet hashmaliciousUnknownBrowse
  • 34.224.149.186
https://assets-usa.mkt.dynamics.com/c9f731e3-0864-ef11-a66d-6045bd003021/digitalassets/standaloneforms/0424cf3e-7364-ef11-bfe2-6045bd055762Get hashmaliciousHTMLPhisherBrowse
  • 162.241.61.243
http://maliciouswebsitetest.comGet hashmaliciousUnknownBrowse
  • 50.63.7.226
https://vozer.net/go/?to=aHR0cHM6Ly9vd3FjaC10ZWNueG4zMC5jb20vZ2UxL3Rlc3RAdGVzdC5jb20Get hashmaliciousHTMLPhisherBrowse
  • 3.18.255.247
https://download.cnet.com/download/wcfstorm/3000-2218_4-10914361.htmlGet hashmaliciousUnknownBrowse
  • 216.239.32.62
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\_MEI68802\VCRUNTIME140.dllITC590-Script 2 V1-2024.exeGet hashmaliciousUnknownBrowse
    SecuriteInfo.com.Win64.Evo-gen.1493.31362.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
      HyZh4pn0RF.exeGet hashmaliciousCreal StealerBrowse
        file.exeGet hashmaliciousBlank GrabberBrowse
          mfsH98ISNV.exeGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousXmrigBrowse
              Dkqewub8RE.exeGet hashmaliciousUnknownBrowse
                Dkqewub8RE.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):119192
                      Entropy (8bit):6.6016214745004635
                      Encrypted:false
                      SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                      MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                      SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                      SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                      SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Joe Sandbox View:
                      • Filename: ITC590-Script 2 V1-2024.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.Win64.Evo-gen.1493.31362.exe, Detection: malicious, Browse
                      • Filename: HyZh4pn0RF.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: mfsH98ISNV.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: Dkqewub8RE.exe, Detection: malicious, Browse
                      • Filename: Dkqewub8RE.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):85272
                      Entropy (8bit):6.591457260071925
                      Encrypted:false
                      SSDEEP:1536:+yhz79151BVo1vXfzIFnaR4bO1AsCn8Bsjk+tI1CVQ7Sy4x+R:Nhzx15evXkuxAB8BMk+tI1CVQF
                      MD5:DD26ED92888DE9C57660A7AD631BB916
                      SHA1:77D479D44D9E04F0A1355569332233459B69A154
                      SHA-256:324268786921EC940CBD4B5E2F71DAFD08E578A12E373A715658527E5B211697
                      SHA-512:D693367565005C1B87823E781DC5925146512182C8D8A3A2201E712C88DF1C0E66E65ECAEC9AF22037F0A8F8B3FB3F511EA47CFD5774651D71673FAB612D2897
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................b....(......(......(......(......(.....................................................Rich...........PE..d......f.........." ...(.....^...............................................`............`.........................................p...H............@.......0..D......../...P..........T...........................p...@............................................text...#........................... ..`.rdata..P>.......@..................@..@.data........ ......................@....pdata..D....0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):257304
                      Entropy (8bit):6.565090204799859
                      Encrypted:false
                      SSDEEP:6144:3uQjqbJrTwvqM+eYx+lDJOAkl9qWM53pLW1AcfRRR6tlISgOg:3sTwvWeS+xJw4ln7g
                      MD5:CEA3B419C7CA87140A157629C6DBD299
                      SHA1:7DBFF775235B1937B150AE70302B3208833DC9BE
                      SHA-256:95B9850E6FB335B235589DD1348E007507C6B28E332C9ABB111F2A0035C358E5
                      SHA-512:6E3A6781C0F05BB5182073CCA1E69B6DF55F05FF7CDCEA394BACF50F88605E2241B7387F1D8BA9F40A96832D04F55EDB80003F0CF1E537A26F99408EE9312F5B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........V..............'.....g&......g&......g&......g&.......!.................9....!.......!.......!.......!K......!......Rich............PE..d.....f.........." ...(.....<............................................................`..........................................c..P....c...................&......./......T.......T...........................p...@............................................text...9........................... ..`.rdata..(...........................@..@.data...X*.......$...b..............@....pdata...&.......(..................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):66328
                      Entropy (8bit):6.227566291152438
                      Encrypted:false
                      SSDEEP:1536:/9gLpgE4Z27ARZWZnEmoAlI1OIH7SyT0xq:26RZeEmoAlI1OIHth
                      MD5:D19CB5CA144AE1FD29B6395B0225CF40
                      SHA1:5B9EC6E656261CE179DFCFD5C6A3CFE07C2DFEB4
                      SHA-256:F95EC2562A3C70FB1A6E44D72F4223CE3C7A0F0038159D09DCE629F59591D5AA
                      SHA-512:9AC3A8A4DBDB09BE3760E7CCB11269F82A47B24C03D10D289BCDDED9A43E57D3CD656F8D060D66B810382ECAC3A62F101F83EA626B58CD0B5A3CCA25B67B1519
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........N@.. ... ... ...... ..k!... ..k#... ..k$... ..k%... ..l!... ...!... ..h!... ...!.Y. ..l-... ..l ... ..l.... ..l"... .Rich.. .........................PE..d......f.........." ...(.V.......... @............................................../.....`.........................................p...P................................/......X...@}..T............................|..@............p..(............................text....T.......V.................. ..`.rdata...O...p...P...Z..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):160024
                      Entropy (8bit):6.85368707809341
                      Encrypted:false
                      SSDEEP:3072:lsvkxujgo7e2uONOG+hi+C8znfF9mNooXnmbutI1Z1mb:lnu0o7JUrNYOo2Kz
                      MD5:8CFBAFE65D6E38DDE8E2E8006B66BB3E
                      SHA1:CB63ADDD102E47C777D55753C00C29C547E2243C
                      SHA-256:6D548DB0AB73291F82CF0F4CA9EC0C81460185319C8965E829FAEACAE19444FF
                      SHA-512:FA021615D5C080AADCD5B84FD221900054EB763A7AF8638F70CF6CD49BD92773074F1AC6884F3CE1D8A15D59439F554381377FAEE4842ED5BEB13FF3E1B510F4
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D.3H%.`H%.`H%.`A]7`L%.`...aJ%.`...aK%.`...a@%.`...aD%.`]..aK%.`.].aJ%.`H%.`-%.`]..ar%.`]..aI%.`].[`I%.`]..aI%.`RichH%.`........................PE..d......f.........." ...(.f..........`8....................................................`......................................... %..L...l%..x....p.......P.......B.../......4.......T...............................@............................................text...be.......f.................. ..`.rdata..............j..............@..@.data...p....@......................@....pdata.......P......."..............@..@.rsrc........p.......6..............@..@.reloc..4............@..............@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):83736
                      Entropy (8bit):6.31969940395018
                      Encrypted:false
                      SSDEEP:1536:COYhekrkJqlerLSyypHi9/s+S+pzjii/n1IsJqKNBI1Lw9PD7Sy9duxJ:jwkJqHyypHi9/sT+pzjiE1IwdNBI1LwU
                      MD5:E43AED7D6A8BCD9DDFC59C2D1A2C4B02
                      SHA1:36F367F68FB9868412246725B604B27B5019D747
                      SHA-256:2C2A6A6BA360E38F0C2B5A53B4626F833A3111844D95615EBF35BE0E76B1EF7A
                      SHA-512:D92E26EB88DB891DE389A464F850A8DA0A39AF8A4D86D9894768CB97182B8351817CE14FE1EB8301B18B80D1D5D8876A48BA66EB7B874C7C3D7B009FCDBC8C4E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../...Nb}.Nb}.Nb}.6.}.Nb}g.c|.Nb}g.a|.Nb}g.f|.Nb}g.g|.Nb}..c|.Nb}.Nc}.Nb}.6c|.Nb}..o|.Nb}..b|.Nb}..}.Nb}..`|.Nb}Rich.Nb}................PE..d......f.........." ...(.x..........0-.......................................`......@.....`.........................................@...P............@.......0.........../...P......P...T...............................@............................................text....v.......x.................. ..`.rdata...x.......z...|..............@..@.data...............................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                      Category:dropped
                      Size (bytes):1332769
                      Entropy (8bit):5.586560217717372
                      Encrypted:false
                      SSDEEP:12288:VHlJGUqQlLmgBvc+fYNXPh26UZWAzyX7j7YQqPQCxi2hdmSPpHg1d6R1RbtRwv6:VHlJGUDa+zy/7UlZhdmSPNaQHtRwv6
                      MD5:48BA559BF70C3EF963F86633530667D6
                      SHA1:E3319E3A70590767AD00290230D77158F8F8307E
                      SHA-256:F8377AA03B7036E7735E2814452C1759AB7CEEC3F8F8A202B697B4132809CE5E
                      SHA-512:567A7BEF4A7C7FF0890708C0E62D2AF748B645C8B9071953873B0DD5AA789C42796860896A6B5E539651DE9A2243338E2A5FB47743C30DFCDE59B1787C4C1871
                      Malicious:false
                      Preview:PK..........!./gJ.O...O......._collections_abc.pyc......................................Z.....d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.............Z...e.d.........Z.d...Z...e.e.........Z.[.g.d...Z.d.Z...e...e.d.................Z...e...e...e.........................Z...e...e.i.j%..........................................Z...e...e.i.j)..........................................Z...e...e.i.j-..........................................Z...e...e.g.................Z...e...e...e.g.........................Z...e...e...e.d.........................Z...e...e...e.d.d.z...........................Z...e...e...e.........................Z...e...e.d.................Z ..e...e.d.................Z!..e...e...e"........................Z#..e.i.j%..................................Z$..e.i.j)..................................Z%..e.i.j-..................................Z&..e.e.jN..........................Z(..e...d...................Z)d...Z*..e*........Z*..e.e*........Z+e*jY............................[*d...Z-..e-........
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):5191960
                      Entropy (8bit):5.962142634441191
                      Encrypted:false
                      SSDEEP:98304:n3+pefu6fSar+SJ8aqfPomg1CPwDvt3uFlDCE:3G+u6fb+SJ8aqfwmg1CPwDvt3uFlDCE
                      MD5:E547CF6D296A88F5B1C352C116DF7C0C
                      SHA1:CAFA14E0367F7C13AD140FD556F10F320A039783
                      SHA-256:05FE080EAB7FC535C51E10C1BD76A2F3E6217F9C91A25034774588881C3F99DE
                      SHA-512:9F42EDF04C7AF350A00FA4FDF92B8E2E6F47AB9D2D41491985B20CD0ADDE4F694253399F6A88F4BDD765C4F49792F25FB01E84EC03FD5D0BE8BB61773D77D74D
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l..l..l......l...m..l...i..l...h..l...o..l..m.y.l...m...l...o..l...h.l...l..l......l...n..l.Rich.l.........PE..d......e.........." ...%..7..4......v.........................................O.......P...`.........................................P.H.0....kN.@.....N.|.....K.d.....O../....N....P.C.8.............................C.@............`N..............................text.....7.......7................. ..`.rdata....... 7.......7.............@..@.data....n....K..<....J.............@....pdata..0.....K......4K.............@..@.idata...%...`N..&....N.............@..@.00cfg..u.....N.......N.............@..@.rsrc...|.....N......0N.............@..@.reloc........N......8N.............@..B................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6927640
                      Entropy (8bit):5.765554952149868
                      Encrypted:false
                      SSDEEP:49152:Jc7/HNCHh0IWiUDFsx3hghs7g6kIPuch+Xe16/02yWYqiVx7qb4f4wmC36nhIVcF:JcBZhxsje2kUvid5E+vbHDMiEr/l9o
                      MD5:CAE8FA4E7CB32DA83ACF655C2C39D9E1
                      SHA1:7A0055588A2D232BE8C56791642CB0F5ABBC71F8
                      SHA-256:8AD53C67C2B4DB4387D5F72EE2A3CA80C40AF444B22BF41A6CFDA2225A27BB93
                      SHA-512:DB2190DA2C35BCEED0EF91D7553FF0DEA442286490145C3D0E89DB59BA1299B0851E601CC324B5F7FD026414FC73755E8EFF2EF5FB5EEB1C54A9E13E7C66DD0C
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D..Z%..Z%..Z%......X%....e.T%......^%......R%......W%..S]..@%...]..Q%..Z%..*$..O....%..O...[%..O.g.[%..O...[%..RichZ%..........PE..d......f.........." ...(..(..6B...............................................j......dj...`.........................................pdN.d....1O.......i......._.`I....i../... i..[..0.2.T.....................H.(....2.@............ (..............................text.....(.......(................. ..`.rdata..f7'.. (..8'...(.............@..@.data....J...`O......HO.............@....pdata..`I...._..J....^.............@..@PyRuntim0.....b.......a.............@....rsrc.........i...... h.............@..@.reloc...[... i..\...*h.............@..B........................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):31000
                      Entropy (8bit):6.553885009751671
                      Encrypted:false
                      SSDEEP:384:I8RVBC9t6Lhz64SHfZslDT90YBI1QGjHQIYiSy1pCQQRaAM+o/8E9VF0NytuSS:1GyqHfK1HBI1QGT5YiSyvXAMxkEm
                      MD5:79CE1AE3A23DFF6ED5FC66E6416600CD
                      SHA1:6204374D99144B0A26FD1D61940FF4F0D17C2212
                      SHA-256:678E09AD44BE42FA9BC9C7A18C25DBE995A59B6C36A13EECC09C0F02A647B6F0
                      SHA-512:A4E48696788798A7D061C0EF620D40187850741C2BEC357DB0E37A2DD94D3A50F9F55BA75DC4D95E50946CBAB78B84BA1FC42D51FD498640A231321566613DAA
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........t..'..'..'..g'..'-..&..'-..&..'-..&..'-..&..'...&..'..'...'...&..'...&..'...&..'...'..'...&..'Rich..'................PE..d.....f.........." ...(.....2......................................................._....`..........................................@..L...<A..x....p.......`.......J.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data...`....P.......8..............@....pdata.......`.......:..............@..@.rsrc........p.......>..............@..@.reloc..L............H..............@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1138456
                      Entropy (8bit):5.461877321211646
                      Encrypted:false
                      SSDEEP:12288:FrEHdcM6hb/CjJ43w9hIpCQvb0QN8MdIEQ+U2BNNmD+99FfcAa1:FrEXaCjfk7bPNfv42BN6yzUAa1
                      MD5:B848E259FABAF32B4B3C980A0A12488D
                      SHA1:DA2E864E18521C86C7D8968DB74BB2B28E4C23E2
                      SHA-256:C65073B65F107E471C9BE3C699FB11F774E9A07581F41229582F7B2154B6FC3C
                      SHA-512:4C6953504D1401FE0C74435BCEEBC5EC7BF8991FD42B659867A3529CEE5CC64DA54F1AB404E88160E747887A7409098F1A85A546BC40F12F0DDE0025408F9E27
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g...#.}.#.}.#.}.*..%.}..*|.!.}..*~. .}..*y.+.}..*x...}.6-|. .}.h.|.!.}.#.|.s.}.6-p.".}.6-}.".}.6-..".}.6-..".}.Rich#.}.........PE..d....f.........." ...(.@..........0*.......................................p......]M....`.........................................p...X............P.......@.......0.../...`......P^..T............................]..@............P..p............................text...!>.......@.................. ..`.rdata..\....P.......D..............@..@.data........ ......................@....pdata.......@......................@..@.rsrc........P.......$..............@..@.reloc.......`......................@..B................................................................................................................................................................................................................................................
                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.980504182768874
                      TrID:
                      • Win64 Executable GUI (202006/5) 92.65%
                      • Win64 Executable (generic) (12005/4) 5.51%
                      • Generic Win/DOS Executable (2004/3) 0.92%
                      • DOS Executable Generic (2002/1) 0.92%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:ITC590-Script 3 V2-P-2024.exe
                      File size:7'247'553 bytes
                      MD5:ae50e6bab627b7a39408186e75821ea3
                      SHA1:69ce995fc2e079c7a7afc9f327a5949356ef6223
                      SHA256:ca7788bea6909aab6f62b8218025f2b6050c27ffac885e457c60fdc57b2c2d67
                      SHA512:b58483579b05d1cdcc0aa013dc6f1c62ba3c1b006a1c65ef552a5f9b1b84ca8782f27e7b786c303410069943fe5df3bef3ab595029692f5f7b9b324456bade54
                      SSDEEP:196608:/jV2NBKA1HeT39Iig5Tet4Q4G/NsINyzWWAMYI93:LV2fj1+TtIiOS1NsIkzWWAcx
                      TLSH:D6763355B2F18DE9DAF38239D2F14216A6923C665760C19F13B83B2A3F33581ED3A714
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Zpc.Zpc.Zpc...`.]pc...f..pc...g.Ppc.....Ypc...`.Spc...g.Kpc...f.rpc...b.Qpc.Zpb..pc.O.g.Cpc.O.a.[pc.RichZpc.........PE..d..
                      Icon Hash:0914347a7d4d9519
                      Entrypoint:0x14000cdb0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66C48A5F [Tue Aug 20 12:21:51 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:72c4e339b7af8ab1ed2eb3821c98713a
                      Instruction
                      dec eax
                      sub esp, 28h
                      call 00007FD7C8C38FCCh
                      dec eax
                      add esp, 28h
                      jmp 00007FD7C8C38BEFh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      dec eax
                      sub esp, 28h
                      call 00007FD7C8C39398h
                      test eax, eax
                      je 00007FD7C8C38D93h
                      dec eax
                      mov eax, dword ptr [00000030h]
                      dec eax
                      mov ecx, dword ptr [eax+08h]
                      jmp 00007FD7C8C38D77h
                      dec eax
                      cmp ecx, eax
                      je 00007FD7C8C38D86h
                      xor eax, eax
                      dec eax
                      cmpxchg dword ptr [0003577Ch], ecx
                      jne 00007FD7C8C38D60h
                      xor al, al
                      dec eax
                      add esp, 28h
                      ret
                      mov al, 01h
                      jmp 00007FD7C8C38D69h
                      int3
                      int3
                      int3
                      dec eax
                      sub esp, 28h
                      test ecx, ecx
                      jne 00007FD7C8C38D79h
                      mov byte ptr [00035765h], 00000001h
                      call 00007FD7C8C384C5h
                      call 00007FD7C8C397B0h
                      test al, al
                      jne 00007FD7C8C38D76h
                      xor al, al
                      jmp 00007FD7C8C38D86h
                      call 00007FD7C8C462CFh
                      test al, al
                      jne 00007FD7C8C38D7Bh
                      xor ecx, ecx
                      call 00007FD7C8C397C0h
                      jmp 00007FD7C8C38D5Ch
                      mov al, 01h
                      dec eax
                      add esp, 28h
                      ret
                      int3
                      int3
                      inc eax
                      push ebx
                      dec eax
                      sub esp, 20h
                      cmp byte ptr [0003572Ch], 00000000h
                      mov ebx, ecx
                      jne 00007FD7C8C38DD9h
                      cmp ecx, 01h
                      jnbe 00007FD7C8C38DDCh
                      call 00007FD7C8C3930Eh
                      test eax, eax
                      je 00007FD7C8C38D9Ah
                      test ebx, ebx
                      jne 00007FD7C8C38D96h
                      dec eax
                      lea ecx, dword ptr [00035716h]
                      call 00007FD7C8C460C2h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3ca5c0x78.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x10e34.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x440000x2250.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000x764.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0800x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39f400x140.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x4a0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x29f000x2a000a6c3b829cc8eaabb1a474c227e90407fFalse0.5514206659226191data6.487493643901088IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x2b0000x12a500x12c00cda4abc23abf74bd211d889cc0800cd0False0.52453125data5.752802244244773IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x3e0000x53f80xe00dba0caeecab624a0ccc0d577241601d1False0.134765625data1.8392217063172436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x440000x22500x2400181312260a85d10a1454ba38901c499bFalse0.4705946180555556data5.290347578351011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x470000x10e340x11000dab4368a357cbd0d6e98b24ee58e798eFalse0.2670323988970588data3.4978318250119744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x580000x7640x800816c68eeb419ee2c08656c31c06a0fffFalse0.5576171875data5.2809528666624175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x470e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2443 x 2443 px/m0.2621110848219567
                      RT_GROUP_ICON0x579100x14data1.15
                      RT_MANIFEST0x579240x50dXML 1.0 document, ASCII text0.4694508894044857
                      DLLImport
                      USER32.dllCreateWindowExW, ShutdownBlockReasonCreate, MsgWaitForMultipleObjects, ShowWindow, DestroyWindow, RegisterClassW, DefWindowProcW, PeekMessageW, DispatchMessageW, TranslateMessage, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                      COMCTL32.dll
                      KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, LCMapStringW, CompareStringW, FlsFree, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, FormatMessageW, GetLastError, GetModuleFileNameW, LoadLibraryExW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, GetEnvironmentStringsW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, QueryPerformanceCounter, QueryPerformanceFrequency, WaitForSingleObject, Sleep, GetCurrentProcess, TerminateProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FlsSetValue, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, CreateDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue
                      ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                      GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-09-30T02:11:08.544585+02002049956ET MALWARE Test CnC Domain in DNS Lookup (test .com)1192.168.2.4558461.1.1.153UDP
                      2024-09-30T02:11:08.544585+02002049957ET MALWARE X CnC Domain in DNS Lookup (test .com)1192.168.2.4558461.1.1.153UDP
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 30, 2024 02:09:58.465965033 CEST4973080192.168.2.4172.16.77.202
                      Sep 30, 2024 02:09:58.470875978 CEST8049730172.16.77.202192.168.2.4
                      Sep 30, 2024 02:09:58.471035004 CEST4973080192.168.2.4172.16.77.202
                      Sep 30, 2024 02:10:03.465521097 CEST4973180192.168.2.4172.16.63.22
                      Sep 30, 2024 02:10:03.471817017 CEST8049731172.16.63.22192.168.2.4
                      Sep 30, 2024 02:10:03.471889973 CEST4973180192.168.2.4172.16.63.22
                      Sep 30, 2024 02:10:08.466824055 CEST4973280192.168.2.4172.16.237.12
                      Sep 30, 2024 02:10:08.471750975 CEST8049732172.16.237.12192.168.2.4
                      Sep 30, 2024 02:10:08.471831083 CEST4973280192.168.2.4172.16.237.12
                      Sep 30, 2024 02:10:13.468187094 CEST4973380192.168.2.4172.16.177.209
                      Sep 30, 2024 02:10:13.473108053 CEST8049733172.16.177.209192.168.2.4
                      Sep 30, 2024 02:10:13.473278999 CEST4973380192.168.2.4172.16.177.209
                      Sep 30, 2024 02:10:18.468806982 CEST4974080192.168.2.4172.16.89.192
                      Sep 30, 2024 02:10:18.473663092 CEST8049740172.16.89.192192.168.2.4
                      Sep 30, 2024 02:10:18.473738909 CEST4974080192.168.2.4172.16.89.192
                      Sep 30, 2024 02:10:19.855202913 CEST8049730172.16.77.202192.168.2.4
                      Sep 30, 2024 02:10:19.855257034 CEST4973080192.168.2.4172.16.77.202
                      Sep 30, 2024 02:10:23.469808102 CEST4974180192.168.2.4172.16.69.225
                      Sep 30, 2024 02:10:23.474875927 CEST8049741172.16.69.225192.168.2.4
                      Sep 30, 2024 02:10:23.474940062 CEST4974180192.168.2.4172.16.69.225
                      Sep 30, 2024 02:10:24.840070009 CEST8049731172.16.63.22192.168.2.4
                      Sep 30, 2024 02:10:24.842946053 CEST4973180192.168.2.4172.16.63.22
                      Sep 30, 2024 02:10:28.472342968 CEST4974280192.168.2.4172.16.246.98
                      Sep 30, 2024 02:10:28.477368116 CEST8049742172.16.246.98192.168.2.4
                      Sep 30, 2024 02:10:28.477457047 CEST4974280192.168.2.4172.16.246.98
                      Sep 30, 2024 02:10:29.859313965 CEST8049732172.16.237.12192.168.2.4
                      Sep 30, 2024 02:10:29.859428883 CEST4973280192.168.2.4172.16.237.12
                      Sep 30, 2024 02:10:33.479288101 CEST4974380192.168.2.4172.16.97.133
                      Sep 30, 2024 02:10:33.484142065 CEST8049743172.16.97.133192.168.2.4
                      Sep 30, 2024 02:10:33.484991074 CEST4974380192.168.2.4172.16.97.133
                      Sep 30, 2024 02:10:34.838591099 CEST8049733172.16.177.209192.168.2.4
                      Sep 30, 2024 02:10:34.838795900 CEST4973380192.168.2.4172.16.177.209
                      Sep 30, 2024 02:10:38.472254992 CEST4973080192.168.2.4172.16.77.202
                      Sep 30, 2024 02:10:38.477170944 CEST8049730172.16.77.202192.168.2.4
                      Sep 30, 2024 02:10:38.479856968 CEST4974480192.168.2.4172.16.56.13
                      Sep 30, 2024 02:10:38.484761953 CEST8049744172.16.56.13192.168.2.4
                      Sep 30, 2024 02:10:38.484855890 CEST4974480192.168.2.4172.16.56.13
                      Sep 30, 2024 02:10:39.873469114 CEST8049740172.16.89.192192.168.2.4
                      Sep 30, 2024 02:10:39.879038095 CEST4974080192.168.2.4172.16.89.192
                      Sep 30, 2024 02:10:43.480320930 CEST4973180192.168.2.4172.16.63.22
                      Sep 30, 2024 02:10:43.482459068 CEST4974580192.168.2.4172.16.9.240
                      Sep 30, 2024 02:10:43.485166073 CEST8049731172.16.63.22192.168.2.4
                      Sep 30, 2024 02:10:43.487278938 CEST8049745172.16.9.240192.168.2.4
                      Sep 30, 2024 02:10:43.487343073 CEST4974580192.168.2.4172.16.9.240
                      Sep 30, 2024 02:10:44.838346958 CEST8049741172.16.69.225192.168.2.4
                      Sep 30, 2024 02:10:44.838413954 CEST4974180192.168.2.4172.16.69.225
                      Sep 30, 2024 02:10:48.472296000 CEST4973280192.168.2.4172.16.237.12
                      Sep 30, 2024 02:10:48.479151011 CEST8049732172.16.237.12192.168.2.4
                      Sep 30, 2024 02:10:49.844161034 CEST8049742172.16.246.98192.168.2.4
                      Sep 30, 2024 02:10:49.844239950 CEST4974280192.168.2.4172.16.246.98
                      Sep 30, 2024 02:10:53.482415915 CEST4973380192.168.2.4172.16.177.209
                      Sep 30, 2024 02:10:53.487237930 CEST8049733172.16.177.209192.168.2.4
                      Sep 30, 2024 02:10:54.856260061 CEST8049743172.16.97.133192.168.2.4
                      Sep 30, 2024 02:10:54.856364965 CEST4974380192.168.2.4172.16.97.133
                      Sep 30, 2024 02:10:58.485281944 CEST4974080192.168.2.4172.16.89.192
                      Sep 30, 2024 02:10:58.490219116 CEST8049740172.16.89.192192.168.2.4
                      Sep 30, 2024 02:10:59.872240067 CEST8049744172.16.56.13192.168.2.4
                      Sep 30, 2024 02:10:59.875117064 CEST4974480192.168.2.4172.16.56.13
                      Sep 30, 2024 02:11:03.475871086 CEST4974180192.168.2.4172.16.69.225
                      Sep 30, 2024 02:11:03.480789900 CEST8049741172.16.69.225192.168.2.4
                      Sep 30, 2024 02:11:04.840853930 CEST8049745172.16.9.240192.168.2.4
                      Sep 30, 2024 02:11:04.840933084 CEST4974580192.168.2.4172.16.9.240
                      Sep 30, 2024 02:11:08.478358030 CEST4974280192.168.2.4172.16.246.98
                      Sep 30, 2024 02:11:08.484172106 CEST8049742172.16.246.98192.168.2.4
                      Sep 30, 2024 02:11:13.485912085 CEST4974380192.168.2.4172.16.97.133
                      Sep 30, 2024 02:11:13.491017103 CEST8049743172.16.97.133192.168.2.4
                      Sep 30, 2024 02:11:18.494988918 CEST4974480192.168.2.4172.16.56.13
                      Sep 30, 2024 02:11:18.499982119 CEST8049744172.16.56.13192.168.2.4
                      Sep 30, 2024 02:11:23.496454000 CEST4974580192.168.2.4172.16.9.240
                      Sep 30, 2024 02:11:23.501416922 CEST8049745172.16.9.240192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 30, 2024 02:10:48.491168976 CEST5851853192.168.2.41.1.1.1
                      Sep 30, 2024 02:10:48.502798080 CEST53585181.1.1.1192.168.2.4
                      Sep 30, 2024 02:10:58.549777031 CEST5757553192.168.2.41.1.1.1
                      Sep 30, 2024 02:10:58.564137936 CEST53575751.1.1.1192.168.2.4
                      Sep 30, 2024 02:11:08.544584990 CEST5584653192.168.2.41.1.1.1
                      Sep 30, 2024 02:11:08.551413059 CEST53558461.1.1.1192.168.2.4
                      Sep 30, 2024 02:11:18.545569897 CEST5581153192.168.2.41.1.1.1
                      Sep 30, 2024 02:11:18.561050892 CEST53558111.1.1.1192.168.2.4
                      Sep 30, 2024 02:11:28.546617031 CEST6028253192.168.2.41.1.1.1
                      Sep 30, 2024 02:11:28.561342001 CEST53602821.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 30, 2024 02:10:48.491168976 CEST192.168.2.41.1.1.10xef9aStandard query (0)malicious-site.netA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:10:58.549777031 CEST192.168.2.41.1.1.10x8dacStandard query (0)suspicious-domain.orgA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:08.544584990 CEST192.168.2.41.1.1.10x381eStandard query (0)test.comA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:18.545569897 CEST192.168.2.41.1.1.10xb7c9Standard query (0)suspicious-domain.orgA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:28.546617031 CEST192.168.2.41.1.1.10xbd5Standard query (0)suspicious-domain.orgA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 30, 2024 02:10:48.502798080 CEST1.1.1.1192.168.2.40xef9aName error (3)malicious-site.netnonenoneA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:10:58.564137936 CEST1.1.1.1192.168.2.40x8dacName error (3)suspicious-domain.orgnonenoneA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:08.551413059 CEST1.1.1.1192.168.2.40x381eNo error (0)test.com34.224.149.186A (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:08.551413059 CEST1.1.1.1192.168.2.40x381eNo error (0)test.com3.18.255.247A (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:18.561050892 CEST1.1.1.1192.168.2.40xb7c9Name error (3)suspicious-domain.orgnonenoneA (IP address)IN (0x0001)false
                      Sep 30, 2024 02:11:28.561342001 CEST1.1.1.1192.168.2.40xbd5Name error (3)suspicious-domain.orgnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:20:09:56
                      Start date:29/09/2024
                      Path:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"
                      Imagebase:0x7ff77d680000
                      File size:7'247'553 bytes
                      MD5 hash:AE50E6BAB627B7A39408186E75821EA3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:20:09:57
                      Start date:29/09/2024
                      Path:C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe"
                      Imagebase:0x7ff77d680000
                      File size:7'247'553 bytes
                      MD5 hash:AE50E6BAB627B7A39408186E75821EA3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:8.5%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:13.9%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:32
                        execution_graph 18879 7ff77d6a0290 18880 7ff77d6a0298 18879->18880 18882 7ff77d6a02c9 18880->18882 18883 7ff77d6a02c5 18880->18883 18885 7ff77d69f074 18880->18885 18890 7ff77d6a0300 18882->18890 18894 7ff77d69ed10 18885->18894 18888 7ff77d69f0af 18888->18880 18889 7ff77d69f0c9 InitializeCriticalSectionAndSpinCount 18889->18888 18891 7ff77d6a032b 18890->18891 18892 7ff77d6a032f 18891->18892 18893 7ff77d6a030e DeleteCriticalSection 18891->18893 18892->18883 18893->18891 18895 7ff77d69ed6d 18894->18895 18896 7ff77d69ed68 __vcrt_InitializeCriticalSectionEx 18894->18896 18895->18888 18895->18889 18896->18895 18897 7ff77d69ed9d LoadLibraryExW 18896->18897 18898 7ff77d69ee92 GetProcAddress 18896->18898 18903 7ff77d69edfc LoadLibraryExW 18896->18903 18899 7ff77d69ee72 18897->18899 18900 7ff77d69edc2 GetLastError 18897->18900 18898->18895 18902 7ff77d69eea3 18898->18902 18899->18898 18901 7ff77d69ee89 FreeLibrary 18899->18901 18900->18896 18901->18898 18902->18895 18903->18896 18903->18899 20436 7ff77d695410 20437 7ff77d69541b 20436->20437 20445 7ff77d69f2a4 20437->20445 20458 7ff77d6a02d8 EnterCriticalSection 20445->20458 20178 7ff77d69f98c 20179 7ff77d69fb7e 20178->20179 20183 7ff77d69f9ce _isindst 20178->20183 20180 7ff77d694f08 _get_daylight 11 API calls 20179->20180 20198 7ff77d69fb6e 20180->20198 20181 7ff77d68c550 _log10_special 8 API calls 20182 7ff77d69fb99 20181->20182 20183->20179 20184 7ff77d69fa4e _isindst 20183->20184 20199 7ff77d6a6194 20184->20199 20189 7ff77d69fbaa 20191 7ff77d69a900 _isindst 17 API calls 20189->20191 20193 7ff77d69fbbe 20191->20193 20196 7ff77d69faab 20196->20198 20224 7ff77d6a61d8 20196->20224 20198->20181 20200 7ff77d69fa6c 20199->20200 20201 7ff77d6a61a3 20199->20201 20206 7ff77d6a5598 20200->20206 20231 7ff77d6a02d8 EnterCriticalSection 20201->20231 20207 7ff77d6a55a1 20206->20207 20211 7ff77d69fa81 20206->20211 20208 7ff77d694f08 _get_daylight 11 API calls 20207->20208 20209 7ff77d6a55a6 20208->20209 20210 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 20209->20210 20210->20211 20211->20189 20212 7ff77d6a55c8 20211->20212 20213 7ff77d6a55d1 20212->20213 20215 7ff77d69fa92 20212->20215 20214 7ff77d694f08 _get_daylight 11 API calls 20213->20214 20216 7ff77d6a55d6 20214->20216 20215->20189 20218 7ff77d6a55f8 20215->20218 20217 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 20216->20217 20217->20215 20219 7ff77d6a5601 20218->20219 20220 7ff77d69faa3 20218->20220 20221 7ff77d694f08 _get_daylight 11 API calls 20219->20221 20220->20189 20220->20196 20222 7ff77d6a5606 20221->20222 20223 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 20222->20223 20223->20220 20232 7ff77d6a02d8 EnterCriticalSection 20224->20232 20468 7ff77d6aadfe 20469 7ff77d6aae17 20468->20469 20470 7ff77d6aae0d 20468->20470 20472 7ff77d6a0338 LeaveCriticalSection 20470->20472 20246 7ff77d6aad69 20249 7ff77d695478 LeaveCriticalSection 20246->20249 15917 7ff77d68bae0 15918 7ff77d68bb0e 15917->15918 15919 7ff77d68baf5 15917->15919 15919->15918 15922 7ff77d69d5fc 15919->15922 15923 7ff77d69d647 15922->15923 15928 7ff77d69d60b _get_daylight 15922->15928 15932 7ff77d694f08 15923->15932 15924 7ff77d69d62e HeapAlloc 15926 7ff77d68bb6e 15924->15926 15924->15928 15928->15923 15928->15924 15929 7ff77d6a3590 15928->15929 15935 7ff77d6a35d0 15929->15935 15941 7ff77d69b2c8 GetLastError 15932->15941 15934 7ff77d694f11 15934->15926 15940 7ff77d6a02d8 EnterCriticalSection 15935->15940 15942 7ff77d69b309 FlsSetValue 15941->15942 15946 7ff77d69b2ec 15941->15946 15943 7ff77d69b31b 15942->15943 15947 7ff77d69b2f9 SetLastError 15942->15947 15958 7ff77d69eb98 15943->15958 15946->15942 15946->15947 15947->15934 15948 7ff77d69b32a 15949 7ff77d69b348 FlsSetValue 15948->15949 15950 7ff77d69b338 FlsSetValue 15948->15950 15951 7ff77d69b354 FlsSetValue 15949->15951 15952 7ff77d69b366 15949->15952 15953 7ff77d69b341 15950->15953 15951->15953 15971 7ff77d69aef4 15952->15971 15965 7ff77d69a948 15953->15965 15959 7ff77d69eba9 _get_daylight 15958->15959 15960 7ff77d69ebfa 15959->15960 15961 7ff77d69ebde HeapAlloc 15959->15961 15964 7ff77d6a3590 _get_daylight 2 API calls 15959->15964 15962 7ff77d694f08 _get_daylight 10 API calls 15960->15962 15961->15959 15963 7ff77d69ebf8 15961->15963 15962->15963 15963->15948 15964->15959 15966 7ff77d69a97c 15965->15966 15967 7ff77d69a94d RtlFreeHeap 15965->15967 15966->15947 15967->15966 15968 7ff77d69a968 GetLastError 15967->15968 15969 7ff77d69a975 Concurrency::details::SchedulerProxy::DeleteThis 15968->15969 15970 7ff77d694f08 _get_daylight 9 API calls 15969->15970 15970->15966 15976 7ff77d69adcc 15971->15976 15988 7ff77d6a02d8 EnterCriticalSection 15976->15988 15990 7ff77d699961 16002 7ff77d69a3d8 15990->16002 16007 7ff77d69b150 GetLastError 16002->16007 16008 7ff77d69b191 FlsSetValue 16007->16008 16009 7ff77d69b174 FlsGetValue 16007->16009 16011 7ff77d69b1a3 16008->16011 16012 7ff77d69b181 16008->16012 16010 7ff77d69b18b 16009->16010 16009->16012 16010->16008 16014 7ff77d69eb98 _get_daylight 11 API calls 16011->16014 16013 7ff77d69b1fd SetLastError 16012->16013 16015 7ff77d69a3e1 16013->16015 16016 7ff77d69b21d 16013->16016 16017 7ff77d69b1b2 16014->16017 16029 7ff77d69a504 16015->16029 16018 7ff77d69a504 __GetCurrentState 38 API calls 16016->16018 16019 7ff77d69b1d0 FlsSetValue 16017->16019 16020 7ff77d69b1c0 FlsSetValue 16017->16020 16021 7ff77d69b222 16018->16021 16023 7ff77d69b1dc FlsSetValue 16019->16023 16024 7ff77d69b1ee 16019->16024 16022 7ff77d69b1c9 16020->16022 16026 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16022->16026 16023->16022 16025 7ff77d69aef4 _get_daylight 11 API calls 16024->16025 16027 7ff77d69b1f6 16025->16027 16026->16012 16028 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16027->16028 16028->16013 16038 7ff77d6a3650 16029->16038 16072 7ff77d6a3608 16038->16072 16077 7ff77d6a02d8 EnterCriticalSection 16072->16077 20474 7ff77d6aabe3 20475 7ff77d6aabf3 20474->20475 20478 7ff77d695478 LeaveCriticalSection 20475->20478 20289 7ff77d699d50 20292 7ff77d699ccc 20289->20292 20299 7ff77d6a02d8 EnterCriticalSection 20292->20299 20547 7ff77d69afd0 20548 7ff77d69afea 20547->20548 20549 7ff77d69afd5 20547->20549 20553 7ff77d69aff0 20549->20553 20554 7ff77d69b032 20553->20554 20555 7ff77d69b03a 20553->20555 20556 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20554->20556 20557 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20555->20557 20556->20555 20558 7ff77d69b047 20557->20558 20559 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20558->20559 20560 7ff77d69b054 20559->20560 20561 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20560->20561 20562 7ff77d69b061 20561->20562 20563 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20562->20563 20564 7ff77d69b06e 20563->20564 20565 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20564->20565 20566 7ff77d69b07b 20565->20566 20567 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20566->20567 20568 7ff77d69b088 20567->20568 20569 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20568->20569 20570 7ff77d69b095 20569->20570 20571 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20570->20571 20572 7ff77d69b0a5 20571->20572 20573 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20572->20573 20574 7ff77d69b0b5 20573->20574 20579 7ff77d69ae94 20574->20579 20593 7ff77d6a02d8 EnterCriticalSection 20579->20593 20300 7ff77d68cb50 20301 7ff77d68cb60 20300->20301 20317 7ff77d699ba8 20301->20317 20303 7ff77d68cb6c 20323 7ff77d68ce48 20303->20323 20305 7ff77d68d12c 7 API calls 20307 7ff77d68cc05 20305->20307 20306 7ff77d68cb84 _RTC_Initialize 20315 7ff77d68cbd9 20306->20315 20328 7ff77d68cff8 20306->20328 20309 7ff77d68cb99 20331 7ff77d699014 20309->20331 20315->20305 20316 7ff77d68cbf5 20315->20316 20318 7ff77d699bb9 20317->20318 20319 7ff77d699bc1 20318->20319 20320 7ff77d694f08 _get_daylight 11 API calls 20318->20320 20319->20303 20321 7ff77d699bd0 20320->20321 20322 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 20321->20322 20322->20319 20324 7ff77d68ce59 20323->20324 20327 7ff77d68ce5e __scrt_acquire_startup_lock 20323->20327 20325 7ff77d68d12c 7 API calls 20324->20325 20324->20327 20326 7ff77d68ced2 20325->20326 20327->20306 20356 7ff77d68cfbc 20328->20356 20330 7ff77d68d001 20330->20309 20332 7ff77d699034 20331->20332 20354 7ff77d68cba5 20331->20354 20333 7ff77d699052 GetModuleFileNameW 20332->20333 20334 7ff77d69903c 20332->20334 20338 7ff77d69907d 20333->20338 20335 7ff77d694f08 _get_daylight 11 API calls 20334->20335 20336 7ff77d699041 20335->20336 20337 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 20336->20337 20337->20354 20339 7ff77d698fb4 11 API calls 20338->20339 20340 7ff77d6990bd 20339->20340 20341 7ff77d6990c5 20340->20341 20342 7ff77d6990dd 20340->20342 20343 7ff77d694f08 _get_daylight 11 API calls 20341->20343 20346 7ff77d6990ff 20342->20346 20348 7ff77d699144 20342->20348 20349 7ff77d69912b 20342->20349 20344 7ff77d6990ca 20343->20344 20345 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20344->20345 20345->20354 20347 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20346->20347 20347->20354 20352 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20348->20352 20350 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20349->20350 20351 7ff77d699134 20350->20351 20353 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20351->20353 20352->20346 20353->20354 20354->20315 20355 7ff77d68d0cc InitializeSListHead 20354->20355 20357 7ff77d68cfd6 20356->20357 20359 7ff77d68cfcf 20356->20359 20360 7ff77d69a1ec 20357->20360 20359->20330 20363 7ff77d699e28 20360->20363 20370 7ff77d6a02d8 EnterCriticalSection 20363->20370 16389 7ff77d68cc3c 16410 7ff77d68ce0c 16389->16410 16392 7ff77d68cd88 16564 7ff77d68d12c IsProcessorFeaturePresent 16392->16564 16393 7ff77d68cc58 __scrt_acquire_startup_lock 16395 7ff77d68cd92 16393->16395 16399 7ff77d68cc76 __scrt_release_startup_lock 16393->16399 16396 7ff77d68d12c 7 API calls 16395->16396 16398 7ff77d68cd9d __GetCurrentState 16396->16398 16397 7ff77d68cc9b 16399->16397 16400 7ff77d68cd21 16399->16400 16553 7ff77d699b2c 16399->16553 16416 7ff77d68d274 16400->16416 16402 7ff77d68cd26 16419 7ff77d681000 16402->16419 16407 7ff77d68cd49 16407->16398 16560 7ff77d68cf90 16407->16560 16411 7ff77d68ce14 16410->16411 16412 7ff77d68ce20 __scrt_dllmain_crt_thread_attach 16411->16412 16413 7ff77d68ce2d 16412->16413 16415 7ff77d68cc50 16412->16415 16413->16415 16571 7ff77d68d888 16413->16571 16415->16392 16415->16393 16417 7ff77d6aa4d0 memcpy_s 16416->16417 16418 7ff77d68d28b GetStartupInfoW 16417->16418 16418->16402 16420 7ff77d681009 16419->16420 16598 7ff77d695484 16420->16598 16422 7ff77d6837fb 16605 7ff77d6836b0 16422->16605 16427 7ff77d68c550 _log10_special 8 API calls 16428 7ff77d683ca7 16427->16428 16558 7ff77d68d2b8 GetModuleHandleW 16428->16558 16429 7ff77d68383c 16765 7ff77d681c80 16429->16765 16430 7ff77d68391b 16774 7ff77d6845c0 16430->16774 16434 7ff77d68385b 16677 7ff77d688830 16434->16677 16435 7ff77d68396a 16797 7ff77d682710 16435->16797 16439 7ff77d68388e 16446 7ff77d6838bb __std_exception_copy 16439->16446 16769 7ff77d6889a0 16439->16769 16440 7ff77d68395d 16441 7ff77d683984 16440->16441 16442 7ff77d683962 16440->16442 16444 7ff77d681c80 49 API calls 16441->16444 16793 7ff77d69004c 16442->16793 16447 7ff77d6839a3 16444->16447 16448 7ff77d688830 14 API calls 16446->16448 16456 7ff77d6838de __std_exception_copy 16446->16456 16452 7ff77d681950 115 API calls 16447->16452 16448->16456 16450 7ff77d683a0b 16451 7ff77d6889a0 40 API calls 16450->16451 16453 7ff77d683a17 16451->16453 16454 7ff77d6839ce 16452->16454 16457 7ff77d6889a0 40 API calls 16453->16457 16454->16434 16455 7ff77d6839de 16454->16455 16458 7ff77d682710 54 API calls 16455->16458 16461 7ff77d68390e __std_exception_copy 16456->16461 16808 7ff77d688940 16456->16808 16459 7ff77d683a23 16457->16459 16467 7ff77d683808 __std_exception_copy 16458->16467 16460 7ff77d6889a0 40 API calls 16459->16460 16460->16461 16462 7ff77d688830 14 API calls 16461->16462 16463 7ff77d683a3b 16462->16463 16464 7ff77d683b2f 16463->16464 16465 7ff77d683a60 __std_exception_copy 16463->16465 16466 7ff77d682710 54 API calls 16464->16466 16468 7ff77d688940 40 API calls 16465->16468 16476 7ff77d683aab 16465->16476 16466->16467 16467->16427 16468->16476 16469 7ff77d688830 14 API calls 16470 7ff77d683bf4 __std_exception_copy 16469->16470 16471 7ff77d683c46 16470->16471 16472 7ff77d683d41 16470->16472 16473 7ff77d683cd4 16471->16473 16474 7ff77d683c50 16471->16474 16815 7ff77d6844e0 16472->16815 16478 7ff77d688830 14 API calls 16473->16478 16690 7ff77d6890e0 16474->16690 16476->16469 16481 7ff77d683ce0 16478->16481 16479 7ff77d683d4f 16482 7ff77d683d65 16479->16482 16483 7ff77d683d71 16479->16483 16484 7ff77d683c61 16481->16484 16488 7ff77d683ced 16481->16488 16818 7ff77d684630 16482->16818 16486 7ff77d681c80 49 API calls 16483->16486 16490 7ff77d682710 54 API calls 16484->16490 16497 7ff77d683cc8 __std_exception_copy 16486->16497 16491 7ff77d681c80 49 API calls 16488->16491 16490->16467 16494 7ff77d683d0b 16491->16494 16492 7ff77d683dbc 16740 7ff77d689390 16492->16740 16494->16497 16498 7ff77d683d12 16494->16498 16495 7ff77d683da7 LoadLibraryExW 16495->16492 16496 7ff77d683dcf SetDllDirectoryW 16501 7ff77d683e02 16496->16501 16543 7ff77d683e52 16496->16543 16497->16492 16497->16495 16500 7ff77d682710 54 API calls 16498->16500 16500->16467 16503 7ff77d688830 14 API calls 16501->16503 16502 7ff77d684000 16505 7ff77d68402d 16502->16505 16506 7ff77d68400a PostMessageW GetMessageW 16502->16506 16509 7ff77d683e0e __std_exception_copy 16503->16509 16504 7ff77d683f13 16745 7ff77d6833c0 16504->16745 16895 7ff77d683360 16505->16895 16506->16505 16511 7ff77d683eea 16509->16511 16515 7ff77d683e46 16509->16515 16514 7ff77d688940 40 API calls 16511->16514 16514->16543 16515->16543 16821 7ff77d686dc0 16515->16821 16522 7ff77d686fc0 FreeLibrary 16523 7ff77d684053 16522->16523 16531 7ff77d683e79 16533 7ff77d683e9a 16531->16533 16544 7ff77d683e7d 16531->16544 16842 7ff77d686e00 16531->16842 16533->16544 16861 7ff77d6871b0 16533->16861 16543->16502 16543->16504 16544->16543 16877 7ff77d682a50 16544->16877 16554 7ff77d699b64 16553->16554 16555 7ff77d699b43 16553->16555 16556 7ff77d69a3d8 45 API calls 16554->16556 16555->16400 16557 7ff77d699b69 16556->16557 16559 7ff77d68d2c9 16558->16559 16559->16407 16562 7ff77d68cfa1 16560->16562 16561 7ff77d68cd60 16561->16397 16562->16561 16563 7ff77d68d888 7 API calls 16562->16563 16563->16561 16565 7ff77d68d152 _isindst memcpy_s 16564->16565 16566 7ff77d68d171 RtlCaptureContext RtlLookupFunctionEntry 16565->16566 16567 7ff77d68d1d6 memcpy_s 16566->16567 16568 7ff77d68d19a RtlVirtualUnwind 16566->16568 16569 7ff77d68d208 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16567->16569 16568->16567 16570 7ff77d68d256 _isindst 16569->16570 16570->16395 16572 7ff77d68d890 16571->16572 16573 7ff77d68d89a 16571->16573 16577 7ff77d68dc24 16572->16577 16573->16415 16578 7ff77d68d895 16577->16578 16579 7ff77d68dc33 16577->16579 16581 7ff77d68dc90 16578->16581 16585 7ff77d68de60 16579->16585 16582 7ff77d68dcbb 16581->16582 16583 7ff77d68dcbf 16582->16583 16584 7ff77d68dc9e DeleteCriticalSection 16582->16584 16583->16573 16584->16582 16589 7ff77d68dcc8 16585->16589 16590 7ff77d68ddb2 TlsFree 16589->16590 16596 7ff77d68dd0c __vcrt_InitializeCriticalSectionEx 16589->16596 16591 7ff77d68dd3a LoadLibraryExW 16593 7ff77d68ddd9 16591->16593 16594 7ff77d68dd5b GetLastError 16591->16594 16592 7ff77d68ddf9 GetProcAddress 16592->16590 16593->16592 16595 7ff77d68ddf0 FreeLibrary 16593->16595 16594->16596 16595->16592 16596->16590 16596->16591 16596->16592 16597 7ff77d68dd7d LoadLibraryExW 16596->16597 16597->16593 16597->16596 16600 7ff77d69f480 16598->16600 16599 7ff77d69f4d3 16601 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 16599->16601 16600->16599 16602 7ff77d69f526 16600->16602 16604 7ff77d69f4fc 16601->16604 16908 7ff77d69f358 16602->16908 16604->16422 16916 7ff77d68c850 16605->16916 16608 7ff77d6836eb GetLastError 16923 7ff77d682c50 16608->16923 16609 7ff77d683710 16918 7ff77d689280 FindFirstFileExW 16609->16918 16613 7ff77d68377d 16949 7ff77d689440 16613->16949 16614 7ff77d683723 16938 7ff77d689300 CreateFileW 16614->16938 16616 7ff77d68c550 _log10_special 8 API calls 16619 7ff77d6837b5 16616->16619 16618 7ff77d68378b 16623 7ff77d682810 49 API calls 16618->16623 16626 7ff77d683706 16618->16626 16619->16467 16627 7ff77d681950 16619->16627 16621 7ff77d683734 16941 7ff77d682810 16621->16941 16622 7ff77d68374c __vcrt_InitializeCriticalSectionEx 16622->16613 16623->16626 16626->16616 16628 7ff77d6845c0 108 API calls 16627->16628 16629 7ff77d681985 16628->16629 16630 7ff77d681c43 16629->16630 16631 7ff77d687f90 83 API calls 16629->16631 16632 7ff77d68c550 _log10_special 8 API calls 16630->16632 16634 7ff77d6819cb 16631->16634 16633 7ff77d681c5e 16632->16633 16633->16429 16633->16430 16647 7ff77d681a03 16634->16647 17306 7ff77d6906d4 16634->17306 16636 7ff77d69004c 74 API calls 16636->16630 16637 7ff77d6819e5 16638 7ff77d6819e9 16637->16638 16639 7ff77d681a08 16637->16639 16641 7ff77d694f08 _get_daylight 11 API calls 16638->16641 17310 7ff77d69039c 16639->17310 16643 7ff77d6819ee 16641->16643 17313 7ff77d682910 16643->17313 16644 7ff77d681a26 16648 7ff77d694f08 _get_daylight 11 API calls 16644->16648 16645 7ff77d681a45 16651 7ff77d681a5c 16645->16651 16652 7ff77d681a7b 16645->16652 16647->16636 16649 7ff77d681a2b 16648->16649 16650 7ff77d682910 54 API calls 16649->16650 16650->16647 16654 7ff77d694f08 _get_daylight 11 API calls 16651->16654 16653 7ff77d681c80 49 API calls 16652->16653 16655 7ff77d681a92 16653->16655 16656 7ff77d681a61 16654->16656 16657 7ff77d681c80 49 API calls 16655->16657 16658 7ff77d682910 54 API calls 16656->16658 16659 7ff77d681add 16657->16659 16658->16647 16660 7ff77d6906d4 73 API calls 16659->16660 16661 7ff77d681b01 16660->16661 16662 7ff77d681b16 16661->16662 16663 7ff77d681b35 16661->16663 16665 7ff77d694f08 _get_daylight 11 API calls 16662->16665 16664 7ff77d69039c _fread_nolock 53 API calls 16663->16664 16666 7ff77d681b4a 16664->16666 16667 7ff77d681b1b 16665->16667 16668 7ff77d681b50 16666->16668 16669 7ff77d681b6f 16666->16669 16670 7ff77d682910 54 API calls 16667->16670 16671 7ff77d694f08 _get_daylight 11 API calls 16668->16671 17328 7ff77d690110 16669->17328 16670->16647 16673 7ff77d681b55 16671->16673 16675 7ff77d682910 54 API calls 16673->16675 16675->16647 16676 7ff77d682710 54 API calls 16676->16647 16678 7ff77d68883a 16677->16678 16679 7ff77d689390 2 API calls 16678->16679 16680 7ff77d688859 GetEnvironmentVariableW 16679->16680 16681 7ff77d6888c2 16680->16681 16682 7ff77d688876 ExpandEnvironmentStringsW 16680->16682 16684 7ff77d68c550 _log10_special 8 API calls 16681->16684 16682->16681 16683 7ff77d688898 16682->16683 16685 7ff77d689440 2 API calls 16683->16685 16686 7ff77d6888d4 16684->16686 16687 7ff77d6888aa 16685->16687 16686->16439 16688 7ff77d68c550 _log10_special 8 API calls 16687->16688 16689 7ff77d6888ba 16688->16689 16689->16439 16691 7ff77d6890f5 16690->16691 17546 7ff77d688570 GetCurrentProcess OpenProcessToken 16691->17546 16694 7ff77d688570 7 API calls 16695 7ff77d689121 16694->16695 16696 7ff77d689154 16695->16696 16697 7ff77d68913a 16695->16697 16698 7ff77d6826b0 48 API calls 16696->16698 16699 7ff77d6826b0 48 API calls 16697->16699 16700 7ff77d689167 LocalFree LocalFree 16698->16700 16701 7ff77d689152 16699->16701 16702 7ff77d689183 16700->16702 16704 7ff77d68918f 16700->16704 16701->16700 17556 7ff77d682b50 16702->17556 16705 7ff77d68c550 _log10_special 8 API calls 16704->16705 16706 7ff77d683c55 16705->16706 16706->16484 16707 7ff77d688660 16706->16707 16708 7ff77d688678 16707->16708 16709 7ff77d6886fa GetTempPathW GetCurrentProcessId 16708->16709 16710 7ff77d68869c 16708->16710 17565 7ff77d6825c0 16709->17565 16712 7ff77d688830 14 API calls 16710->16712 16713 7ff77d6886a8 16712->16713 17572 7ff77d6881d0 16713->17572 16718 7ff77d6886e8 __std_exception_copy 16739 7ff77d6887d4 __std_exception_copy 16718->16739 16720 7ff77d688728 __std_exception_copy 16730 7ff77d688765 __std_exception_copy 16720->16730 17569 7ff77d698b68 16720->17569 16722 7ff77d6886ce __std_exception_copy 16722->16709 16727 7ff77d6886dc 16722->16727 16725 7ff77d68c550 _log10_special 8 API calls 16726 7ff77d683cbb 16725->16726 16726->16484 16726->16497 16729 7ff77d682810 49 API calls 16727->16729 16729->16718 16731 7ff77d689390 2 API calls 16730->16731 16730->16739 16732 7ff77d6887b1 16731->16732 16733 7ff77d6887b6 16732->16733 16734 7ff77d6887e9 16732->16734 16735 7ff77d689390 2 API calls 16733->16735 16736 7ff77d698238 38 API calls 16734->16736 16737 7ff77d6887c6 16735->16737 16736->16739 16738 7ff77d698238 38 API calls 16737->16738 16738->16739 16739->16725 16741 7ff77d6893d6 16740->16741 16742 7ff77d6893b2 MultiByteToWideChar 16740->16742 16743 7ff77d6893f3 MultiByteToWideChar 16741->16743 16744 7ff77d6893ec __std_exception_copy 16741->16744 16742->16741 16742->16744 16743->16744 16744->16496 16757 7ff77d6833ce memcpy_s 16745->16757 16746 7ff77d68c550 _log10_special 8 API calls 16747 7ff77d683664 16746->16747 16747->16467 16764 7ff77d6890c0 LocalFree 16747->16764 16748 7ff77d6835c7 16748->16746 16750 7ff77d681c80 49 API calls 16750->16757 16751 7ff77d6835e2 16753 7ff77d682710 54 API calls 16751->16753 16753->16748 16756 7ff77d6835c9 16759 7ff77d682710 54 API calls 16756->16759 16757->16748 16757->16750 16757->16751 16757->16756 16758 7ff77d682a50 54 API calls 16757->16758 16762 7ff77d6835d0 16757->16762 17761 7ff77d684560 16757->17761 17767 7ff77d687e20 16757->17767 17779 7ff77d681600 16757->17779 17827 7ff77d687120 16757->17827 17831 7ff77d684190 16757->17831 17875 7ff77d684450 16757->17875 16758->16757 16759->16748 16763 7ff77d682710 54 API calls 16762->16763 16763->16748 16766 7ff77d681ca5 16765->16766 16767 7ff77d694984 49 API calls 16766->16767 16768 7ff77d681cc8 16767->16768 16768->16434 16770 7ff77d689390 2 API calls 16769->16770 16771 7ff77d6889b4 16770->16771 16772 7ff77d698238 38 API calls 16771->16772 16773 7ff77d6889c6 __std_exception_copy 16772->16773 16773->16446 16775 7ff77d6845cc 16774->16775 16776 7ff77d689390 2 API calls 16775->16776 16777 7ff77d6845f4 16776->16777 16778 7ff77d689390 2 API calls 16777->16778 16779 7ff77d684607 16778->16779 18042 7ff77d695f94 16779->18042 16782 7ff77d68c550 _log10_special 8 API calls 16783 7ff77d68392b 16782->16783 16783->16435 16784 7ff77d687f90 16783->16784 16785 7ff77d687fb4 16784->16785 16786 7ff77d68808b __std_exception_copy 16785->16786 16787 7ff77d6906d4 73 API calls 16785->16787 16786->16440 16788 7ff77d687fd0 16787->16788 16788->16786 18434 7ff77d6978c8 16788->18434 16790 7ff77d6906d4 73 API calls 16792 7ff77d687fe5 16790->16792 16791 7ff77d69039c _fread_nolock 53 API calls 16791->16792 16792->16786 16792->16790 16792->16791 16794 7ff77d69007c 16793->16794 18449 7ff77d68fe28 16794->18449 16796 7ff77d690095 16796->16435 16798 7ff77d68c850 16797->16798 16799 7ff77d682734 GetCurrentProcessId 16798->16799 16800 7ff77d681c80 49 API calls 16799->16800 16801 7ff77d682787 16800->16801 16802 7ff77d694984 49 API calls 16801->16802 16803 7ff77d6827cf 16802->16803 16804 7ff77d682620 12 API calls 16803->16804 16805 7ff77d6827f1 16804->16805 16806 7ff77d68c550 _log10_special 8 API calls 16805->16806 16807 7ff77d682801 16806->16807 16807->16467 16809 7ff77d689390 2 API calls 16808->16809 16810 7ff77d68895c 16809->16810 16811 7ff77d689390 2 API calls 16810->16811 16812 7ff77d68896c 16811->16812 16813 7ff77d698238 38 API calls 16812->16813 16814 7ff77d68897a __std_exception_copy 16813->16814 16814->16450 16816 7ff77d681c80 49 API calls 16815->16816 16817 7ff77d6844fd 16816->16817 16817->16479 16819 7ff77d681c80 49 API calls 16818->16819 16820 7ff77d684660 16819->16820 16820->16497 16822 7ff77d686dd5 16821->16822 16823 7ff77d683e64 16822->16823 16824 7ff77d694f08 _get_daylight 11 API calls 16822->16824 16827 7ff77d687340 16823->16827 16825 7ff77d686de2 16824->16825 16826 7ff77d682910 54 API calls 16825->16826 16826->16823 18460 7ff77d681470 16827->18460 16829 7ff77d687368 16830 7ff77d684630 49 API calls 16829->16830 16840 7ff77d6874b9 __std_exception_copy 16829->16840 16831 7ff77d68738a 16830->16831 16832 7ff77d68738f 16831->16832 16833 7ff77d684630 49 API calls 16831->16833 16834 7ff77d682a50 54 API calls 16832->16834 16835 7ff77d6873ae 16833->16835 16834->16840 16835->16832 16836 7ff77d684630 49 API calls 16835->16836 16837 7ff77d6873ca 16836->16837 16837->16832 16838 7ff77d6873d3 16837->16838 16839 7ff77d682710 54 API calls 16838->16839 16841 7ff77d687443 __std_exception_copy memcpy_s 16838->16841 16839->16840 16840->16531 16841->16531 16858 7ff77d686e1c 16842->16858 16843 7ff77d686f3f 16844 7ff77d68c550 _log10_special 8 API calls 16843->16844 16846 7ff77d686f51 16844->16846 16845 7ff77d681840 45 API calls 16845->16858 16846->16533 16847 7ff77d686faa 16849 7ff77d682710 54 API calls 16847->16849 16848 7ff77d681c80 49 API calls 16848->16858 16849->16843 16850 7ff77d686f97 16851 7ff77d682710 54 API calls 16850->16851 16851->16843 16852 7ff77d684560 10 API calls 16852->16858 16853 7ff77d687e20 52 API calls 16853->16858 16854 7ff77d682a50 54 API calls 16854->16858 16855 7ff77d686f84 16857 7ff77d682710 54 API calls 16855->16857 16856 7ff77d681600 118 API calls 16856->16858 16857->16843 16858->16843 16858->16845 16858->16847 16858->16848 16858->16850 16858->16852 16858->16853 16858->16854 16858->16855 16858->16856 16859 7ff77d686f6d 16858->16859 16860 7ff77d682710 54 API calls 16859->16860 16860->16843 18490 7ff77d688e80 16861->18490 16863 7ff77d6871c9 16864 7ff77d688e80 3 API calls 16863->16864 16865 7ff77d6871dc 16864->16865 16866 7ff77d68720f 16865->16866 16867 7ff77d6871f4 16865->16867 16868 7ff77d682710 54 API calls 16866->16868 18494 7ff77d6876c0 GetProcAddress 16867->18494 16870 7ff77d683eaf 16868->16870 16870->16544 16878 7ff77d68c850 16877->16878 16879 7ff77d682a74 GetCurrentProcessId 16878->16879 16880 7ff77d681c80 49 API calls 16879->16880 16881 7ff77d682ac7 16880->16881 16882 7ff77d694984 49 API calls 16881->16882 16883 7ff77d682b0f 16882->16883 16884 7ff77d682620 12 API calls 16883->16884 16885 7ff77d682b31 16884->16885 16886 7ff77d68c550 _log10_special 8 API calls 16885->16886 18566 7ff77d686360 16895->18566 16898 7ff77d683399 16904 7ff77d683670 16898->16904 16900 7ff77d683381 16900->16898 18634 7ff77d686050 16900->18634 16902 7ff77d68338d 16902->16898 18643 7ff77d6861e0 16902->18643 16905 7ff77d68367e 16904->16905 16906 7ff77d68368f 16905->16906 18854 7ff77d688e60 FreeLibrary 16905->18854 16906->16522 16915 7ff77d69546c EnterCriticalSection 16908->16915 16917 7ff77d6836bc GetModuleFileNameW 16916->16917 16917->16608 16917->16609 16919 7ff77d6892bf FindClose 16918->16919 16920 7ff77d6892d2 16918->16920 16919->16920 16921 7ff77d68c550 _log10_special 8 API calls 16920->16921 16922 7ff77d68371a 16921->16922 16922->16613 16922->16614 16924 7ff77d68c850 16923->16924 16925 7ff77d682c70 GetCurrentProcessId 16924->16925 16954 7ff77d6826b0 16925->16954 16927 7ff77d682cb9 16958 7ff77d694bd8 16927->16958 16930 7ff77d6826b0 48 API calls 16931 7ff77d682d34 FormatMessageW 16930->16931 16933 7ff77d682d6d 16931->16933 16934 7ff77d682d7f MessageBoxW 16931->16934 16935 7ff77d6826b0 48 API calls 16933->16935 16936 7ff77d68c550 _log10_special 8 API calls 16934->16936 16935->16934 16937 7ff77d682daf 16936->16937 16937->16626 16939 7ff77d689340 GetFinalPathNameByHandleW CloseHandle 16938->16939 16940 7ff77d683730 16938->16940 16939->16940 16940->16621 16940->16622 16942 7ff77d682834 16941->16942 16943 7ff77d6826b0 48 API calls 16942->16943 16944 7ff77d682887 16943->16944 16945 7ff77d694bd8 48 API calls 16944->16945 16946 7ff77d6828d0 MessageBoxW 16945->16946 16947 7ff77d68c550 _log10_special 8 API calls 16946->16947 16948 7ff77d682900 16947->16948 16948->16626 16950 7ff77d689495 16949->16950 16951 7ff77d68946a WideCharToMultiByte 16949->16951 16952 7ff77d6894b2 WideCharToMultiByte 16950->16952 16953 7ff77d6894ab __std_exception_copy 16950->16953 16951->16950 16951->16953 16952->16953 16953->16618 16955 7ff77d6826d5 16954->16955 16956 7ff77d694bd8 48 API calls 16955->16956 16957 7ff77d6826f8 16956->16957 16957->16927 16960 7ff77d694c32 16958->16960 16959 7ff77d694c57 16961 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 16959->16961 16960->16959 16962 7ff77d694c93 16960->16962 16964 7ff77d694c81 16961->16964 16976 7ff77d692f90 16962->16976 16966 7ff77d68c550 _log10_special 8 API calls 16964->16966 16965 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16965->16964 16968 7ff77d682d04 16966->16968 16968->16930 16969 7ff77d694d9a 16971 7ff77d694da4 16969->16971 16974 7ff77d694d74 16969->16974 16970 7ff77d694d40 16973 7ff77d694d49 16970->16973 16970->16974 16975 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16971->16975 16972 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16972->16964 16973->16972 16974->16965 16975->16964 16977 7ff77d692fce 16976->16977 16978 7ff77d692fbe 16976->16978 16979 7ff77d692fd7 16977->16979 16983 7ff77d693005 16977->16983 16980 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 16978->16980 16981 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 16979->16981 16982 7ff77d692ffd 16980->16982 16981->16982 16982->16969 16982->16970 16982->16973 16982->16974 16983->16978 16983->16982 16987 7ff77d6939a4 16983->16987 17020 7ff77d6933f0 16983->17020 17057 7ff77d692b80 16983->17057 16988 7ff77d6939e6 16987->16988 16989 7ff77d693a57 16987->16989 16990 7ff77d693a81 16988->16990 16991 7ff77d6939ec 16988->16991 16992 7ff77d693ab0 16989->16992 16993 7ff77d693a5c 16989->16993 17080 7ff77d691d54 16990->17080 16994 7ff77d693a20 16991->16994 16995 7ff77d6939f1 16991->16995 16998 7ff77d693ac7 16992->16998 16999 7ff77d693aba 16992->16999 17004 7ff77d693abf 16992->17004 16996 7ff77d693a91 16993->16996 16997 7ff77d693a5e 16993->16997 17001 7ff77d6939f7 16994->17001 16994->17004 16995->16998 16995->17001 17087 7ff77d691944 16996->17087 17002 7ff77d693a00 16997->17002 17007 7ff77d693a6d 16997->17007 17094 7ff77d6946ac 16998->17094 16999->16990 16999->17004 17001->17002 17008 7ff77d693a32 17001->17008 17015 7ff77d693a1b 17001->17015 17018 7ff77d693af0 17002->17018 17060 7ff77d694158 17002->17060 17004->17018 17098 7ff77d692164 17004->17098 17007->16990 17010 7ff77d693a72 17007->17010 17008->17018 17070 7ff77d694494 17008->17070 17010->17018 17076 7ff77d694558 17010->17076 17012 7ff77d68c550 _log10_special 8 API calls 17014 7ff77d693dea 17012->17014 17014->16983 17015->17018 17019 7ff77d693cdc 17015->17019 17105 7ff77d6947c0 17015->17105 17018->17012 17019->17018 17111 7ff77d69ea08 17019->17111 17021 7ff77d693414 17020->17021 17022 7ff77d6933fe 17020->17022 17023 7ff77d693454 17021->17023 17026 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17021->17026 17022->17023 17024 7ff77d6939e6 17022->17024 17025 7ff77d693a57 17022->17025 17023->16983 17027 7ff77d693a81 17024->17027 17028 7ff77d6939ec 17024->17028 17029 7ff77d693ab0 17025->17029 17030 7ff77d693a5c 17025->17030 17026->17023 17038 7ff77d691d54 38 API calls 17027->17038 17032 7ff77d693a20 17028->17032 17033 7ff77d6939f1 17028->17033 17031 7ff77d693abf 17029->17031 17036 7ff77d693ac7 17029->17036 17037 7ff77d693aba 17029->17037 17034 7ff77d693a91 17030->17034 17035 7ff77d693a5e 17030->17035 17046 7ff77d692164 38 API calls 17031->17046 17055 7ff77d693af0 17031->17055 17032->17031 17041 7ff77d6939f7 17032->17041 17033->17036 17033->17041 17039 7ff77d691944 38 API calls 17034->17039 17043 7ff77d693a6d 17035->17043 17044 7ff77d693a00 17035->17044 17042 7ff77d6946ac 45 API calls 17036->17042 17037->17027 17037->17031 17052 7ff77d693a1b 17038->17052 17039->17052 17040 7ff77d694158 47 API calls 17040->17052 17041->17044 17045 7ff77d693a32 17041->17045 17041->17052 17042->17052 17043->17027 17047 7ff77d693a72 17043->17047 17044->17040 17044->17055 17048 7ff77d694494 46 API calls 17045->17048 17045->17055 17046->17052 17050 7ff77d694558 37 API calls 17047->17050 17047->17055 17048->17052 17049 7ff77d68c550 _log10_special 8 API calls 17051 7ff77d693dea 17049->17051 17050->17052 17051->16983 17053 7ff77d6947c0 45 API calls 17052->17053 17052->17055 17056 7ff77d693cdc 17052->17056 17053->17056 17054 7ff77d69ea08 46 API calls 17054->17056 17055->17049 17056->17054 17056->17055 17289 7ff77d690fc8 17057->17289 17061 7ff77d69417e 17060->17061 17123 7ff77d690b80 17061->17123 17066 7ff77d6947c0 45 API calls 17068 7ff77d6942c3 17066->17068 17067 7ff77d6947c0 45 API calls 17069 7ff77d694351 17067->17069 17068->17067 17068->17068 17068->17069 17069->17015 17071 7ff77d6944c9 17070->17071 17072 7ff77d69450e 17071->17072 17073 7ff77d6944e7 17071->17073 17074 7ff77d6947c0 45 API calls 17071->17074 17072->17015 17075 7ff77d69ea08 46 API calls 17073->17075 17074->17073 17075->17072 17079 7ff77d694579 17076->17079 17077 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17078 7ff77d6945aa 17077->17078 17078->17015 17079->17077 17079->17078 17081 7ff77d691d87 17080->17081 17082 7ff77d691db6 17081->17082 17084 7ff77d691e73 17081->17084 17086 7ff77d691df3 17082->17086 17259 7ff77d690c28 17082->17259 17085 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17084->17085 17085->17086 17086->17015 17088 7ff77d691977 17087->17088 17089 7ff77d6919a6 17088->17089 17091 7ff77d691a63 17088->17091 17090 7ff77d690c28 12 API calls 17089->17090 17093 7ff77d6919e3 17089->17093 17090->17093 17092 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17091->17092 17092->17093 17093->17015 17095 7ff77d6946ef 17094->17095 17097 7ff77d6946f3 __crtLCMapStringW 17095->17097 17267 7ff77d694748 17095->17267 17097->17015 17099 7ff77d692197 17098->17099 17100 7ff77d6921c6 17099->17100 17102 7ff77d692283 17099->17102 17101 7ff77d690c28 12 API calls 17100->17101 17104 7ff77d692203 17100->17104 17101->17104 17103 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17102->17103 17103->17104 17104->17015 17106 7ff77d6947d7 17105->17106 17271 7ff77d69d9b8 17106->17271 17112 7ff77d69ea47 17111->17112 17113 7ff77d69ea39 17111->17113 17112->17019 17113->17112 17114 7ff77d69ea67 17113->17114 17115 7ff77d6947c0 45 API calls 17113->17115 17116 7ff77d69ea9f 17114->17116 17117 7ff77d69ea78 17114->17117 17115->17114 17116->17112 17119 7ff77d69eb2a 17116->17119 17121 7ff77d69eac9 17116->17121 17279 7ff77d6a00a0 17117->17279 17120 7ff77d69f8a0 _fread_nolock MultiByteToWideChar 17119->17120 17120->17112 17121->17112 17282 7ff77d69f8a0 17121->17282 17124 7ff77d690bb7 17123->17124 17130 7ff77d690ba6 17123->17130 17125 7ff77d69d5fc _fread_nolock 12 API calls 17124->17125 17124->17130 17127 7ff77d690be4 17125->17127 17126 7ff77d690bf8 17129 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17126->17129 17127->17126 17128 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17127->17128 17128->17126 17129->17130 17131 7ff77d69e570 17130->17131 17132 7ff77d69e5c0 17131->17132 17133 7ff77d69e58d 17131->17133 17132->17133 17135 7ff77d69e5f2 17132->17135 17134 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17133->17134 17147 7ff77d6942a1 17134->17147 17137 7ff77d69e705 17135->17137 17145 7ff77d69e63a 17135->17145 17136 7ff77d69e7f7 17186 7ff77d69da5c 17136->17186 17137->17136 17139 7ff77d69e7bd 17137->17139 17140 7ff77d69e78c 17137->17140 17142 7ff77d69e74f 17137->17142 17144 7ff77d69e745 17137->17144 17179 7ff77d69ddf4 17139->17179 17172 7ff77d69e0d4 17140->17172 17162 7ff77d69e304 17142->17162 17144->17139 17148 7ff77d69e74a 17144->17148 17145->17147 17153 7ff77d69a4a4 17145->17153 17147->17066 17147->17068 17148->17140 17148->17142 17151 7ff77d69a900 _isindst 17 API calls 17152 7ff77d69e854 17151->17152 17154 7ff77d69a4b1 17153->17154 17155 7ff77d69a4bb 17153->17155 17154->17155 17160 7ff77d69a4d6 17154->17160 17156 7ff77d694f08 _get_daylight 11 API calls 17155->17156 17157 7ff77d69a4c2 17156->17157 17159 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17157->17159 17158 7ff77d69a4ce 17158->17147 17158->17151 17159->17158 17160->17158 17161 7ff77d694f08 _get_daylight 11 API calls 17160->17161 17161->17157 17195 7ff77d6a40ac 17162->17195 17166 7ff77d69e3b0 17166->17147 17167 7ff77d69e401 17248 7ff77d69def0 17167->17248 17168 7ff77d69e3ac 17168->17166 17168->17167 17169 7ff77d69e3cc 17168->17169 17244 7ff77d69e1ac 17169->17244 17173 7ff77d6a40ac 38 API calls 17172->17173 17174 7ff77d69e11e 17173->17174 17175 7ff77d6a3af4 37 API calls 17174->17175 17176 7ff77d69e16e 17175->17176 17177 7ff77d69e172 17176->17177 17178 7ff77d69e1ac 45 API calls 17176->17178 17177->17147 17178->17177 17180 7ff77d6a40ac 38 API calls 17179->17180 17181 7ff77d69de3f 17180->17181 17182 7ff77d6a3af4 37 API calls 17181->17182 17183 7ff77d69de97 17182->17183 17184 7ff77d69de9b 17183->17184 17185 7ff77d69def0 45 API calls 17183->17185 17184->17147 17185->17184 17187 7ff77d69daa1 17186->17187 17188 7ff77d69dad4 17186->17188 17189 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17187->17189 17190 7ff77d69daec 17188->17190 17192 7ff77d69db6d 17188->17192 17194 7ff77d69dacd memcpy_s 17189->17194 17191 7ff77d69ddf4 46 API calls 17190->17191 17191->17194 17193 7ff77d6947c0 45 API calls 17192->17193 17192->17194 17193->17194 17194->17147 17196 7ff77d6a40ff fegetenv 17195->17196 17197 7ff77d6a7e2c 37 API calls 17196->17197 17202 7ff77d6a4152 17197->17202 17198 7ff77d6a417f 17201 7ff77d69a4a4 __std_exception_copy 37 API calls 17198->17201 17199 7ff77d6a4242 17200 7ff77d6a7e2c 37 API calls 17199->17200 17203 7ff77d6a426c 17200->17203 17205 7ff77d6a41fd 17201->17205 17202->17199 17206 7ff77d6a416d 17202->17206 17207 7ff77d6a421c 17202->17207 17204 7ff77d6a7e2c 37 API calls 17203->17204 17208 7ff77d6a427d 17204->17208 17209 7ff77d6a5324 17205->17209 17214 7ff77d6a4205 17205->17214 17206->17198 17206->17199 17210 7ff77d69a4a4 __std_exception_copy 37 API calls 17207->17210 17211 7ff77d6a8020 20 API calls 17208->17211 17212 7ff77d69a900 _isindst 17 API calls 17209->17212 17210->17205 17222 7ff77d6a42e6 memcpy_s 17211->17222 17213 7ff77d6a5339 17212->17213 17215 7ff77d68c550 _log10_special 8 API calls 17214->17215 17216 7ff77d69e351 17215->17216 17240 7ff77d6a3af4 17216->17240 17217 7ff77d6a468f memcpy_s 17218 7ff77d6a49cf 17219 7ff77d6a3c10 37 API calls 17218->17219 17227 7ff77d6a50e7 17219->17227 17220 7ff77d6a497b 17220->17218 17223 7ff77d6a533c memcpy_s 37 API calls 17220->17223 17221 7ff77d6a4327 memcpy_s 17234 7ff77d6a4c6b memcpy_s 17221->17234 17235 7ff77d6a4783 memcpy_s 17221->17235 17222->17217 17222->17221 17224 7ff77d694f08 _get_daylight 11 API calls 17222->17224 17223->17218 17225 7ff77d6a4760 17224->17225 17226 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17225->17226 17226->17221 17229 7ff77d6a533c memcpy_s 37 API calls 17227->17229 17233 7ff77d6a5142 17227->17233 17228 7ff77d6a52c8 17230 7ff77d6a7e2c 37 API calls 17228->17230 17229->17233 17230->17214 17231 7ff77d694f08 11 API calls _get_daylight 17231->17234 17232 7ff77d694f08 11 API calls _get_daylight 17232->17235 17233->17228 17236 7ff77d6a3c10 37 API calls 17233->17236 17239 7ff77d6a533c memcpy_s 37 API calls 17233->17239 17234->17218 17234->17220 17234->17231 17237 7ff77d69a8e0 37 API calls _invalid_parameter_noinfo 17234->17237 17235->17220 17235->17232 17238 7ff77d69a8e0 37 API calls _invalid_parameter_noinfo 17235->17238 17236->17233 17237->17234 17238->17235 17239->17233 17241 7ff77d6a3b13 17240->17241 17242 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17241->17242 17243 7ff77d6a3b3e memcpy_s 17241->17243 17242->17243 17243->17168 17245 7ff77d69e1d8 memcpy_s 17244->17245 17246 7ff77d6947c0 45 API calls 17245->17246 17247 7ff77d69e292 memcpy_s 17245->17247 17246->17247 17247->17166 17249 7ff77d69df2b 17248->17249 17253 7ff77d69df78 memcpy_s 17248->17253 17250 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17249->17250 17251 7ff77d69df57 17250->17251 17251->17166 17252 7ff77d69dfe3 17254 7ff77d69a4a4 __std_exception_copy 37 API calls 17252->17254 17253->17252 17255 7ff77d6947c0 45 API calls 17253->17255 17258 7ff77d69e025 memcpy_s 17254->17258 17255->17252 17256 7ff77d69a900 _isindst 17 API calls 17257 7ff77d69e0d0 17256->17257 17258->17256 17260 7ff77d690c5f 17259->17260 17266 7ff77d690c4e 17259->17266 17261 7ff77d69d5fc _fread_nolock 12 API calls 17260->17261 17260->17266 17262 7ff77d690c90 17261->17262 17263 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17262->17263 17265 7ff77d690ca4 17262->17265 17263->17265 17264 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17264->17266 17265->17264 17266->17086 17268 7ff77d694766 17267->17268 17269 7ff77d69476e 17267->17269 17270 7ff77d6947c0 45 API calls 17268->17270 17269->17097 17270->17269 17272 7ff77d69d9d1 17271->17272 17273 7ff77d6947ff 17271->17273 17272->17273 17274 7ff77d6a3304 45 API calls 17272->17274 17275 7ff77d69da24 17273->17275 17274->17273 17276 7ff77d69480f 17275->17276 17277 7ff77d69da3d 17275->17277 17276->17019 17277->17276 17278 7ff77d6a2650 45 API calls 17277->17278 17278->17276 17285 7ff77d6a6d88 17279->17285 17284 7ff77d69f8a9 MultiByteToWideChar 17282->17284 17288 7ff77d6a6dec 17285->17288 17286 7ff77d68c550 _log10_special 8 API calls 17287 7ff77d6a00bd 17286->17287 17287->17112 17288->17286 17290 7ff77d69100f 17289->17290 17291 7ff77d690ffd 17289->17291 17294 7ff77d69101d 17290->17294 17298 7ff77d691059 17290->17298 17292 7ff77d694f08 _get_daylight 11 API calls 17291->17292 17293 7ff77d691002 17292->17293 17295 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17293->17295 17296 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17294->17296 17301 7ff77d69100d 17295->17301 17296->17301 17297 7ff77d6913d5 17299 7ff77d694f08 _get_daylight 11 API calls 17297->17299 17297->17301 17298->17297 17300 7ff77d694f08 _get_daylight 11 API calls 17298->17300 17302 7ff77d691669 17299->17302 17303 7ff77d6913ca 17300->17303 17301->16983 17304 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17302->17304 17305 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17303->17305 17304->17301 17305->17297 17307 7ff77d690704 17306->17307 17334 7ff77d690464 17307->17334 17309 7ff77d69071d 17309->16637 17346 7ff77d6903bc 17310->17346 17314 7ff77d68c850 17313->17314 17315 7ff77d682930 GetCurrentProcessId 17314->17315 17316 7ff77d681c80 49 API calls 17315->17316 17317 7ff77d682979 17316->17317 17360 7ff77d694984 17317->17360 17322 7ff77d681c80 49 API calls 17323 7ff77d6829ff 17322->17323 17390 7ff77d682620 17323->17390 17326 7ff77d68c550 _log10_special 8 API calls 17327 7ff77d682a31 17326->17327 17327->16647 17329 7ff77d690119 17328->17329 17333 7ff77d681b89 17328->17333 17330 7ff77d694f08 _get_daylight 11 API calls 17329->17330 17331 7ff77d69011e 17330->17331 17332 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17331->17332 17332->17333 17333->16647 17333->16676 17335 7ff77d6904ce 17334->17335 17336 7ff77d69048e 17334->17336 17335->17336 17338 7ff77d6904da 17335->17338 17337 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17336->17337 17339 7ff77d6904b5 17337->17339 17345 7ff77d69546c EnterCriticalSection 17338->17345 17339->17309 17347 7ff77d681a20 17346->17347 17348 7ff77d6903e6 17346->17348 17347->16644 17347->16645 17348->17347 17349 7ff77d690432 17348->17349 17350 7ff77d6903f5 memcpy_s 17348->17350 17359 7ff77d69546c EnterCriticalSection 17349->17359 17352 7ff77d694f08 _get_daylight 11 API calls 17350->17352 17354 7ff77d69040a 17352->17354 17356 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17354->17356 17356->17347 17361 7ff77d6949de 17360->17361 17362 7ff77d694a03 17361->17362 17364 7ff77d694a3f 17361->17364 17363 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17362->17363 17366 7ff77d694a2d 17363->17366 17399 7ff77d692c10 17364->17399 17368 7ff77d68c550 _log10_special 8 API calls 17366->17368 17367 7ff77d694b1c 17369 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17367->17369 17370 7ff77d6829c3 17368->17370 17369->17366 17378 7ff77d695160 17370->17378 17372 7ff77d694af1 17375 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17372->17375 17373 7ff77d694b40 17373->17367 17374 7ff77d694b4a 17373->17374 17377 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17374->17377 17375->17366 17376 7ff77d694ae8 17376->17367 17376->17372 17377->17366 17379 7ff77d69b2c8 _get_daylight 11 API calls 17378->17379 17380 7ff77d695177 17379->17380 17381 7ff77d6829e5 17380->17381 17382 7ff77d69eb98 _get_daylight 11 API calls 17380->17382 17385 7ff77d6951b7 17380->17385 17381->17322 17383 7ff77d6951ac 17382->17383 17384 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17383->17384 17384->17385 17385->17381 17537 7ff77d69ec20 17385->17537 17388 7ff77d69a900 _isindst 17 API calls 17389 7ff77d6951fc 17388->17389 17391 7ff77d68262f 17390->17391 17392 7ff77d689390 2 API calls 17391->17392 17393 7ff77d682660 17392->17393 17394 7ff77d682683 MessageBoxA 17393->17394 17395 7ff77d68266f MessageBoxW 17393->17395 17396 7ff77d682690 17394->17396 17395->17396 17397 7ff77d68c550 _log10_special 8 API calls 17396->17397 17398 7ff77d6826a0 17397->17398 17398->17326 17400 7ff77d692c4e 17399->17400 17401 7ff77d692c3e 17399->17401 17402 7ff77d692c57 17400->17402 17407 7ff77d692c85 17400->17407 17403 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17401->17403 17404 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17402->17404 17405 7ff77d692c7d 17403->17405 17404->17405 17405->17367 17405->17372 17405->17373 17405->17376 17406 7ff77d6947c0 45 API calls 17406->17407 17407->17401 17407->17405 17407->17406 17409 7ff77d692f34 17407->17409 17413 7ff77d6935a0 17407->17413 17439 7ff77d693268 17407->17439 17469 7ff77d692af0 17407->17469 17411 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17409->17411 17411->17401 17414 7ff77d6935e2 17413->17414 17415 7ff77d693655 17413->17415 17418 7ff77d69367f 17414->17418 17419 7ff77d6935e8 17414->17419 17416 7ff77d6936af 17415->17416 17417 7ff77d69365a 17415->17417 17416->17418 17429 7ff77d6936be 17416->17429 17437 7ff77d693618 17416->17437 17420 7ff77d69368f 17417->17420 17421 7ff77d69365c 17417->17421 17486 7ff77d691b50 17418->17486 17426 7ff77d6935ed 17419->17426 17419->17429 17493 7ff77d691740 17420->17493 17422 7ff77d6935fd 17421->17422 17428 7ff77d69366b 17421->17428 17438 7ff77d6936ed 17422->17438 17472 7ff77d693f04 17422->17472 17426->17422 17427 7ff77d693630 17426->17427 17426->17437 17427->17438 17482 7ff77d6943c0 17427->17482 17428->17418 17431 7ff77d693670 17428->17431 17429->17438 17500 7ff77d691f60 17429->17500 17434 7ff77d694558 37 API calls 17431->17434 17431->17438 17433 7ff77d68c550 _log10_special 8 API calls 17435 7ff77d693983 17433->17435 17434->17437 17435->17407 17437->17438 17507 7ff77d69e858 17437->17507 17438->17433 17440 7ff77d693273 17439->17440 17441 7ff77d693289 17439->17441 17443 7ff77d6935e2 17440->17443 17444 7ff77d693655 17440->17444 17445 7ff77d6932c7 17440->17445 17442 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17441->17442 17441->17445 17442->17445 17448 7ff77d69367f 17443->17448 17449 7ff77d6935e8 17443->17449 17446 7ff77d6936af 17444->17446 17447 7ff77d69365a 17444->17447 17445->17407 17446->17448 17458 7ff77d6936be 17446->17458 17466 7ff77d693618 17446->17466 17450 7ff77d69368f 17447->17450 17451 7ff77d69365c 17447->17451 17453 7ff77d691b50 38 API calls 17448->17453 17456 7ff77d6935ed 17449->17456 17449->17458 17454 7ff77d691740 38 API calls 17450->17454 17452 7ff77d6935fd 17451->17452 17460 7ff77d69366b 17451->17460 17455 7ff77d693f04 47 API calls 17452->17455 17468 7ff77d6936ed 17452->17468 17453->17466 17454->17466 17455->17466 17456->17452 17457 7ff77d693630 17456->17457 17456->17466 17461 7ff77d6943c0 47 API calls 17457->17461 17457->17468 17459 7ff77d691f60 38 API calls 17458->17459 17458->17468 17459->17466 17460->17448 17462 7ff77d693670 17460->17462 17461->17466 17464 7ff77d694558 37 API calls 17462->17464 17462->17468 17463 7ff77d68c550 _log10_special 8 API calls 17465 7ff77d693983 17463->17465 17464->17466 17465->17407 17467 7ff77d69e858 47 API calls 17466->17467 17466->17468 17467->17466 17468->17463 17520 7ff77d690d14 17469->17520 17473 7ff77d693f26 17472->17473 17474 7ff77d690b80 12 API calls 17473->17474 17475 7ff77d693f6e 17474->17475 17476 7ff77d69e570 46 API calls 17475->17476 17477 7ff77d694041 17476->17477 17478 7ff77d6947c0 45 API calls 17477->17478 17479 7ff77d694063 17477->17479 17478->17479 17480 7ff77d6947c0 45 API calls 17479->17480 17481 7ff77d6940ec 17479->17481 17480->17481 17481->17437 17483 7ff77d6943d8 17482->17483 17485 7ff77d694440 17482->17485 17484 7ff77d69e858 47 API calls 17483->17484 17483->17485 17484->17485 17485->17437 17487 7ff77d691b83 17486->17487 17488 7ff77d691bb2 17487->17488 17491 7ff77d691c6f 17487->17491 17489 7ff77d691bef 17488->17489 17490 7ff77d690b80 12 API calls 17488->17490 17489->17437 17490->17489 17492 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17491->17492 17492->17489 17494 7ff77d691773 17493->17494 17495 7ff77d6917a2 17494->17495 17497 7ff77d69185f 17494->17497 17496 7ff77d690b80 12 API calls 17495->17496 17499 7ff77d6917df 17495->17499 17496->17499 17498 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17497->17498 17498->17499 17499->17437 17501 7ff77d691f93 17500->17501 17502 7ff77d691fc2 17501->17502 17504 7ff77d69207f 17501->17504 17503 7ff77d690b80 12 API calls 17502->17503 17506 7ff77d691fff 17502->17506 17503->17506 17505 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17504->17505 17505->17506 17506->17437 17508 7ff77d69e880 17507->17508 17509 7ff77d6947c0 45 API calls 17508->17509 17511 7ff77d69e8c5 17508->17511 17513 7ff77d69e885 memcpy_s 17508->17513 17515 7ff77d69e8ae memcpy_s 17508->17515 17509->17511 17510 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17510->17513 17511->17513 17511->17515 17517 7ff77d6a07e8 17511->17517 17513->17437 17515->17510 17515->17513 17518 7ff77d6a080c WideCharToMultiByte 17517->17518 17521 7ff77d690d41 17520->17521 17522 7ff77d690d53 17520->17522 17523 7ff77d694f08 _get_daylight 11 API calls 17521->17523 17525 7ff77d690d60 17522->17525 17528 7ff77d690d9d 17522->17528 17524 7ff77d690d46 17523->17524 17526 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17524->17526 17527 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17525->17527 17532 7ff77d690d51 17526->17532 17527->17532 17529 7ff77d690e46 17528->17529 17530 7ff77d694f08 _get_daylight 11 API calls 17528->17530 17531 7ff77d694f08 _get_daylight 11 API calls 17529->17531 17529->17532 17533 7ff77d690e3b 17530->17533 17534 7ff77d690ef0 17531->17534 17532->17407 17535 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17533->17535 17536 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17534->17536 17535->17529 17536->17532 17542 7ff77d69ec3d 17537->17542 17538 7ff77d69ec42 17539 7ff77d6951dd 17538->17539 17540 7ff77d694f08 _get_daylight 11 API calls 17538->17540 17539->17381 17539->17388 17541 7ff77d69ec4c 17540->17541 17543 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17541->17543 17542->17538 17542->17539 17544 7ff77d69ec8c 17542->17544 17543->17539 17544->17539 17545 7ff77d694f08 _get_daylight 11 API calls 17544->17545 17545->17541 17547 7ff77d6885b1 GetTokenInformation 17546->17547 17548 7ff77d688633 __std_exception_copy 17546->17548 17549 7ff77d6885d2 GetLastError 17547->17549 17552 7ff77d6885dd 17547->17552 17550 7ff77d688646 CloseHandle 17548->17550 17551 7ff77d68864c 17548->17551 17549->17548 17549->17552 17550->17551 17551->16694 17552->17548 17553 7ff77d6885f9 GetTokenInformation 17552->17553 17553->17548 17554 7ff77d68861c 17553->17554 17554->17548 17555 7ff77d688626 ConvertSidToStringSidW 17554->17555 17555->17548 17557 7ff77d68c850 17556->17557 17558 7ff77d682b74 GetCurrentProcessId 17557->17558 17559 7ff77d6826b0 48 API calls 17558->17559 17560 7ff77d682bc7 17559->17560 17561 7ff77d694bd8 48 API calls 17560->17561 17562 7ff77d682c10 MessageBoxW 17561->17562 17563 7ff77d68c550 _log10_special 8 API calls 17562->17563 17564 7ff77d682c40 17563->17564 17564->16704 17566 7ff77d6825e5 17565->17566 17567 7ff77d694bd8 48 API calls 17566->17567 17568 7ff77d682604 17567->17568 17568->16720 17614 7ff77d698794 17569->17614 17573 7ff77d6881dc 17572->17573 17574 7ff77d689390 2 API calls 17573->17574 17575 7ff77d6881fb 17574->17575 17576 7ff77d688203 17575->17576 17577 7ff77d688216 ExpandEnvironmentStringsW 17575->17577 17579 7ff77d682810 49 API calls 17576->17579 17578 7ff77d68823c __std_exception_copy 17577->17578 17581 7ff77d688240 17578->17581 17582 7ff77d688253 17578->17582 17580 7ff77d68820f __std_exception_copy 17579->17580 17584 7ff77d68c550 _log10_special 8 API calls 17580->17584 17583 7ff77d682810 49 API calls 17581->17583 17586 7ff77d6882bf 17582->17586 17587 7ff77d688261 GetDriveTypeW 17582->17587 17583->17580 17585 7ff77d6883af 17584->17585 17585->16718 17604 7ff77d698238 17585->17604 17588 7ff77d697e08 45 API calls 17586->17588 17591 7ff77d6882b0 17587->17591 17592 7ff77d688295 17587->17592 17590 7ff77d6882d1 17588->17590 17594 7ff77d6882d9 17590->17594 17597 7ff77d6882ec 17590->17597 17737 7ff77d69796c 17591->17737 17595 7ff77d682810 49 API calls 17592->17595 17596 7ff77d682810 49 API calls 17594->17596 17595->17580 17596->17580 17598 7ff77d68834e CreateDirectoryW 17597->17598 17600 7ff77d6826b0 48 API calls 17597->17600 17598->17580 17599 7ff77d68835d GetLastError 17598->17599 17599->17580 17601 7ff77d68836a GetLastError 17599->17601 17602 7ff77d688328 CreateDirectoryW 17600->17602 17603 7ff77d682c50 51 API calls 17601->17603 17602->17597 17603->17580 17605 7ff77d698245 17604->17605 17606 7ff77d698258 17604->17606 17607 7ff77d694f08 _get_daylight 11 API calls 17605->17607 17753 7ff77d697ebc 17606->17753 17609 7ff77d69824a 17607->17609 17611 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17609->17611 17612 7ff77d698256 17611->17612 17612->16722 17655 7ff77d6a1558 17614->17655 17714 7ff77d6a12d0 17655->17714 17735 7ff77d6a02d8 EnterCriticalSection 17714->17735 17738 7ff77d6979bd 17737->17738 17739 7ff77d69798a 17737->17739 17738->17580 17739->17738 17744 7ff77d6a0474 17739->17744 17742 7ff77d69a900 _isindst 17 API calls 17743 7ff77d6979ed 17742->17743 17745 7ff77d6a0481 17744->17745 17746 7ff77d6a048b 17744->17746 17745->17746 17750 7ff77d6a04a7 17745->17750 17747 7ff77d694f08 _get_daylight 11 API calls 17746->17747 17752 7ff77d6a0493 17747->17752 17748 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17749 7ff77d6979b9 17748->17749 17749->17738 17749->17742 17750->17749 17751 7ff77d694f08 _get_daylight 11 API calls 17750->17751 17751->17752 17752->17748 17760 7ff77d6a02d8 EnterCriticalSection 17753->17760 17762 7ff77d68456a 17761->17762 17763 7ff77d689390 2 API calls 17762->17763 17764 7ff77d68458f 17763->17764 17765 7ff77d68c550 _log10_special 8 API calls 17764->17765 17766 7ff77d6845b7 17765->17766 17766->16757 17769 7ff77d687e2e 17767->17769 17768 7ff77d687f52 17771 7ff77d68c550 _log10_special 8 API calls 17768->17771 17769->17768 17770 7ff77d681c80 49 API calls 17769->17770 17775 7ff77d687eb5 17770->17775 17772 7ff77d687f83 17771->17772 17772->16757 17773 7ff77d681c80 49 API calls 17773->17775 17774 7ff77d684560 10 API calls 17774->17775 17775->17768 17775->17773 17775->17774 17776 7ff77d687f0b 17775->17776 17777 7ff77d689390 2 API calls 17776->17777 17778 7ff77d687f23 CreateDirectoryW 17777->17778 17778->17768 17778->17775 17780 7ff77d681637 17779->17780 17781 7ff77d681613 17779->17781 17783 7ff77d6845c0 108 API calls 17780->17783 17900 7ff77d681050 17781->17900 17784 7ff77d68164b 17783->17784 17786 7ff77d681653 17784->17786 17787 7ff77d681682 17784->17787 17785 7ff77d681618 17788 7ff77d68162e 17785->17788 17791 7ff77d682710 54 API calls 17785->17791 17789 7ff77d694f08 _get_daylight 11 API calls 17786->17789 17790 7ff77d6845c0 108 API calls 17787->17790 17788->16757 17792 7ff77d681658 17789->17792 17793 7ff77d681696 17790->17793 17791->17788 17794 7ff77d682910 54 API calls 17792->17794 17795 7ff77d68169e 17793->17795 17796 7ff77d6816b8 17793->17796 17797 7ff77d681671 17794->17797 17798 7ff77d682710 54 API calls 17795->17798 17799 7ff77d6906d4 73 API calls 17796->17799 17797->16757 17800 7ff77d6816ae 17798->17800 17801 7ff77d6816cd 17799->17801 17807 7ff77d69004c 74 API calls 17800->17807 17802 7ff77d6816f9 17801->17802 17803 7ff77d6816d1 17801->17803 17805 7ff77d681717 17802->17805 17806 7ff77d6816ff 17802->17806 17804 7ff77d694f08 _get_daylight 11 API calls 17803->17804 17808 7ff77d6816d6 17804->17808 17812 7ff77d681739 17805->17812 17813 7ff77d681761 17805->17813 17878 7ff77d681210 17806->17878 17810 7ff77d681829 17807->17810 17811 7ff77d682910 54 API calls 17808->17811 17810->16757 17819 7ff77d6816ef __std_exception_copy 17811->17819 17815 7ff77d694f08 _get_daylight 11 API calls 17812->17815 17817 7ff77d69039c _fread_nolock 53 API calls 17813->17817 17813->17819 17820 7ff77d6817da 17813->17820 17824 7ff77d6817c5 17813->17824 17931 7ff77d690adc 17813->17931 17814 7ff77d69004c 74 API calls 17814->17800 17816 7ff77d68173e 17815->17816 17818 7ff77d682910 54 API calls 17816->17818 17817->17813 17818->17819 17819->17814 17822 7ff77d694f08 _get_daylight 11 API calls 17820->17822 17823 7ff77d6817ca 17822->17823 17825 7ff77d682910 54 API calls 17823->17825 17826 7ff77d694f08 _get_daylight 11 API calls 17824->17826 17825->17819 17826->17823 17828 7ff77d68718b 17827->17828 17830 7ff77d687144 17827->17830 17828->16757 17830->17828 17964 7ff77d695024 17830->17964 17832 7ff77d6841a1 17831->17832 17833 7ff77d6844e0 49 API calls 17832->17833 17834 7ff77d6841db 17833->17834 17835 7ff77d6844e0 49 API calls 17834->17835 17836 7ff77d6841eb 17835->17836 17837 7ff77d68420d 17836->17837 17838 7ff77d68423c 17836->17838 17979 7ff77d684110 17837->17979 17839 7ff77d684110 51 API calls 17838->17839 17841 7ff77d68423a 17839->17841 17842 7ff77d68429c 17841->17842 17843 7ff77d684267 17841->17843 17845 7ff77d684110 51 API calls 17842->17845 17986 7ff77d687cf0 17843->17986 17847 7ff77d6842c0 17845->17847 17851 7ff77d684110 51 API calls 17847->17851 17863 7ff77d684312 17847->17863 17848 7ff77d684297 17853 7ff77d68c550 _log10_special 8 API calls 17848->17853 17849 7ff77d684393 17852 7ff77d681950 115 API calls 17849->17852 17850 7ff77d682710 54 API calls 17850->17848 17854 7ff77d6842e9 17851->17854 17855 7ff77d68439d 17852->17855 17856 7ff77d684435 17853->17856 17857 7ff77d684110 51 API calls 17854->17857 17854->17863 17858 7ff77d6843fe 17855->17858 17859 7ff77d6843a5 17855->17859 17856->16757 17857->17863 17860 7ff77d682710 54 API calls 17858->17860 18012 7ff77d681840 17859->18012 17864 7ff77d684317 17860->17864 17861 7ff77d68438c 17861->17859 17861->17864 17863->17849 17863->17861 17863->17864 17866 7ff77d68437b 17863->17866 17867 7ff77d682710 54 API calls 17864->17867 17870 7ff77d682710 54 API calls 17866->17870 17867->17848 17868 7ff77d6843bc 17871 7ff77d682710 54 API calls 17868->17871 17869 7ff77d6843d2 17872 7ff77d681600 118 API calls 17869->17872 17870->17864 17871->17848 17873 7ff77d6843e0 17872->17873 17873->17848 17874 7ff77d682710 54 API calls 17873->17874 17874->17848 17876 7ff77d681c80 49 API calls 17875->17876 17877 7ff77d684474 17876->17877 17877->16757 17879 7ff77d681268 17878->17879 17880 7ff77d681297 17879->17880 17881 7ff77d68126f 17879->17881 17884 7ff77d6812d4 17880->17884 17885 7ff77d6812b1 17880->17885 17882 7ff77d682710 54 API calls 17881->17882 17883 7ff77d681282 17882->17883 17883->17819 17888 7ff77d6812e6 17884->17888 17894 7ff77d681309 memcpy_s 17884->17894 17886 7ff77d694f08 _get_daylight 11 API calls 17885->17886 17887 7ff77d6812b6 17886->17887 17889 7ff77d682910 54 API calls 17887->17889 17890 7ff77d694f08 _get_daylight 11 API calls 17888->17890 17895 7ff77d6812cf __std_exception_copy 17889->17895 17891 7ff77d6812eb 17890->17891 17893 7ff77d682910 54 API calls 17891->17893 17892 7ff77d69039c _fread_nolock 53 API calls 17892->17894 17893->17895 17894->17892 17894->17895 17896 7ff77d6813cf 17894->17896 17898 7ff77d690adc 76 API calls 17894->17898 17899 7ff77d690110 37 API calls 17894->17899 17895->17819 17897 7ff77d682710 54 API calls 17896->17897 17897->17895 17898->17894 17899->17894 17901 7ff77d6845c0 108 API calls 17900->17901 17902 7ff77d68108c 17901->17902 17903 7ff77d6810a9 17902->17903 17904 7ff77d681094 17902->17904 17906 7ff77d6906d4 73 API calls 17903->17906 17905 7ff77d682710 54 API calls 17904->17905 17911 7ff77d6810a4 __std_exception_copy 17905->17911 17907 7ff77d6810bf 17906->17907 17908 7ff77d6810e6 17907->17908 17909 7ff77d6810c3 17907->17909 17913 7ff77d6810f7 17908->17913 17914 7ff77d681122 17908->17914 17910 7ff77d694f08 _get_daylight 11 API calls 17909->17910 17912 7ff77d6810c8 17910->17912 17911->17785 17915 7ff77d682910 54 API calls 17912->17915 17916 7ff77d694f08 _get_daylight 11 API calls 17913->17916 17917 7ff77d681129 17914->17917 17925 7ff77d68113c 17914->17925 17922 7ff77d6810e1 __std_exception_copy 17915->17922 17918 7ff77d681100 17916->17918 17919 7ff77d681210 92 API calls 17917->17919 17920 7ff77d682910 54 API calls 17918->17920 17919->17922 17920->17922 17921 7ff77d69004c 74 API calls 17924 7ff77d6811b4 17921->17924 17922->17921 17923 7ff77d69039c _fread_nolock 53 API calls 17923->17925 17924->17911 17935 7ff77d6846f0 17924->17935 17925->17922 17925->17923 17926 7ff77d6811ed 17925->17926 17928 7ff77d694f08 _get_daylight 11 API calls 17926->17928 17929 7ff77d6811f2 17928->17929 17930 7ff77d682910 54 API calls 17929->17930 17930->17922 17932 7ff77d690b0c 17931->17932 17949 7ff77d69082c 17932->17949 17934 7ff77d690b2a 17934->17813 17936 7ff77d684700 17935->17936 17937 7ff77d689390 2 API calls 17936->17937 17938 7ff77d68472b 17937->17938 17939 7ff77d689390 2 API calls 17938->17939 17945 7ff77d68479e 17938->17945 17941 7ff77d684746 17939->17941 17940 7ff77d68c550 _log10_special 8 API calls 17942 7ff77d6847b9 17940->17942 17943 7ff77d68474b CreateSymbolicLinkW 17941->17943 17941->17945 17942->17911 17944 7ff77d684775 17943->17944 17943->17945 17944->17945 17946 7ff77d68477e GetLastError 17944->17946 17945->17940 17946->17945 17947 7ff77d684789 17946->17947 17950 7ff77d690879 17949->17950 17951 7ff77d69084c 17949->17951 17950->17934 17951->17950 17952 7ff77d690881 17951->17952 17953 7ff77d690856 17951->17953 17956 7ff77d69076c 17952->17956 17954 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 17953->17954 17954->17950 17963 7ff77d69546c EnterCriticalSection 17956->17963 17965 7ff77d69505e 17964->17965 17966 7ff77d695031 17964->17966 17967 7ff77d695081 17965->17967 17970 7ff77d69509d 17965->17970 17968 7ff77d694f08 _get_daylight 11 API calls 17966->17968 17976 7ff77d694fe8 17966->17976 17969 7ff77d694f08 _get_daylight 11 API calls 17967->17969 17971 7ff77d69503b 17968->17971 17973 7ff77d695086 17969->17973 17974 7ff77d694f4c 45 API calls 17970->17974 17972 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17971->17972 17975 7ff77d695046 17972->17975 17977 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 17973->17977 17978 7ff77d695091 17974->17978 17975->17830 17976->17830 17977->17978 17978->17830 17980 7ff77d684136 17979->17980 17981 7ff77d694984 49 API calls 17980->17981 17982 7ff77d68415c 17981->17982 17983 7ff77d68416d 17982->17983 17984 7ff77d684560 10 API calls 17982->17984 17983->17841 17985 7ff77d68417f 17984->17985 17985->17841 17987 7ff77d687d05 17986->17987 17988 7ff77d6845c0 108 API calls 17987->17988 17989 7ff77d687d2b 17988->17989 17990 7ff77d687d52 17989->17990 17991 7ff77d6845c0 108 API calls 17989->17991 17993 7ff77d68c550 _log10_special 8 API calls 17990->17993 17992 7ff77d687d42 17991->17992 17994 7ff77d687d4d 17992->17994 17995 7ff77d687d5c 17992->17995 17996 7ff77d684277 17993->17996 17997 7ff77d69004c 74 API calls 17994->17997 18016 7ff77d6900e4 17995->18016 17996->17848 17996->17850 17997->17990 17999 7ff77d687dbf 18000 7ff77d69004c 74 API calls 17999->18000 18001 7ff77d687de7 18000->18001 18003 7ff77d69004c 74 API calls 18001->18003 18002 7ff77d69039c _fread_nolock 53 API calls 18010 7ff77d687d61 18002->18010 18003->17990 18004 7ff77d687dc6 18006 7ff77d690110 37 API calls 18004->18006 18005 7ff77d690adc 76 API calls 18005->18010 18007 7ff77d687dc1 18006->18007 18007->17999 18022 7ff77d697318 18007->18022 18008 7ff77d690110 37 API calls 18008->18010 18010->17999 18010->18002 18010->18004 18010->18005 18010->18007 18010->18008 18011 7ff77d6900e4 37 API calls 18010->18011 18011->18010 18014 7ff77d6818d5 18012->18014 18015 7ff77d681865 18012->18015 18013 7ff77d695024 45 API calls 18013->18015 18014->17868 18014->17869 18015->18013 18015->18014 18017 7ff77d6900fd 18016->18017 18018 7ff77d6900ed 18016->18018 18017->18010 18019 7ff77d694f08 _get_daylight 11 API calls 18018->18019 18020 7ff77d6900f2 18019->18020 18021 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 18020->18021 18021->18017 18023 7ff77d697320 18022->18023 18024 7ff77d69733c 18023->18024 18025 7ff77d69735d 18023->18025 18026 7ff77d694f08 _get_daylight 11 API calls 18024->18026 18041 7ff77d69546c EnterCriticalSection 18025->18041 18043 7ff77d695ec8 18042->18043 18044 7ff77d695eee 18043->18044 18046 7ff77d695f21 18043->18046 18045 7ff77d694f08 _get_daylight 11 API calls 18044->18045 18047 7ff77d695ef3 18045->18047 18048 7ff77d695f34 18046->18048 18049 7ff77d695f27 18046->18049 18050 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 18047->18050 18061 7ff77d69ac28 18048->18061 18051 7ff77d694f08 _get_daylight 11 API calls 18049->18051 18053 7ff77d684616 18050->18053 18051->18053 18053->16782 18074 7ff77d6a02d8 EnterCriticalSection 18061->18074 18435 7ff77d6978f8 18434->18435 18438 7ff77d6973d4 18435->18438 18437 7ff77d697911 18437->16792 18439 7ff77d6973ef 18438->18439 18440 7ff77d69741e 18438->18440 18441 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 18439->18441 18448 7ff77d69546c EnterCriticalSection 18440->18448 18444 7ff77d69740f 18441->18444 18444->18437 18450 7ff77d68fe43 18449->18450 18452 7ff77d68fe71 18449->18452 18451 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 18450->18451 18453 7ff77d68fe63 18451->18453 18452->18453 18459 7ff77d69546c EnterCriticalSection 18452->18459 18453->16796 18461 7ff77d6845c0 108 API calls 18460->18461 18462 7ff77d681493 18461->18462 18463 7ff77d6814bc 18462->18463 18464 7ff77d68149b 18462->18464 18466 7ff77d6906d4 73 API calls 18463->18466 18465 7ff77d682710 54 API calls 18464->18465 18467 7ff77d6814ab 18465->18467 18468 7ff77d6814d1 18466->18468 18467->16829 18469 7ff77d6814f8 18468->18469 18470 7ff77d6814d5 18468->18470 18474 7ff77d681508 18469->18474 18475 7ff77d681532 18469->18475 18471 7ff77d694f08 _get_daylight 11 API calls 18470->18471 18472 7ff77d6814da 18471->18472 18473 7ff77d682910 54 API calls 18472->18473 18480 7ff77d6814f3 __std_exception_copy 18473->18480 18476 7ff77d694f08 _get_daylight 11 API calls 18474->18476 18477 7ff77d681538 18475->18477 18485 7ff77d68154b 18475->18485 18478 7ff77d681510 18476->18478 18479 7ff77d681210 92 API calls 18477->18479 18481 7ff77d682910 54 API calls 18478->18481 18479->18480 18482 7ff77d69004c 74 API calls 18480->18482 18481->18480 18483 7ff77d6815c4 18482->18483 18483->16829 18484 7ff77d69039c _fread_nolock 53 API calls 18484->18485 18485->18480 18485->18484 18486 7ff77d6815d6 18485->18486 18487 7ff77d694f08 _get_daylight 11 API calls 18486->18487 18488 7ff77d6815db 18487->18488 18489 7ff77d682910 54 API calls 18488->18489 18489->18480 18491 7ff77d689390 2 API calls 18490->18491 18492 7ff77d688e94 LoadLibraryExW 18491->18492 18493 7ff77d688eb3 __std_exception_copy 18492->18493 18493->16863 18567 7ff77d686375 18566->18567 18568 7ff77d681c80 49 API calls 18567->18568 18569 7ff77d6863b1 18568->18569 18570 7ff77d6863dd 18569->18570 18571 7ff77d6863ba 18569->18571 18572 7ff77d684630 49 API calls 18570->18572 18573 7ff77d682710 54 API calls 18571->18573 18574 7ff77d6863f5 18572->18574 18576 7ff77d6863d3 18573->18576 18575 7ff77d686413 18574->18575 18577 7ff77d682710 54 API calls 18574->18577 18578 7ff77d684560 10 API calls 18575->18578 18579 7ff77d68c550 _log10_special 8 API calls 18576->18579 18577->18575 18580 7ff77d68641d 18578->18580 18581 7ff77d68336e 18579->18581 18582 7ff77d68642b 18580->18582 18583 7ff77d688e80 3 API calls 18580->18583 18581->16898 18597 7ff77d686500 18581->18597 18584 7ff77d684630 49 API calls 18582->18584 18583->18582 18585 7ff77d686444 18584->18585 18586 7ff77d686469 18585->18586 18587 7ff77d686449 18585->18587 18588 7ff77d688e80 3 API calls 18586->18588 18589 7ff77d682710 54 API calls 18587->18589 18590 7ff77d686476 18588->18590 18589->18576 18591 7ff77d686482 18590->18591 18592 7ff77d6864c1 18590->18592 18593 7ff77d689390 2 API calls 18591->18593 18656 7ff77d685830 GetProcAddress 18592->18656 18595 7ff77d68649a GetLastError 18593->18595 18596 7ff77d682c50 51 API calls 18595->18596 18596->18576 18746 7ff77d685400 18597->18746 18599 7ff77d686526 18600 7ff77d68652e 18599->18600 18601 7ff77d68653f 18599->18601 18603 7ff77d682710 54 API calls 18600->18603 18753 7ff77d684c90 18601->18753 18608 7ff77d68653a 18603->18608 18605 7ff77d68655c 18609 7ff77d68656c 18605->18609 18611 7ff77d68657d 18605->18611 18606 7ff77d68654b 18607 7ff77d682710 54 API calls 18606->18607 18607->18608 18608->16900 18610 7ff77d682710 54 API calls 18609->18610 18610->18608 18612 7ff77d6865ad 18611->18612 18613 7ff77d68659c 18611->18613 18615 7ff77d6865cd 18612->18615 18616 7ff77d6865bc 18612->18616 18614 7ff77d682710 54 API calls 18613->18614 18614->18608 18757 7ff77d684d50 18615->18757 18617 7ff77d682710 54 API calls 18616->18617 18617->18608 18635 7ff77d686070 18634->18635 18635->18635 18636 7ff77d686099 18635->18636 18639 7ff77d6860b0 __std_exception_copy 18635->18639 18637 7ff77d682710 54 API calls 18636->18637 18638 7ff77d6860a5 18637->18638 18638->16902 18640 7ff77d681470 116 API calls 18639->18640 18641 7ff77d682710 54 API calls 18639->18641 18642 7ff77d6861bb 18639->18642 18640->18639 18641->18639 18642->16902 18657 7ff77d685852 GetLastError 18656->18657 18658 7ff77d68587f GetProcAddress 18656->18658 18659 7ff77d68585f 18657->18659 18660 7ff77d68589b GetLastError 18658->18660 18661 7ff77d6858aa GetProcAddress 18658->18661 18662 7ff77d682c50 51 API calls 18659->18662 18660->18659 18663 7ff77d6858c6 GetLastError 18661->18663 18664 7ff77d6858d5 GetProcAddress 18661->18664 18665 7ff77d685874 18662->18665 18663->18659 18666 7ff77d685903 GetProcAddress 18664->18666 18667 7ff77d6858f1 GetLastError 18664->18667 18665->18576 18668 7ff77d685931 GetProcAddress 18666->18668 18669 7ff77d68591f GetLastError 18666->18669 18667->18659 18670 7ff77d68594d GetLastError 18668->18670 18671 7ff77d68595f GetProcAddress 18668->18671 18669->18659 18670->18659 18748 7ff77d68542c 18746->18748 18747 7ff77d685434 18747->18599 18748->18747 18751 7ff77d6855d4 18748->18751 18777 7ff77d696aa4 18748->18777 18749 7ff77d685797 __std_exception_copy 18749->18599 18750 7ff77d6847d0 47 API calls 18750->18751 18751->18749 18751->18750 18754 7ff77d684cc0 18753->18754 18755 7ff77d68c550 _log10_special 8 API calls 18754->18755 18756 7ff77d684d2a 18755->18756 18756->18605 18756->18606 18758 7ff77d684d65 18757->18758 18778 7ff77d696ad4 18777->18778 18781 7ff77d695fa0 18778->18781 18780 7ff77d696b04 18780->18748 18782 7ff77d695fd1 18781->18782 18783 7ff77d695fe3 18781->18783 18784 7ff77d694f08 _get_daylight 11 API calls 18782->18784 18785 7ff77d69602d 18783->18785 18786 7ff77d695ff0 18783->18786 18788 7ff77d695fd6 18784->18788 18787 7ff77d696048 18785->18787 18790 7ff77d6947c0 45 API calls 18785->18790 18789 7ff77d69a814 _invalid_parameter_noinfo 37 API calls 18786->18789 18793 7ff77d69606a 18787->18793 18802 7ff77d696a2c 18787->18802 18792 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 18788->18792 18800 7ff77d695fe1 18789->18800 18790->18787 18792->18800 18794 7ff77d69610b 18793->18794 18795 7ff77d694f08 _get_daylight 11 API calls 18793->18795 18796 7ff77d694f08 _get_daylight 11 API calls 18794->18796 18794->18800 18797 7ff77d696100 18795->18797 18798 7ff77d6961b6 18796->18798 18801 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 18797->18801 18799 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 18798->18799 18799->18800 18800->18780 18801->18794 18803 7ff77d696a4f 18802->18803 18804 7ff77d696a66 18802->18804 18808 7ff77d69ff68 18803->18808 18807 7ff77d696a54 18804->18807 18813 7ff77d69ff98 18804->18813 18807->18787 18809 7ff77d69b150 __GetCurrentState 45 API calls 18808->18809 18810 7ff77d69ff71 18809->18810 18811 7ff77d69d984 45 API calls 18810->18811 18814 7ff77d694f4c 45 API calls 18813->18814 18816 7ff77d69ffd1 18814->18816 18815 7ff77d69ffdd 18816->18815 18820 7ff77d6a2e40 18816->18820 18821 7ff77d694f4c 45 API calls 18820->18821 18854->16906 20124 7ff77d6a16b0 20135 7ff77d6a73e4 20124->20135 20136 7ff77d6a73f1 20135->20136 20137 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20136->20137 20138 7ff77d6a740d 20136->20138 20137->20136 20139 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20138->20139 20140 7ff77d6a16b9 20138->20140 20139->20138 20141 7ff77d6a02d8 EnterCriticalSection 20140->20141 16142 7ff77d695628 16143 7ff77d69565f 16142->16143 16144 7ff77d695642 16142->16144 16143->16144 16146 7ff77d695672 CreateFileW 16143->16146 16167 7ff77d694ee8 16144->16167 16148 7ff77d6956a6 16146->16148 16149 7ff77d6956dc 16146->16149 16170 7ff77d69577c GetFileType 16148->16170 16196 7ff77d695c04 16149->16196 16150 7ff77d694f08 _get_daylight 11 API calls 16153 7ff77d69564f 16150->16153 16158 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16153->16158 16156 7ff77d695710 16222 7ff77d6959c4 16156->16222 16157 7ff77d6956e5 16217 7ff77d694e7c 16157->16217 16163 7ff77d69565a 16158->16163 16159 7ff77d6956d1 CloseHandle 16159->16163 16160 7ff77d6956bb CloseHandle 16160->16163 16166 7ff77d6956ef 16166->16163 16168 7ff77d69b2c8 _get_daylight 11 API calls 16167->16168 16169 7ff77d694ef1 16168->16169 16169->16150 16171 7ff77d695887 16170->16171 16172 7ff77d6957ca 16170->16172 16173 7ff77d69588f 16171->16173 16174 7ff77d6958b1 16171->16174 16175 7ff77d6957f6 GetFileInformationByHandle 16172->16175 16180 7ff77d695b00 21 API calls 16172->16180 16176 7ff77d6958a2 GetLastError 16173->16176 16177 7ff77d695893 16173->16177 16179 7ff77d6958d4 PeekNamedPipe 16174->16179 16195 7ff77d695872 16174->16195 16175->16176 16178 7ff77d69581f 16175->16178 16183 7ff77d694e7c _fread_nolock 11 API calls 16176->16183 16181 7ff77d694f08 _get_daylight 11 API calls 16177->16181 16182 7ff77d6959c4 51 API calls 16178->16182 16179->16195 16184 7ff77d6957e4 16180->16184 16181->16195 16185 7ff77d69582a 16182->16185 16183->16195 16184->16175 16184->16195 16239 7ff77d695924 16185->16239 16186 7ff77d68c550 _log10_special 8 API calls 16188 7ff77d6956b4 16186->16188 16188->16159 16188->16160 16190 7ff77d695924 10 API calls 16191 7ff77d695849 16190->16191 16192 7ff77d695924 10 API calls 16191->16192 16193 7ff77d69585a 16192->16193 16194 7ff77d694f08 _get_daylight 11 API calls 16193->16194 16193->16195 16194->16195 16195->16186 16197 7ff77d695c3a 16196->16197 16198 7ff77d694f08 _get_daylight 11 API calls 16197->16198 16216 7ff77d695cd2 __std_exception_copy 16197->16216 16200 7ff77d695c4c 16198->16200 16199 7ff77d68c550 _log10_special 8 API calls 16201 7ff77d6956e1 16199->16201 16202 7ff77d694f08 _get_daylight 11 API calls 16200->16202 16201->16156 16201->16157 16203 7ff77d695c54 16202->16203 16246 7ff77d697e08 16203->16246 16205 7ff77d695c69 16206 7ff77d695c71 16205->16206 16207 7ff77d695c7b 16205->16207 16208 7ff77d694f08 _get_daylight 11 API calls 16206->16208 16209 7ff77d694f08 _get_daylight 11 API calls 16207->16209 16212 7ff77d695c76 16208->16212 16210 7ff77d695c80 16209->16210 16211 7ff77d694f08 _get_daylight 11 API calls 16210->16211 16210->16216 16213 7ff77d695c8a 16211->16213 16214 7ff77d695cc4 GetDriveTypeW 16212->16214 16212->16216 16215 7ff77d697e08 45 API calls 16213->16215 16214->16216 16215->16212 16216->16199 16218 7ff77d69b2c8 _get_daylight 11 API calls 16217->16218 16219 7ff77d694e89 Concurrency::details::SchedulerProxy::DeleteThis 16218->16219 16220 7ff77d69b2c8 _get_daylight 11 API calls 16219->16220 16221 7ff77d694eab 16220->16221 16221->16166 16224 7ff77d6959ec 16222->16224 16223 7ff77d69571d 16232 7ff77d695b00 16223->16232 16224->16223 16340 7ff77d69f724 16224->16340 16226 7ff77d695a80 16226->16223 16227 7ff77d69f724 51 API calls 16226->16227 16228 7ff77d695a93 16227->16228 16228->16223 16229 7ff77d69f724 51 API calls 16228->16229 16230 7ff77d695aa6 16229->16230 16230->16223 16231 7ff77d69f724 51 API calls 16230->16231 16231->16223 16233 7ff77d695b1a 16232->16233 16234 7ff77d695b51 16233->16234 16235 7ff77d695b2a 16233->16235 16236 7ff77d69f5b8 21 API calls 16234->16236 16237 7ff77d695b3a 16235->16237 16238 7ff77d694e7c _fread_nolock 11 API calls 16235->16238 16236->16237 16237->16166 16238->16237 16240 7ff77d695940 16239->16240 16241 7ff77d69594d FileTimeToSystemTime 16239->16241 16240->16241 16242 7ff77d695948 16240->16242 16241->16242 16243 7ff77d695961 SystemTimeToTzSpecificLocalTime 16241->16243 16244 7ff77d68c550 _log10_special 8 API calls 16242->16244 16243->16242 16245 7ff77d695839 16244->16245 16245->16190 16247 7ff77d697e92 16246->16247 16248 7ff77d697e24 16246->16248 16283 7ff77d6a07c0 16247->16283 16248->16247 16250 7ff77d697e29 16248->16250 16251 7ff77d697e41 16250->16251 16252 7ff77d697e5e 16250->16252 16258 7ff77d697bd8 GetFullPathNameW 16251->16258 16266 7ff77d697c4c GetFullPathNameW 16252->16266 16257 7ff77d697e56 __std_exception_copy 16257->16205 16259 7ff77d697bfe GetLastError 16258->16259 16262 7ff77d697c14 16258->16262 16260 7ff77d694e7c _fread_nolock 11 API calls 16259->16260 16261 7ff77d697c0b 16260->16261 16263 7ff77d694f08 _get_daylight 11 API calls 16261->16263 16264 7ff77d694f08 _get_daylight 11 API calls 16262->16264 16265 7ff77d697c10 16262->16265 16263->16265 16264->16265 16265->16257 16267 7ff77d697c7f GetLastError 16266->16267 16272 7ff77d697c95 __std_exception_copy 16266->16272 16268 7ff77d694e7c _fread_nolock 11 API calls 16267->16268 16269 7ff77d697c8c 16268->16269 16271 7ff77d694f08 _get_daylight 11 API calls 16269->16271 16270 7ff77d697c91 16274 7ff77d697d24 16270->16274 16271->16270 16272->16270 16273 7ff77d697cef GetFullPathNameW 16272->16273 16273->16267 16273->16270 16275 7ff77d697d98 memcpy_s 16274->16275 16279 7ff77d697d4d memcpy_s 16274->16279 16275->16257 16276 7ff77d697d81 16277 7ff77d694f08 _get_daylight 11 API calls 16276->16277 16278 7ff77d697d86 16277->16278 16281 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16278->16281 16279->16275 16279->16276 16280 7ff77d697dba 16279->16280 16280->16275 16282 7ff77d694f08 _get_daylight 11 API calls 16280->16282 16281->16275 16282->16278 16286 7ff77d6a05d0 16283->16286 16287 7ff77d6a0612 16286->16287 16288 7ff77d6a05fb 16286->16288 16289 7ff77d6a0616 16287->16289 16290 7ff77d6a0637 16287->16290 16291 7ff77d694f08 _get_daylight 11 API calls 16288->16291 16312 7ff77d6a073c 16289->16312 16324 7ff77d69f5b8 16290->16324 16294 7ff77d6a0600 16291->16294 16297 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16294->16297 16296 7ff77d6a063c 16300 7ff77d6a06e1 16296->16300 16307 7ff77d6a0663 16296->16307 16308 7ff77d6a060b __std_exception_copy 16297->16308 16298 7ff77d6a061f 16299 7ff77d694ee8 _fread_nolock 11 API calls 16298->16299 16301 7ff77d6a0624 16299->16301 16300->16288 16302 7ff77d6a06e9 16300->16302 16304 7ff77d694f08 _get_daylight 11 API calls 16301->16304 16305 7ff77d697bd8 13 API calls 16302->16305 16303 7ff77d68c550 _log10_special 8 API calls 16306 7ff77d6a0731 16303->16306 16304->16294 16305->16308 16306->16257 16309 7ff77d697c4c 14 API calls 16307->16309 16308->16303 16310 7ff77d6a06a7 16309->16310 16310->16308 16311 7ff77d697d24 37 API calls 16310->16311 16311->16308 16313 7ff77d6a0786 16312->16313 16314 7ff77d6a0756 16312->16314 16316 7ff77d6a0791 GetDriveTypeW 16313->16316 16317 7ff77d6a0771 16313->16317 16315 7ff77d694ee8 _fread_nolock 11 API calls 16314->16315 16318 7ff77d6a075b 16315->16318 16316->16317 16320 7ff77d68c550 _log10_special 8 API calls 16317->16320 16319 7ff77d694f08 _get_daylight 11 API calls 16318->16319 16321 7ff77d6a0766 16319->16321 16322 7ff77d6a061b 16320->16322 16323 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16321->16323 16322->16296 16322->16298 16323->16317 16338 7ff77d6aa4d0 16324->16338 16327 7ff77d69f605 16331 7ff77d68c550 _log10_special 8 API calls 16327->16331 16328 7ff77d69f62c 16329 7ff77d69eb98 _get_daylight 11 API calls 16328->16329 16330 7ff77d69f63b 16329->16330 16333 7ff77d69f654 16330->16333 16334 7ff77d69f645 GetCurrentDirectoryW 16330->16334 16332 7ff77d69f699 16331->16332 16332->16296 16336 7ff77d694f08 _get_daylight 11 API calls 16333->16336 16334->16333 16335 7ff77d69f659 16334->16335 16337 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16335->16337 16336->16335 16337->16327 16339 7ff77d69f5ee GetCurrentDirectoryW 16338->16339 16339->16327 16339->16328 16341 7ff77d69f731 16340->16341 16344 7ff77d69f755 16340->16344 16342 7ff77d69f736 16341->16342 16341->16344 16345 7ff77d694f08 _get_daylight 11 API calls 16342->16345 16343 7ff77d69f78f 16346 7ff77d694f08 _get_daylight 11 API calls 16343->16346 16344->16343 16347 7ff77d69f7ae 16344->16347 16348 7ff77d69f73b 16345->16348 16349 7ff77d69f794 16346->16349 16357 7ff77d694f4c 16347->16357 16351 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16348->16351 16353 7ff77d69a8e0 _invalid_parameter_noinfo 37 API calls 16349->16353 16352 7ff77d69f746 16351->16352 16352->16226 16354 7ff77d69f79f 16353->16354 16354->16226 16355 7ff77d69f7bb 16355->16354 16356 7ff77d6a04dc 51 API calls 16355->16356 16356->16355 16358 7ff77d694f70 16357->16358 16359 7ff77d694f6b 16357->16359 16358->16359 16360 7ff77d69b150 __GetCurrentState 45 API calls 16358->16360 16359->16355 16361 7ff77d694f8b 16360->16361 16365 7ff77d69d984 16361->16365 16366 7ff77d694fae 16365->16366 16367 7ff77d69d999 16365->16367 16369 7ff77d69d9f0 16366->16369 16367->16366 16373 7ff77d6a3304 16367->16373 16370 7ff77d69da18 16369->16370 16371 7ff77d69da05 16369->16371 16370->16359 16371->16370 16386 7ff77d6a2650 16371->16386 16374 7ff77d69b150 __GetCurrentState 45 API calls 16373->16374 16375 7ff77d6a3313 16374->16375 16376 7ff77d6a335e 16375->16376 16385 7ff77d6a02d8 EnterCriticalSection 16375->16385 16376->16366 16387 7ff77d69b150 __GetCurrentState 45 API calls 16386->16387 16388 7ff77d6a2659 16387->16388 19308 7ff77d6a7c20 19311 7ff77d6a25f0 19308->19311 19312 7ff77d6a25fd 19311->19312 19316 7ff77d6a2642 19311->19316 19317 7ff77d69b224 19312->19317 19318 7ff77d69b250 FlsSetValue 19317->19318 19319 7ff77d69b235 FlsGetValue 19317->19319 19320 7ff77d69b242 19318->19320 19321 7ff77d69b25d 19318->19321 19319->19320 19322 7ff77d69b24a 19319->19322 19323 7ff77d69a504 __GetCurrentState 45 API calls 19320->19323 19327 7ff77d69b248 19320->19327 19324 7ff77d69eb98 _get_daylight 11 API calls 19321->19324 19322->19318 19325 7ff77d69b2c5 19323->19325 19326 7ff77d69b26c 19324->19326 19328 7ff77d69b28a FlsSetValue 19326->19328 19329 7ff77d69b27a FlsSetValue 19326->19329 19337 7ff77d6a22c4 19327->19337 19331 7ff77d69b296 FlsSetValue 19328->19331 19332 7ff77d69b2a8 19328->19332 19330 7ff77d69b283 19329->19330 19333 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19330->19333 19331->19330 19334 7ff77d69aef4 _get_daylight 11 API calls 19332->19334 19333->19320 19335 7ff77d69b2b0 19334->19335 19336 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19335->19336 19336->19327 19360 7ff77d6a2534 19337->19360 19339 7ff77d6a22f9 19375 7ff77d6a1fc4 19339->19375 19342 7ff77d6a2316 19342->19316 19343 7ff77d69d5fc _fread_nolock 12 API calls 19344 7ff77d6a2327 19343->19344 19345 7ff77d6a232f 19344->19345 19347 7ff77d6a233e 19344->19347 19346 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19345->19346 19346->19342 19347->19347 19382 7ff77d6a266c 19347->19382 19350 7ff77d6a243a 19351 7ff77d694f08 _get_daylight 11 API calls 19350->19351 19352 7ff77d6a243f 19351->19352 19354 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19352->19354 19353 7ff77d6a2495 19356 7ff77d6a24fc 19353->19356 19393 7ff77d6a1df4 19353->19393 19354->19342 19355 7ff77d6a2454 19355->19353 19358 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19355->19358 19357 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19356->19357 19357->19342 19358->19353 19361 7ff77d6a2557 19360->19361 19362 7ff77d6a2561 19361->19362 19408 7ff77d6a02d8 EnterCriticalSection 19361->19408 19364 7ff77d6a25d3 19362->19364 19366 7ff77d69a504 __GetCurrentState 45 API calls 19362->19366 19364->19339 19369 7ff77d6a25eb 19366->19369 19371 7ff77d6a2642 19369->19371 19372 7ff77d69b224 50 API calls 19369->19372 19371->19339 19373 7ff77d6a262c 19372->19373 19374 7ff77d6a22c4 65 API calls 19373->19374 19374->19371 19376 7ff77d694f4c 45 API calls 19375->19376 19377 7ff77d6a1fd8 19376->19377 19378 7ff77d6a1fe4 GetOEMCP 19377->19378 19379 7ff77d6a1ff6 19377->19379 19380 7ff77d6a200b 19378->19380 19379->19380 19381 7ff77d6a1ffb GetACP 19379->19381 19380->19342 19380->19343 19381->19380 19383 7ff77d6a1fc4 47 API calls 19382->19383 19384 7ff77d6a2699 19383->19384 19385 7ff77d6a27ef 19384->19385 19386 7ff77d6a26d6 IsValidCodePage 19384->19386 19392 7ff77d6a26f0 memcpy_s 19384->19392 19387 7ff77d68c550 _log10_special 8 API calls 19385->19387 19386->19385 19388 7ff77d6a26e7 19386->19388 19389 7ff77d6a2431 19387->19389 19390 7ff77d6a2716 GetCPInfo 19388->19390 19388->19392 19389->19350 19389->19355 19390->19385 19390->19392 19409 7ff77d6a20dc 19392->19409 19465 7ff77d6a02d8 EnterCriticalSection 19393->19465 19410 7ff77d6a2119 GetCPInfo 19409->19410 19419 7ff77d6a220f 19409->19419 19416 7ff77d6a212c 19410->19416 19410->19419 19411 7ff77d68c550 _log10_special 8 API calls 19413 7ff77d6a22ae 19411->19413 19412 7ff77d6a2e40 48 API calls 19414 7ff77d6a21a3 19412->19414 19413->19385 19420 7ff77d6a7b84 19414->19420 19416->19412 19418 7ff77d6a7b84 54 API calls 19418->19419 19419->19411 19421 7ff77d694f4c 45 API calls 19420->19421 19422 7ff77d6a7ba9 19421->19422 19425 7ff77d6a7850 19422->19425 19426 7ff77d6a7891 19425->19426 19427 7ff77d69f8a0 _fread_nolock MultiByteToWideChar 19426->19427 19430 7ff77d6a78db 19427->19430 19428 7ff77d6a7b59 19429 7ff77d68c550 _log10_special 8 API calls 19428->19429 19431 7ff77d6a21d6 19429->19431 19430->19428 19432 7ff77d69d5fc _fread_nolock 12 API calls 19430->19432 19433 7ff77d6a7a11 19430->19433 19435 7ff77d6a7913 19430->19435 19431->19418 19432->19435 19433->19428 19434 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19433->19434 19434->19428 19435->19433 19436 7ff77d69f8a0 _fread_nolock MultiByteToWideChar 19435->19436 19437 7ff77d6a7986 19436->19437 19437->19433 19456 7ff77d69f0e4 19437->19456 19440 7ff77d6a7a22 19442 7ff77d69d5fc _fread_nolock 12 API calls 19440->19442 19444 7ff77d6a7af4 19440->19444 19446 7ff77d6a7a40 19440->19446 19441 7ff77d6a79d1 19441->19433 19443 7ff77d69f0e4 __crtLCMapStringW 6 API calls 19441->19443 19442->19446 19443->19433 19444->19433 19445 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19444->19445 19445->19433 19446->19433 19447 7ff77d69f0e4 __crtLCMapStringW 6 API calls 19446->19447 19448 7ff77d6a7ac0 19447->19448 19448->19444 19449 7ff77d6a7ae0 19448->19449 19450 7ff77d6a7af6 19448->19450 19451 7ff77d6a07e8 WideCharToMultiByte 19449->19451 19452 7ff77d6a07e8 WideCharToMultiByte 19450->19452 19453 7ff77d6a7aee 19451->19453 19452->19453 19453->19444 19454 7ff77d6a7b0e 19453->19454 19454->19433 19455 7ff77d69a948 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19454->19455 19455->19433 19457 7ff77d69ed10 __crtLCMapStringW 5 API calls 19456->19457 19458 7ff77d69f122 19457->19458 19460 7ff77d69f12a 19458->19460 19462 7ff77d69f1d0 19458->19462 19460->19433 19460->19440 19460->19441 19461 7ff77d69f193 LCMapStringW 19461->19460 19463 7ff77d69ed10 __crtLCMapStringW 5 API calls 19462->19463 19464 7ff77d69f1fe __crtLCMapStringW 19463->19464 19464->19461 20406 7ff77d69c520 20417 7ff77d6a02d8 EnterCriticalSection 20406->20417

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ff77d6889e0-7ff77d688b26 call 7ff77d68c850 call 7ff77d689390 SetConsoleCtrlHandler GetStartupInfoW call 7ff77d6953f0 call 7ff77d69a47c call 7ff77d69871c call 7ff77d6953f0 call 7ff77d69a47c call 7ff77d69871c call 7ff77d6953f0 call 7ff77d69a47c call 7ff77d69871c GetCommandLineW CreateProcessW 23 7ff77d688b28-7ff77d688b48 GetLastError call 7ff77d682c50 0->23 24 7ff77d688b4d-7ff77d688b89 RegisterClassW 0->24 32 7ff77d688e39-7ff77d688e5f call 7ff77d68c550 23->32 26 7ff77d688b91-7ff77d688be5 CreateWindowExW 24->26 27 7ff77d688b8b GetLastError 24->27 29 7ff77d688bef-7ff77d688bf4 ShowWindow 26->29 30 7ff77d688be7-7ff77d688bed GetLastError 26->30 27->26 31 7ff77d688bfa-7ff77d688c0a WaitForSingleObject 29->31 30->31 33 7ff77d688c88-7ff77d688c8f 31->33 34 7ff77d688c0c 31->34 37 7ff77d688c91-7ff77d688ca1 WaitForSingleObject 33->37 38 7ff77d688cd2-7ff77d688cd9 33->38 36 7ff77d688c10-7ff77d688c13 34->36 40 7ff77d688c15 GetLastError 36->40 41 7ff77d688c1b-7ff77d688c22 36->41 42 7ff77d688ca7-7ff77d688cb7 TerminateProcess 37->42 43 7ff77d688df8-7ff77d688e02 37->43 44 7ff77d688cdf-7ff77d688cf5 QueryPerformanceFrequency QueryPerformanceCounter 38->44 45 7ff77d688dc0-7ff77d688dd9 GetMessageW 38->45 40->41 41->37 46 7ff77d688c24-7ff77d688c41 PeekMessageW 41->46 51 7ff77d688cbf-7ff77d688ccd WaitForSingleObject 42->51 52 7ff77d688cb9 GetLastError 42->52 49 7ff77d688e11-7ff77d688e35 GetExitCodeProcess CloseHandle * 2 43->49 50 7ff77d688e04-7ff77d688e0a DestroyWindow 43->50 53 7ff77d688d00-7ff77d688d38 MsgWaitForMultipleObjects PeekMessageW 44->53 47 7ff77d688def-7ff77d688df6 45->47 48 7ff77d688ddb-7ff77d688de9 TranslateMessage DispatchMessageW 45->48 56 7ff77d688c43-7ff77d688c74 TranslateMessage DispatchMessageW PeekMessageW 46->56 57 7ff77d688c76-7ff77d688c86 WaitForSingleObject 46->57 47->43 47->45 48->47 49->32 50->49 51->43 52->51 54 7ff77d688d73-7ff77d688d7a 53->54 55 7ff77d688d3a 53->55 54->45 59 7ff77d688d7c-7ff77d688da5 QueryPerformanceCounter 54->59 58 7ff77d688d40-7ff77d688d71 TranslateMessage DispatchMessageW PeekMessageW 55->58 56->56 56->57 57->33 57->36 58->54 58->58 59->53 60 7ff77d688dab-7ff77d688db2 59->60 60->43 61 7ff77d688db4-7ff77d688db8 60->61 61->45
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$ErrorLast$ObjectProcessSingleWait$CloseCreateHandlePeekWindow_invalid_parameter_noinfo$ByteCharClassCodeCommandConsoleCtrlCurrentDestroyDispatchExitFormatHandlerInfoLineMultiRegisterStartupTerminateTranslateWide
                        • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
                        • API String ID: 3832162212-3165540532
                        • Opcode ID: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                        • Instruction ID: 34e00377a7c517d4f3711e910cfb026c9c9e8db004f15c7c2e3c4c669b66cad1
                        • Opcode Fuzzy Hash: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                        • Instruction Fuzzy Hash: BCD15533E3CA8286E710AF34E8542AABB62FF84B94F800335DA5D87695EF3CD5458750

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 62 7ff77d681000-7ff77d683806 call 7ff77d68fe18 call 7ff77d68fe20 call 7ff77d68c850 call 7ff77d6953f0 call 7ff77d695484 call 7ff77d6836b0 76 7ff77d683808-7ff77d68380f 62->76 77 7ff77d683814-7ff77d683836 call 7ff77d681950 62->77 78 7ff77d683c97-7ff77d683cb2 call 7ff77d68c550 76->78 83 7ff77d68383c-7ff77d683856 call 7ff77d681c80 77->83 84 7ff77d68391b-7ff77d683931 call 7ff77d6845c0 77->84 88 7ff77d68385b-7ff77d68389b call 7ff77d688830 83->88 89 7ff77d68396a-7ff77d68397f call 7ff77d682710 84->89 90 7ff77d683933-7ff77d683960 call 7ff77d687f90 84->90 97 7ff77d68389d-7ff77d6838a3 88->97 98 7ff77d6838c1-7ff77d6838cc call 7ff77d694f30 88->98 102 7ff77d683c8f 89->102 100 7ff77d683984-7ff77d6839a6 call 7ff77d681c80 90->100 101 7ff77d683962-7ff77d683965 call 7ff77d69004c 90->101 103 7ff77d6838a5-7ff77d6838ad 97->103 104 7ff77d6838af-7ff77d6838bd call 7ff77d6889a0 97->104 110 7ff77d6839fc-7ff77d683a2a call 7ff77d688940 call 7ff77d6889a0 * 3 98->110 111 7ff77d6838d2-7ff77d6838e1 call 7ff77d688830 98->111 115 7ff77d6839b0-7ff77d6839b9 100->115 101->89 102->78 103->104 104->98 138 7ff77d683a2f-7ff77d683a3e call 7ff77d688830 110->138 119 7ff77d6838e7-7ff77d6838ed 111->119 120 7ff77d6839f4-7ff77d6839f7 call 7ff77d694f30 111->120 115->115 118 7ff77d6839bb-7ff77d6839d8 call 7ff77d681950 115->118 118->88 127 7ff77d6839de-7ff77d6839ef call 7ff77d682710 118->127 124 7ff77d6838f0-7ff77d6838fc 119->124 120->110 128 7ff77d6838fe-7ff77d683903 124->128 129 7ff77d683905-7ff77d683908 124->129 127->102 128->124 128->129 129->120 132 7ff77d68390e-7ff77d683916 call 7ff77d694f30 129->132 132->138 141 7ff77d683b45-7ff77d683b53 138->141 142 7ff77d683a44-7ff77d683a47 138->142 144 7ff77d683b59-7ff77d683b5d 141->144 145 7ff77d683a67 141->145 142->141 143 7ff77d683a4d-7ff77d683a50 142->143 146 7ff77d683a56-7ff77d683a5a 143->146 147 7ff77d683b14-7ff77d683b17 143->147 148 7ff77d683a6b-7ff77d683a90 call 7ff77d694f30 144->148 145->148 146->147 149 7ff77d683a60 146->149 150 7ff77d683b19-7ff77d683b1d 147->150 151 7ff77d683b2f-7ff77d683b40 call 7ff77d682710 147->151 157 7ff77d683aab-7ff77d683ac0 148->157 158 7ff77d683a92-7ff77d683aa6 call 7ff77d688940 148->158 149->145 150->151 153 7ff77d683b1f-7ff77d683b2a 150->153 159 7ff77d683c7f-7ff77d683c87 151->159 153->148 161 7ff77d683be8-7ff77d683bfa call 7ff77d688830 157->161 162 7ff77d683ac6-7ff77d683aca 157->162 158->157 159->102 170 7ff77d683c2e 161->170 171 7ff77d683bfc-7ff77d683c02 161->171 164 7ff77d683bcd-7ff77d683be2 call 7ff77d681940 162->164 165 7ff77d683ad0-7ff77d683ae8 call 7ff77d695250 162->165 164->161 164->162 176 7ff77d683aea-7ff77d683b02 call 7ff77d695250 165->176 177 7ff77d683b62-7ff77d683b7a call 7ff77d695250 165->177 173 7ff77d683c31-7ff77d683c40 call 7ff77d694f30 170->173 174 7ff77d683c1e-7ff77d683c2c 171->174 175 7ff77d683c04-7ff77d683c1c 171->175 185 7ff77d683c46-7ff77d683c4a 173->185 186 7ff77d683d41-7ff77d683d63 call 7ff77d6844e0 173->186 174->173 175->173 176->164 184 7ff77d683b08-7ff77d683b0f 176->184 187 7ff77d683b7c-7ff77d683b80 177->187 188 7ff77d683b87-7ff77d683b9f call 7ff77d695250 177->188 184->164 190 7ff77d683cd4-7ff77d683ce6 call 7ff77d688830 185->190 191 7ff77d683c50-7ff77d683c5f call 7ff77d6890e0 185->191 201 7ff77d683d65-7ff77d683d6f call 7ff77d684630 186->201 202 7ff77d683d71-7ff77d683d82 call 7ff77d681c80 186->202 187->188 197 7ff77d683bac-7ff77d683bc4 call 7ff77d695250 188->197 198 7ff77d683ba1-7ff77d683ba5 188->198 206 7ff77d683ce8-7ff77d683ceb 190->206 207 7ff77d683d35-7ff77d683d3c 190->207 204 7ff77d683cb3-7ff77d683cb6 call 7ff77d688660 191->204 205 7ff77d683c61 191->205 197->164 217 7ff77d683bc6 197->217 198->197 215 7ff77d683d87-7ff77d683d96 201->215 202->215 216 7ff77d683cbb-7ff77d683cbd 204->216 212 7ff77d683c68 call 7ff77d682710 205->212 206->207 213 7ff77d683ced-7ff77d683d10 call 7ff77d681c80 206->213 207->212 226 7ff77d683c6d-7ff77d683c77 212->226 230 7ff77d683d2b-7ff77d683d33 call 7ff77d694f30 213->230 231 7ff77d683d12-7ff77d683d26 call 7ff77d682710 call 7ff77d694f30 213->231 220 7ff77d683dbc-7ff77d683dd2 call 7ff77d689390 215->220 221 7ff77d683d98-7ff77d683d9f 215->221 224 7ff77d683cc8-7ff77d683ccf 216->224 225 7ff77d683cbf-7ff77d683cc6 216->225 217->164 233 7ff77d683dd4 220->233 234 7ff77d683de0-7ff77d683dfc SetDllDirectoryW 220->234 221->220 222 7ff77d683da1-7ff77d683da5 221->222 222->220 228 7ff77d683da7-7ff77d683db6 LoadLibraryExW 222->228 224->215 225->212 226->159 228->220 230->215 231->226 233->234 237 7ff77d683ef9-7ff77d683f00 234->237 238 7ff77d683e02-7ff77d683e11 call 7ff77d688830 234->238 241 7ff77d683f06-7ff77d683f0d 237->241 242 7ff77d684000-7ff77d684008 237->242 251 7ff77d683e2a-7ff77d683e34 call 7ff77d694f30 238->251 252 7ff77d683e13-7ff77d683e19 238->252 241->242 245 7ff77d683f13-7ff77d683f1d call 7ff77d6833c0 241->245 246 7ff77d68402d-7ff77d68405f call 7ff77d6836a0 call 7ff77d683360 call 7ff77d683670 call 7ff77d686fc0 call 7ff77d686d70 242->246 247 7ff77d68400a-7ff77d684027 PostMessageW GetMessageW 242->247 245->226 259 7ff77d683f23-7ff77d683f37 call 7ff77d6890c0 245->259 247->246 261 7ff77d683eea-7ff77d683ef4 call 7ff77d688940 251->261 262 7ff77d683e3a-7ff77d683e40 251->262 255 7ff77d683e1b-7ff77d683e23 252->255 256 7ff77d683e25-7ff77d683e27 252->256 255->256 256->251 271 7ff77d683f5c-7ff77d683f98 call 7ff77d688940 call 7ff77d6889e0 call 7ff77d686fc0 call 7ff77d686d70 call 7ff77d6888e0 259->271 272 7ff77d683f39-7ff77d683f56 PostMessageW GetMessageW 259->272 261->237 262->261 266 7ff77d683e46-7ff77d683e4c 262->266 269 7ff77d683e4e-7ff77d683e50 266->269 270 7ff77d683e57-7ff77d683e59 266->270 274 7ff77d683e52 269->274 275 7ff77d683e5f-7ff77d683e7b call 7ff77d686dc0 call 7ff77d687340 269->275 270->237 270->275 307 7ff77d683f9d-7ff77d683f9f 271->307 272->271 274->237 290 7ff77d683e7d-7ff77d683e84 275->290 291 7ff77d683e86-7ff77d683e8d 275->291 293 7ff77d683ed3-7ff77d683ee8 call 7ff77d682a50 call 7ff77d686fc0 call 7ff77d686d70 290->293 294 7ff77d683ea7-7ff77d683eb1 call 7ff77d6871b0 291->294 295 7ff77d683e8f-7ff77d683e9c call 7ff77d686e00 291->295 293->237 305 7ff77d683ebc-7ff77d683eca call 7ff77d6874f0 294->305 306 7ff77d683eb3-7ff77d683eba 294->306 295->294 304 7ff77d683e9e-7ff77d683ea5 295->304 304->293 305->237 318 7ff77d683ecc 305->318 306->293 310 7ff77d683fed-7ff77d683ffb call 7ff77d681900 307->310 311 7ff77d683fa1-7ff77d683fb7 call 7ff77d688ed0 call 7ff77d6888e0 307->311 310->226 311->310 323 7ff77d683fb9-7ff77d683fce 311->323 318->293 324 7ff77d683fe8 call 7ff77d682a50 323->324 325 7ff77d683fd0-7ff77d683fe3 call 7ff77d682710 call 7ff77d681900 323->325 324->310 325->226
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastModuleName
                        • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag$pyi-runtime-tmpdir
                        • API String ID: 2776309574-4232158417
                        • Opcode ID: 0521423bedf0c23ef4483b598af0ac91be45681437f26730e4199ade94993b9f
                        • Instruction ID: ebd3ec9b3ec3dca448e77d6bdf3460358655604b8587c5c124c62c269f785eff
                        • Opcode Fuzzy Hash: 0521423bedf0c23ef4483b598af0ac91be45681437f26730e4199ade94993b9f
                        • Instruction Fuzzy Hash: 86325B23E3C682D1EA15BB2594542BBA793AF957C0FC44236DA5DC3296FF2CE558C320

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 538 7ff77d6a6964-7ff77d6a69d7 call 7ff77d6a6698 541 7ff77d6a69f1-7ff77d6a69fb call 7ff77d698520 538->541 542 7ff77d6a69d9-7ff77d6a69e2 call 7ff77d694ee8 538->542 547 7ff77d6a6a16-7ff77d6a6a7f CreateFileW 541->547 548 7ff77d6a69fd-7ff77d6a6a14 call 7ff77d694ee8 call 7ff77d694f08 541->548 549 7ff77d6a69e5-7ff77d6a69ec call 7ff77d694f08 542->549 551 7ff77d6a6a81-7ff77d6a6a87 547->551 552 7ff77d6a6afc-7ff77d6a6b07 GetFileType 547->552 548->549 565 7ff77d6a6d32-7ff77d6a6d52 549->565 555 7ff77d6a6ac9-7ff77d6a6af7 GetLastError call 7ff77d694e7c 551->555 556 7ff77d6a6a89-7ff77d6a6a8d 551->556 558 7ff77d6a6b5a-7ff77d6a6b61 552->558 559 7ff77d6a6b09-7ff77d6a6b44 GetLastError call 7ff77d694e7c CloseHandle 552->559 555->549 556->555 563 7ff77d6a6a8f-7ff77d6a6ac7 CreateFileW 556->563 561 7ff77d6a6b63-7ff77d6a6b67 558->561 562 7ff77d6a6b69-7ff77d6a6b6c 558->562 559->549 572 7ff77d6a6b4a-7ff77d6a6b55 call 7ff77d694f08 559->572 568 7ff77d6a6b72-7ff77d6a6bc7 call 7ff77d698438 561->568 562->568 569 7ff77d6a6b6e 562->569 563->552 563->555 577 7ff77d6a6be6-7ff77d6a6c17 call 7ff77d6a6418 568->577 578 7ff77d6a6bc9-7ff77d6a6bd5 call 7ff77d6a68a0 568->578 569->568 572->549 583 7ff77d6a6c19-7ff77d6a6c1b 577->583 584 7ff77d6a6c1d-7ff77d6a6c5f 577->584 578->577 585 7ff77d6a6bd7 578->585 586 7ff77d6a6bd9-7ff77d6a6be1 call 7ff77d69aac0 583->586 587 7ff77d6a6c81-7ff77d6a6c8c 584->587 588 7ff77d6a6c61-7ff77d6a6c65 584->588 585->586 586->565 590 7ff77d6a6d30 587->590 591 7ff77d6a6c92-7ff77d6a6c96 587->591 588->587 589 7ff77d6a6c67-7ff77d6a6c7c 588->589 589->587 590->565 591->590 594 7ff77d6a6c9c-7ff77d6a6ce1 CloseHandle CreateFileW 591->594 595 7ff77d6a6ce3-7ff77d6a6d11 GetLastError call 7ff77d694e7c call 7ff77d698660 594->595 596 7ff77d6a6d16-7ff77d6a6d2b 594->596 595->596 596->590
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                        • String ID:
                        • API String ID: 1617910340-0
                        • Opcode ID: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                        • Instruction ID: 638d7e9c8017b22b817c77545fc0c9addb2e3502f45f0a0012853819baa71786
                        • Opcode Fuzzy Hash: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                        • Instruction Fuzzy Hash: 7DC1B233F38A4285EB10EFA9D4902AE7762F789BD8B414325DA5E97794EF38E411C310

                        Control-flow Graph

                        APIs
                        • FindFirstFileW.KERNELBASE(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D68842B
                        • RemoveDirectoryW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884AE
                        • DeleteFileW.KERNELBASE(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884CD
                        • FindNextFileW.KERNELBASE(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884DB
                        • FindClose.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884EC
                        • RemoveDirectoryW.KERNELBASE(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884F5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                        • String ID: %s\*
                        • API String ID: 1057558799-766152087
                        • Opcode ID: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                        • Instruction ID: c07d5cb395715dd410a49aadce718f7da0e29f8871393ed39e3004db75572869
                        • Opcode Fuzzy Hash: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                        • Instruction Fuzzy Hash: 3A410F23E3C642C5EA60AB64B4441BBA7A2FB98BD4FD00332E69DC2695FF3CD5458750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                        • Instruction ID: ef05c9abaec79f1baf501e12dc119f0554db9dea8a58efbf38667a894d5111d3
                        • Opcode Fuzzy Hash: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                        • Instruction Fuzzy Hash: 6AF08623E3C64186E7A09B64B49476BB751AB843A4F440336D9AD416D5EF3CD0588600

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 331 7ff77d681950-7ff77d68198b call 7ff77d6845c0 334 7ff77d681c4e-7ff77d681c72 call 7ff77d68c550 331->334 335 7ff77d681991-7ff77d6819d1 call 7ff77d687f90 331->335 340 7ff77d681c3b-7ff77d681c3e call 7ff77d69004c 335->340 341 7ff77d6819d7-7ff77d6819e7 call 7ff77d6906d4 335->341 345 7ff77d681c43-7ff77d681c4b 340->345 346 7ff77d6819e9-7ff77d681a03 call 7ff77d694f08 call 7ff77d682910 341->346 347 7ff77d681a08-7ff77d681a24 call 7ff77d69039c 341->347 345->334 346->340 352 7ff77d681a26-7ff77d681a40 call 7ff77d694f08 call 7ff77d682910 347->352 353 7ff77d681a45-7ff77d681a5a call 7ff77d694f28 347->353 352->340 361 7ff77d681a5c-7ff77d681a76 call 7ff77d694f08 call 7ff77d682910 353->361 362 7ff77d681a7b-7ff77d681afc call 7ff77d681c80 * 2 call 7ff77d6906d4 353->362 361->340 373 7ff77d681b01-7ff77d681b14 call 7ff77d694f44 362->373 376 7ff77d681b16-7ff77d681b30 call 7ff77d694f08 call 7ff77d682910 373->376 377 7ff77d681b35-7ff77d681b4e call 7ff77d69039c 373->377 376->340 382 7ff77d681b50-7ff77d681b6a call 7ff77d694f08 call 7ff77d682910 377->382 383 7ff77d681b6f-7ff77d681b8b call 7ff77d690110 377->383 382->340 391 7ff77d681b9e-7ff77d681bac 383->391 392 7ff77d681b8d-7ff77d681b99 call 7ff77d682710 383->392 391->340 395 7ff77d681bb2-7ff77d681bb9 391->395 392->340 397 7ff77d681bc1-7ff77d681bc7 395->397 398 7ff77d681bc9-7ff77d681bd6 397->398 399 7ff77d681be0-7ff77d681bef 397->399 400 7ff77d681bf1-7ff77d681bfa 398->400 399->399 399->400 401 7ff77d681bfc-7ff77d681bff 400->401 402 7ff77d681c0f 400->402 401->402 403 7ff77d681c01-7ff77d681c04 401->403 404 7ff77d681c11-7ff77d681c24 402->404 403->402 405 7ff77d681c06-7ff77d681c09 403->405 406 7ff77d681c2d-7ff77d681c39 404->406 407 7ff77d681c26 404->407 405->402 408 7ff77d681c0b-7ff77d681c0d 405->408 406->340 406->397 407->406 408->404
                        APIs
                          • Part of subcall function 00007FF77D687F90: _fread_nolock.LIBCMT ref: 00007FF77D68803A
                        • _fread_nolock.LIBCMT ref: 00007FF77D681A1B
                          • Part of subcall function 00007FF77D682910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF77D681B6A), ref: 00007FF77D68295E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _fread_nolock$CurrentProcess
                        • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                        • API String ID: 2397952137-3497178890
                        • Opcode ID: 75df882cb69919a76d97c614361eef51b2ec2ab8d5059f73c2ac4bb1c74e6529
                        • Instruction ID: 83922bc56829acc6bac01e1bf8f7adc290153d9d7fcf2b094e8aaa3f7ec5f98e
                        • Opcode Fuzzy Hash: 75df882cb69919a76d97c614361eef51b2ec2ab8d5059f73c2ac4bb1c74e6529
                        • Instruction Fuzzy Hash: 2C816272E3C686C5EB60AB14D0502BAA792EF887C4F844635D98DC7685FE3CE5858760

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 409 7ff77d681600-7ff77d681611 410 7ff77d681637-7ff77d681651 call 7ff77d6845c0 409->410 411 7ff77d681613-7ff77d68161c call 7ff77d681050 409->411 416 7ff77d681653-7ff77d681681 call 7ff77d694f08 call 7ff77d682910 410->416 417 7ff77d681682-7ff77d68169c call 7ff77d6845c0 410->417 418 7ff77d68162e-7ff77d681636 411->418 419 7ff77d68161e-7ff77d681629 call 7ff77d682710 411->419 426 7ff77d68169e-7ff77d6816b3 call 7ff77d682710 417->426 427 7ff77d6816b8-7ff77d6816cf call 7ff77d6906d4 417->427 419->418 433 7ff77d681821-7ff77d681824 call 7ff77d69004c 426->433 434 7ff77d6816f9-7ff77d6816fd 427->434 435 7ff77d6816d1-7ff77d6816f4 call 7ff77d694f08 call 7ff77d682910 427->435 443 7ff77d681829-7ff77d68183b 433->443 437 7ff77d681717-7ff77d681737 call 7ff77d694f44 434->437 438 7ff77d6816ff-7ff77d68170b call 7ff77d681210 434->438 448 7ff77d681819-7ff77d68181c call 7ff77d69004c 435->448 449 7ff77d681739-7ff77d68175c call 7ff77d694f08 call 7ff77d682910 437->449 450 7ff77d681761-7ff77d68176c 437->450 445 7ff77d681710-7ff77d681712 438->445 445->448 448->433 462 7ff77d68180f-7ff77d681814 449->462 451 7ff77d681802-7ff77d68180a call 7ff77d694f30 450->451 452 7ff77d681772-7ff77d681777 450->452 451->462 455 7ff77d681780-7ff77d6817a2 call 7ff77d69039c 452->455 464 7ff77d6817da-7ff77d6817e6 call 7ff77d694f08 455->464 465 7ff77d6817a4-7ff77d6817bc call 7ff77d690adc 455->465 462->448 470 7ff77d6817ed-7ff77d6817f8 call 7ff77d682910 464->470 471 7ff77d6817be-7ff77d6817c1 465->471 472 7ff77d6817c5-7ff77d6817d8 call 7ff77d694f08 465->472 477 7ff77d6817fd 470->477 471->455 474 7ff77d6817c3 471->474 472->470 474->477 477->451
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                        • API String ID: 2050909247-1550345328
                        • Opcode ID: d7e5a8d788c56064f5ee056adac7b7af7416d0cf868ad80b96a324f46d3978b4
                        • Instruction ID: 2d90dc93eb87c9af10278bff285bdb620f9fc7c968573217592183f3775d7416
                        • Opcode Fuzzy Hash: d7e5a8d788c56064f5ee056adac7b7af7416d0cf868ad80b96a324f46d3978b4
                        • Instruction Fuzzy Hash: D25166A2E3C64392EA10BB2594001BBA393BF947D4FC44735EE4D87696FE3CE5858320

                        Control-flow Graph

                        APIs
                        • GetTempPathW.KERNEL32(?,?,00000000,00007FF77D683CBB), ref: 00007FF77D688704
                        • GetCurrentProcessId.KERNEL32(?,00000000,00007FF77D683CBB), ref: 00007FF77D68870A
                        • CreateDirectoryW.KERNELBASE(?,00000000,00007FF77D683CBB), ref: 00007FF77D68874C
                          • Part of subcall function 00007FF77D688830: GetEnvironmentVariableW.KERNEL32(00007FF77D68388E), ref: 00007FF77D688867
                          • Part of subcall function 00007FF77D688830: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF77D688889
                          • Part of subcall function 00007FF77D698238: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D698251
                          • Part of subcall function 00007FF77D682810: MessageBoxW.USER32 ref: 00007FF77D6828EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Environment$CreateCurrentDirectoryExpandMessagePathProcessStringsTempVariable_invalid_parameter_noinfo
                        • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                        • API String ID: 3563477958-1339014028
                        • Opcode ID: 191653d34e5a06968e8282251bef030903df87164e49fe651f79a53b4d97858f
                        • Instruction ID: 50204aff8da51a422479435c137203fc0330067df22e64af5479c5e94f38ef68
                        • Opcode Fuzzy Hash: 191653d34e5a06968e8282251bef030903df87164e49fe651f79a53b4d97858f
                        • Instruction Fuzzy Hash: FF418E13E3D64284EA10B765A8552BB9393AF85BC4FC40336ED4EC769AFE3CE5018760

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 601 7ff77d681210-7ff77d68126d call 7ff77d68bd80 604 7ff77d681297-7ff77d6812af call 7ff77d694f44 601->604 605 7ff77d68126f-7ff77d681296 call 7ff77d682710 601->605 610 7ff77d6812d4-7ff77d6812e4 call 7ff77d694f44 604->610 611 7ff77d6812b1-7ff77d6812cf call 7ff77d694f08 call 7ff77d682910 604->611 616 7ff77d681309-7ff77d68131b 610->616 617 7ff77d6812e6-7ff77d681304 call 7ff77d694f08 call 7ff77d682910 610->617 624 7ff77d681439-7ff77d68144e call 7ff77d68ba60 call 7ff77d694f30 * 2 611->624 620 7ff77d681320-7ff77d681345 call 7ff77d69039c 616->620 617->624 630 7ff77d68134b-7ff77d681355 call 7ff77d690110 620->630 631 7ff77d681431 620->631 638 7ff77d681453-7ff77d68146d 624->638 630->631 637 7ff77d68135b-7ff77d681367 630->637 631->624 639 7ff77d681370-7ff77d681398 call 7ff77d68a1c0 637->639 642 7ff77d68139a-7ff77d68139d 639->642 643 7ff77d681416-7ff77d68142c call 7ff77d682710 639->643 644 7ff77d681411 642->644 645 7ff77d68139f-7ff77d6813a9 642->645 643->631 644->643 647 7ff77d6813ab-7ff77d6813b9 call 7ff77d690adc 645->647 648 7ff77d6813d4-7ff77d6813d7 645->648 652 7ff77d6813be-7ff77d6813c1 647->652 650 7ff77d6813ea-7ff77d6813ef 648->650 651 7ff77d6813d9-7ff77d6813e7 call 7ff77d6a9e30 648->651 650->639 654 7ff77d6813f5-7ff77d6813f8 650->654 651->650 655 7ff77d6813c3-7ff77d6813cd call 7ff77d690110 652->655 656 7ff77d6813cf-7ff77d6813d2 652->656 658 7ff77d68140c-7ff77d68140f 654->658 659 7ff77d6813fa-7ff77d6813fd 654->659 655->650 655->656 656->643 658->631 659->643 660 7ff77d6813ff-7ff77d681407 659->660 660->620
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                        • API String ID: 2050909247-2813020118
                        • Opcode ID: 8f2f3123d1cabff2ad8e3db6a95d4b235f7cad2490955ba460222a7cf36d71df
                        • Instruction ID: 6fc43e447a5e945ef554c006f7a8bc8e178cab03547c7e4315cf93f1e5f21b37
                        • Opcode Fuzzy Hash: 8f2f3123d1cabff2ad8e3db6a95d4b235f7cad2490955ba460222a7cf36d71df
                        • Instruction Fuzzy Hash: 8951BE63E3CA4281EA60BB15A4503BBA693BF857D4FC44235ED4D87799FE3CE5428720

                        Control-flow Graph

                        APIs
                        • FreeLibrary.KERNEL32(?,?,?,00007FF77D69F0AA,?,?,-00000018,00007FF77D69AD53,?,?,?,00007FF77D69AC4A,?,?,?,00007FF77D695F3E), ref: 00007FF77D69EE8C
                        • GetProcAddress.KERNEL32(?,?,?,00007FF77D69F0AA,?,?,-00000018,00007FF77D69AD53,?,?,?,00007FF77D69AC4A,?,?,?,00007FF77D695F3E), ref: 00007FF77D69EE98
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressFreeLibraryProc
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3013587201-537541572
                        • Opcode ID: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                        • Instruction ID: 3f419700d9c87f4cc518c828b84b93490e374cb9828bfc36d435b36294ff061f
                        • Opcode Fuzzy Hash: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                        • Instruction Fuzzy Hash: D041C127F3EA1281EA15AB169800577A293BF49BD0FD84639DD1DC7785FE3CE4098220

                        Control-flow Graph

                        APIs
                        • GetModuleFileNameW.KERNEL32(?,00007FF77D683804), ref: 00007FF77D6836E1
                        • GetLastError.KERNEL32(?,00007FF77D683804), ref: 00007FF77D6836EB
                          • Part of subcall function 00007FF77D682C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682C9E
                          • Part of subcall function 00007FF77D682C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682D63
                          • Part of subcall function 00007FF77D682C50: MessageBoxW.USER32 ref: 00007FF77D682D99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                        • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                        • API String ID: 3187769757-2863816727
                        • Opcode ID: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                        • Instruction ID: 2e476d2f6d941a74fd16b2d7717fb61c0f2e0d329c3e561c0342d00257dee15e
                        • Opcode Fuzzy Hash: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                        • Instruction Fuzzy Hash: 9E212162F3C642C1FA20B724E8152BB9252BF983D4FC04336D59EC66D5FE2CE5048724

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 746 7ff77d69ba5c-7ff77d69ba82 747 7ff77d69ba84-7ff77d69ba98 call 7ff77d694ee8 call 7ff77d694f08 746->747 748 7ff77d69ba9d-7ff77d69baa1 746->748 766 7ff77d69be8e 747->766 749 7ff77d69be77-7ff77d69be83 call 7ff77d694ee8 call 7ff77d694f08 748->749 750 7ff77d69baa7-7ff77d69baae 748->750 769 7ff77d69be89 call 7ff77d69a8e0 749->769 750->749 752 7ff77d69bab4-7ff77d69bae2 750->752 752->749 755 7ff77d69bae8-7ff77d69baef 752->755 758 7ff77d69baf1-7ff77d69bb03 call 7ff77d694ee8 call 7ff77d694f08 755->758 759 7ff77d69bb08-7ff77d69bb0b 755->759 758->769 764 7ff77d69bb11-7ff77d69bb17 759->764 765 7ff77d69be73-7ff77d69be75 759->765 764->765 770 7ff77d69bb1d-7ff77d69bb20 764->770 767 7ff77d69be91-7ff77d69bea8 765->767 766->767 769->766 770->758 773 7ff77d69bb22-7ff77d69bb47 770->773 775 7ff77d69bb7a-7ff77d69bb81 773->775 776 7ff77d69bb49-7ff77d69bb4b 773->776 777 7ff77d69bb83-7ff77d69bbab call 7ff77d69d5fc call 7ff77d69a948 * 2 775->777 778 7ff77d69bb56-7ff77d69bb6d call 7ff77d694ee8 call 7ff77d694f08 call 7ff77d69a8e0 775->778 779 7ff77d69bb72-7ff77d69bb78 776->779 780 7ff77d69bb4d-7ff77d69bb54 776->780 811 7ff77d69bbc8-7ff77d69bbf3 call 7ff77d69c284 777->811 812 7ff77d69bbad-7ff77d69bbc3 call 7ff77d694f08 call 7ff77d694ee8 777->812 808 7ff77d69bd00 778->808 781 7ff77d69bbf8-7ff77d69bc0f 779->781 780->778 780->779 785 7ff77d69bc11-7ff77d69bc19 781->785 786 7ff77d69bc8a-7ff77d69bc94 call 7ff77d6a391c 781->786 785->786 790 7ff77d69bc1b-7ff77d69bc1d 785->790 797 7ff77d69bc9a-7ff77d69bcaf 786->797 798 7ff77d69bd1e 786->798 790->786 794 7ff77d69bc1f-7ff77d69bc35 790->794 794->786 799 7ff77d69bc37-7ff77d69bc43 794->799 797->798 803 7ff77d69bcb1-7ff77d69bcc3 GetConsoleMode 797->803 801 7ff77d69bd23-7ff77d69bd43 ReadFile 798->801 799->786 804 7ff77d69bc45-7ff77d69bc47 799->804 806 7ff77d69bd49-7ff77d69bd51 801->806 807 7ff77d69be3d-7ff77d69be46 GetLastError 801->807 803->798 809 7ff77d69bcc5-7ff77d69bccd 803->809 804->786 810 7ff77d69bc49-7ff77d69bc61 804->810 806->807 813 7ff77d69bd57 806->813 816 7ff77d69be63-7ff77d69be66 807->816 817 7ff77d69be48-7ff77d69be5e call 7ff77d694f08 call 7ff77d694ee8 807->817 818 7ff77d69bd03-7ff77d69bd0d call 7ff77d69a948 808->818 809->801 815 7ff77d69bccf-7ff77d69bcf1 ReadConsoleW 809->815 810->786 819 7ff77d69bc63-7ff77d69bc6f 810->819 811->781 812->808 822 7ff77d69bd5e-7ff77d69bd73 813->822 824 7ff77d69bd12-7ff77d69bd1c 815->824 825 7ff77d69bcf3 GetLastError 815->825 829 7ff77d69bcf9-7ff77d69bcfb call 7ff77d694e7c 816->829 830 7ff77d69be6c-7ff77d69be6e 816->830 817->808 818->767 819->786 828 7ff77d69bc71-7ff77d69bc73 819->828 822->818 832 7ff77d69bd75-7ff77d69bd80 822->832 824->822 825->829 828->786 836 7ff77d69bc75-7ff77d69bc85 828->836 829->808 830->818 838 7ff77d69bd82-7ff77d69bd9b call 7ff77d69b674 832->838 839 7ff77d69bda7-7ff77d69bdaf 832->839 836->786 846 7ff77d69bda0-7ff77d69bda2 838->846 842 7ff77d69bdb1-7ff77d69bdc3 839->842 843 7ff77d69be2b-7ff77d69be38 call 7ff77d69b4b4 839->843 847 7ff77d69bdc5 842->847 848 7ff77d69be1e-7ff77d69be26 842->848 843->846 846->818 850 7ff77d69bdca-7ff77d69bdd1 847->850 848->818 851 7ff77d69bdd3-7ff77d69bdd7 850->851 852 7ff77d69be0d-7ff77d69be18 850->852 853 7ff77d69bdf3 851->853 854 7ff77d69bdd9-7ff77d69bde0 851->854 852->848 855 7ff77d69bdf9-7ff77d69be09 853->855 854->853 856 7ff77d69bde2-7ff77d69bde6 854->856 855->850 857 7ff77d69be0b 855->857 856->853 858 7ff77d69bde8-7ff77d69bdf1 856->858 857->848 858->855
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 1c0df5e74df0118619baac061aee596465bcef498cfc928fc9eaa168a483e3b3
                        • Instruction ID: 80d9848ce04a3ccc5ac468d0a5d3889eb111a81db3293cd5f5d8d96e5f846de3
                        • Opcode Fuzzy Hash: 1c0df5e74df0118619baac061aee596465bcef498cfc928fc9eaa168a483e3b3
                        • Instruction Fuzzy Hash: 21C1D523D3C68691E650AB1990802BFBF57FB81BC0F950379EA4D83395EE7CE4498721

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                        • String ID:
                        • API String ID: 995526605-0
                        • Opcode ID: 1c88e2159774aae00215e56fe2a2a719af09135261df6dbcfc7a62e4558c2eb4
                        • Instruction ID: 94258746bd98367c86d28a0d08f67c62ef3f8c4008dd103b7e33b55fc64fbf5b
                        • Opcode Fuzzy Hash: 1c88e2159774aae00215e56fe2a2a719af09135261df6dbcfc7a62e4558c2eb4
                        • Instruction Fuzzy Hash: CF21F422E2C64381EA50AB55B54423BE7A2EBC5BE4FD00335E6AD83AD5EE6CD8458710

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00007FF77D688570: GetCurrentProcess.KERNEL32 ref: 00007FF77D688590
                          • Part of subcall function 00007FF77D688570: OpenProcessToken.ADVAPI32 ref: 00007FF77D6885A3
                          • Part of subcall function 00007FF77D688570: GetTokenInformation.KERNELBASE ref: 00007FF77D6885C8
                          • Part of subcall function 00007FF77D688570: GetLastError.KERNEL32 ref: 00007FF77D6885D2
                          • Part of subcall function 00007FF77D688570: GetTokenInformation.KERNELBASE ref: 00007FF77D688612
                          • Part of subcall function 00007FF77D688570: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF77D68862E
                          • Part of subcall function 00007FF77D688570: CloseHandle.KERNEL32 ref: 00007FF77D688646
                        • LocalFree.KERNEL32(?,00007FF77D683C55), ref: 00007FF77D68916C
                        • LocalFree.KERNEL32(?,00007FF77D683C55), ref: 00007FF77D689175
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                        • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                        • API String ID: 6828938-1529539262
                        • Opcode ID: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                        • Instruction ID: 2dce878d88bfbae65d5177f2ef36d88d8a86a456530baf3d0837dc4e58a400d1
                        • Opcode Fuzzy Hash: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                        • Instruction Fuzzy Hash: E7211462E3C74181E650BB10E5152EBA262FB887C0FC44236EA8D93796FF3CE5458760

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 965 7ff77d69cf60-7ff77d69cf85 966 7ff77d69d253 965->966 967 7ff77d69cf8b-7ff77d69cf8e 965->967 968 7ff77d69d255-7ff77d69d265 966->968 969 7ff77d69cf90-7ff77d69cfc2 call 7ff77d69a814 967->969 970 7ff77d69cfc7-7ff77d69cff3 967->970 969->968 971 7ff77d69cff5-7ff77d69cffc 970->971 972 7ff77d69cffe-7ff77d69d004 970->972 971->969 971->972 974 7ff77d69d014-7ff77d69d029 call 7ff77d6a391c 972->974 975 7ff77d69d006-7ff77d69d00f call 7ff77d69c320 972->975 980 7ff77d69d02f-7ff77d69d038 974->980 981 7ff77d69d143-7ff77d69d14c 974->981 975->974 980->981 984 7ff77d69d03e-7ff77d69d042 980->984 982 7ff77d69d1a0-7ff77d69d1c5 WriteFile 981->982 983 7ff77d69d14e-7ff77d69d154 981->983 985 7ff77d69d1d0 982->985 986 7ff77d69d1c7-7ff77d69d1cd GetLastError 982->986 987 7ff77d69d156-7ff77d69d159 983->987 988 7ff77d69d18c-7ff77d69d19e call 7ff77d69ca18 983->988 989 7ff77d69d044-7ff77d69d04c call 7ff77d6947c0 984->989 990 7ff77d69d053-7ff77d69d05e 984->990 992 7ff77d69d1d3 985->992 986->985 993 7ff77d69d178-7ff77d69d18a call 7ff77d69cc38 987->993 994 7ff77d69d15b-7ff77d69d15e 987->994 1008 7ff77d69d130-7ff77d69d137 988->1008 989->990 996 7ff77d69d060-7ff77d69d069 990->996 997 7ff77d69d06f-7ff77d69d084 GetConsoleMode 990->997 1001 7ff77d69d1d8 992->1001 993->1008 1002 7ff77d69d1e4-7ff77d69d1ee 994->1002 1003 7ff77d69d164-7ff77d69d176 call 7ff77d69cb1c 994->1003 996->981 996->997 998 7ff77d69d08a-7ff77d69d090 997->998 999 7ff77d69d13c 997->999 1006 7ff77d69d096-7ff77d69d099 998->1006 1007 7ff77d69d119-7ff77d69d12b call 7ff77d69c5a0 998->1007 999->981 1009 7ff77d69d1dd 1001->1009 1010 7ff77d69d1f0-7ff77d69d1f5 1002->1010 1011 7ff77d69d24c-7ff77d69d251 1002->1011 1003->1008 1014 7ff77d69d0a4-7ff77d69d0b2 1006->1014 1015 7ff77d69d09b-7ff77d69d09e 1006->1015 1007->1008 1008->1001 1009->1002 1017 7ff77d69d223-7ff77d69d22d 1010->1017 1018 7ff77d69d1f7-7ff77d69d1fa 1010->1018 1011->968 1022 7ff77d69d110-7ff77d69d114 1014->1022 1023 7ff77d69d0b4 1014->1023 1015->1009 1015->1014 1020 7ff77d69d22f-7ff77d69d232 1017->1020 1021 7ff77d69d234-7ff77d69d243 1017->1021 1024 7ff77d69d213-7ff77d69d21e call 7ff77d694ec4 1018->1024 1025 7ff77d69d1fc-7ff77d69d20b 1018->1025 1020->966 1020->1021 1021->1011 1022->992 1026 7ff77d69d0b8-7ff77d69d0cf call 7ff77d6a39e8 1023->1026 1024->1017 1025->1024 1031 7ff77d69d0d1-7ff77d69d0dd 1026->1031 1032 7ff77d69d107-7ff77d69d10d GetLastError 1026->1032 1033 7ff77d69d0df-7ff77d69d0f1 call 7ff77d6a39e8 1031->1033 1034 7ff77d69d0fc-7ff77d69d103 1031->1034 1032->1022 1033->1032 1038 7ff77d69d0f3-7ff77d69d0fa 1033->1038 1034->1022 1036 7ff77d69d105 1034->1036 1036->1026 1038->1034
                        APIs
                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77D69CF4B), ref: 00007FF77D69D07C
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77D69CF4B), ref: 00007FF77D69D107
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ConsoleErrorLastMode
                        • String ID:
                        • API String ID: 953036326-0
                        • Opcode ID: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                        • Instruction ID: 196cbd5a16054765cac47f1e13bde620b678d246ddfc815946f20d7abc784894
                        • Opcode Fuzzy Hash: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                        • Instruction Fuzzy Hash: C691B423E3C65185F750AF65944427EABA3BB44BC8F98427DDF0E97694EE38D442CB20
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 1279662727-0
                        • Opcode ID: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                        • Instruction ID: ea7e72c7268e0419abb72c941a83c969c7be7a1269a0cadce512aafad17464ad
                        • Opcode Fuzzy Hash: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                        • Instruction Fuzzy Hash: A7419273D3C78183E610AB20951037AA662FB943E4F508339EA9C47AD5EF6CA5A08710
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 3251591375-0
                        • Opcode ID: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                        • Instruction ID: 914ca16ccf4346beff4d0740888d0e3adcdcd3908f1196b53007a2791beb6d9e
                        • Opcode Fuzzy Hash: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                        • Instruction Fuzzy Hash: 2E314A23E3C24385FA14BB6594212BBA6839F853C4FC55235EA4DC72D7FE2CA808C230
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 148d460979eed4a43ebbf671c65dc2dc638c0d89c9c01e8e00358d5495882c84
                        • Instruction ID: 34d50d27d36c7eb228f4ae2060e3627701440c600119799c8ca60bb6fb0ff0f3
                        • Opcode Fuzzy Hash: 148d460979eed4a43ebbf671c65dc2dc638c0d89c9c01e8e00358d5495882c84
                        • Instruction Fuzzy Hash: 11D09E12F3C74642EB183F755C5507E965BAF88781F94267DC84BC6393FD2CA8494320
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                        • Instruction ID: 21c0bdc59a7a93c0742b9ae98d83d451d752be6ea68830a80dd56eb435c3a41b
                        • Opcode Fuzzy Hash: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                        • Instruction Fuzzy Hash: F451D823F3D24286E764BA65940067BA793AF84BE4F984778DD6DD37C9EE3CD4018620
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                        • Instruction ID: fe1c6438bf410d08f137c0ca01d62abe3ad886dae487efa23d711f97814a878c
                        • Opcode Fuzzy Hash: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                        • Instruction Fuzzy Hash: A811B662A3CA4181DA209B15B85417AB753AB45FF4F944335EE7D877D5EE3CD0118704
                        APIs
                        • RtlFreeHeap.NTDLL(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                        • GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: 46e6024f15a2f57ad5ff64688e0fe3cec5898f8577aba2f63b046adc8766ef53
                        • Instruction ID: 8258ee10993d3adc20218761088cb686075471faba7fe16b1b70ea7f96ab12c9
                        • Opcode Fuzzy Hash: 46e6024f15a2f57ad5ff64688e0fe3cec5898f8577aba2f63b046adc8766ef53
                        • Instruction Fuzzy Hash: D5E04F12E3D20242FE147BB1A45513B96936FD4780FC50278C84DC22A1FE2CA8418230
                        APIs
                        • CloseHandle.KERNELBASE(?,?,?,00007FF77D69A9D5,?,?,00000000,00007FF77D69AA8A), ref: 00007FF77D69ABC6
                        • GetLastError.KERNEL32(?,?,?,00007FF77D69A9D5,?,?,00000000,00007FF77D69AA8A), ref: 00007FF77D69ABD0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                        • Instruction ID: e2ad6391bf9841f06cbde35e8cc9902471aad44a92eb800acae98f259ce72047
                        • Opcode Fuzzy Hash: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                        • Instruction Fuzzy Hash: 8A219252F3C68241EAA07751959037FA6C39F84BE4F8443BDE96ECB7D5EE6CE4414220
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                        • Instruction ID: 1341a35870d3daf0a261345285948970b17c3c62fb942517886956d6244abe96
                        • Opcode Fuzzy Hash: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                        • Instruction Fuzzy Hash: C541A833D3C24187EA24AB19A58017AB7A3EB55BC0F500379D68EC36D5EF6CE402CB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _fread_nolock
                        • String ID:
                        • API String ID: 840049012-0
                        • Opcode ID: 7026eb3b68f3585a2f5768ea15c5ca7bda34a28a3ae4cdbb6486ed2f903c9d01
                        • Instruction ID: 95eef0b9fb9ae0f7f0e94ee4543e26550f4de6ba46678be69ddfdd3d6290369d
                        • Opcode Fuzzy Hash: 7026eb3b68f3585a2f5768ea15c5ca7bda34a28a3ae4cdbb6486ed2f903c9d01
                        • Instruction Fuzzy Hash: D6216F22F7C69286EA50BA2269043BBD752BF45FC4FC84535EE0D9B786EE7DE0418210
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                        • Instruction ID: 3e39e0dda8aef983554fb3a1958000068eba41bd1e8be829d58bd4f8ac2e56f6
                        • Opcode Fuzzy Hash: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                        • Instruction Fuzzy Hash: 3E317423E3C60285E6117B69948137EAA53AF95BE0FC10379D91D833D2EE7CE4418735
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: HandleModule$AddressFreeLibraryProc
                        • String ID:
                        • API String ID: 3947729631-0
                        • Opcode ID: 42808d7c08696a35870eb95595f0ae95ff90971c005bfc8769c42bb91e99b0de
                        • Instruction ID: 27d2d722566f3883fccce894ffa33606881ef06c02cb5dc04ad4876933af58f1
                        • Opcode Fuzzy Hash: 42808d7c08696a35870eb95595f0ae95ff90971c005bfc8769c42bb91e99b0de
                        • Instruction Fuzzy Hash: 31219C72E2874589EB24AF74C4802BD33AAEB04358F84163BE75C86A85FF38D444C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                        • Instruction ID: 136951fb9509d705491368f8ee86a25d4afcc9f1a3e8ff0f38ff872a8c37cef5
                        • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                        • Instruction Fuzzy Hash: 27113333E3D64281EA60BF11940017BE667AF85BD4F844679EA8C97A9DEF3DE4015720
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                        • Instruction ID: d1bb41677979dd9643b95bed57c614ae39378a41c57e0cf896c9ca7ba700f38e
                        • Opcode Fuzzy Hash: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                        • Instruction Fuzzy Hash: D821A473A3CA4286DB60AF58D44037AB6A2FBD4B94F944334E69D876D5EF3CD4018B10
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                        • Instruction ID: 027e05393a801b3cf4312072a579ee1b0245e3008372fa877798353260f46892
                        • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                        • Instruction Fuzzy Hash: F8017022E3C74180E644BB52990007AE793AB95FE0F884775EE5CA3BDAEE3CD4118310
                        APIs
                        • HeapAlloc.KERNEL32(?,?,?,00007FF77D690C90,?,?,?,00007FF77D6922FA,?,?,?,?,?,00007FF77D693AE9), ref: 00007FF77D69D63A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                        • Instruction ID: e83b0a8adcd1f60e09fa382d63607825a85069ea51ee0710c564be3489a39218
                        • Opcode Fuzzy Hash: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                        • Instruction Fuzzy Hash: 83F03A26E7D20240FE547BA1585527692934FC47E0F8C0778DA2EC62C2FD2CA4808930
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressErrorLastProc
                        • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                        • API String ID: 199729137-3427451314
                        • Opcode ID: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                        • Instruction ID: e2cd111523718ad98217b7b84b7b650eb24fd88aca6d7889f8e3b3a670434045
                        • Opcode Fuzzy Hash: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                        • Instruction Fuzzy Hash: 8E02B762D3DB07D1EA14BB59A8105B7A7A3AF857C5FC41331D5AE82260FF7CB5898230
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 808467561-2761157908
                        • Opcode ID: 7da0388417e7c773b0aab48e07e342724827a26e5879d16e5decf6c79e081c8c
                        • Instruction ID: 912fa5254f2ac2e412f21aac711455c26aa4b3eda1bb4e564218feb1da57dfaa
                        • Opcode Fuzzy Hash: 7da0388417e7c773b0aab48e07e342724827a26e5879d16e5decf6c79e081c8c
                        • Instruction Fuzzy Hash: 3DB2B973E3C2924AE7649E64D9407FEB7A2FB943C4F905235DA4D97A84EB38B900C750
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                        • API String ID: 0-2665694366
                        • Opcode ID: 14409f6b5173d9f28888b9fb9c68bcc2b54b8e7def706e6c40ef53002486e1ba
                        • Instruction ID: b722a574c1ea8e41aca58d827f9f0692a23592c5729ebf8348da7c3c7f8994ad
                        • Opcode Fuzzy Hash: 14409f6b5173d9f28888b9fb9c68bcc2b54b8e7def706e6c40ef53002486e1ba
                        • Instruction Fuzzy Hash: 0D52D573E386A587D7A49F14D558B7E7BAAFB44380F414239EA4A87780EB3CD844CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 3140674995-0
                        • Opcode ID: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                        • Instruction ID: 7d1036c6c82a6052f7ed7e1c180a54b758027f9c70dad95328147599a9ae7eed
                        • Opcode Fuzzy Hash: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                        • Instruction Fuzzy Hash: C3311273A28B8185EB60DF64E8503EE6765FB84744F44413ADB8D87B94EF38D548C720
                        APIs
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5C45
                          • Part of subcall function 00007FF77D6A5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55AC
                          • Part of subcall function 00007FF77D69A948: RtlFreeHeap.NTDLL(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                          • Part of subcall function 00007FF77D69A900: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF77D69A8DF,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69A909
                          • Part of subcall function 00007FF77D69A900: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF77D69A8DF,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69A92E
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5C34
                          • Part of subcall function 00007FF77D6A55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A560C
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EAA
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EBB
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5ECC
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF77D6A610C), ref: 00007FF77D6A5EF3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                        • String ID:
                        • API String ID: 4070488512-0
                        • Opcode ID: c8e181fbda5929fcc8f6a75e148055e791a7ddaa32984997676ab034941af52a
                        • Instruction ID: 84a1d99538c7b729871c4fd621ae15e0faac0752d833767e992d1e87c2e3ead1
                        • Opcode Fuzzy Hash: c8e181fbda5929fcc8f6a75e148055e791a7ddaa32984997676ab034941af52a
                        • Instruction Fuzzy Hash: E0D18F33E3C25245E724FF2595411BAA792EB947C4FC48236EA8D87A99FF3CE4418760
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                        • String ID:
                        • API String ID: 1239891234-0
                        • Opcode ID: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                        • Instruction ID: 2168f0251e0edc82cf9c3ff9d270d03f838ae3f58a0b4a548375ef2d03e2967c
                        • Opcode Fuzzy Hash: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                        • Instruction Fuzzy Hash: D6317437A28B8185DB60DB24E8402BF77A5FB84798F940236EA9D83B55EF3CC155CB10
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFindFirst_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 2227656907-0
                        • Opcode ID: ee5daded1920a45b930385d49f4c9fb7106de6f00b6358014c2482279c1420ad
                        • Instruction ID: 125be0b080765887eaaac8652f811729fe6dc44776966959b9e78c55322146d3
                        • Opcode Fuzzy Hash: ee5daded1920a45b930385d49f4c9fb7106de6f00b6358014c2482279c1420ad
                        • Instruction Fuzzy Hash: 38B1A963F3C69641EA61AB2195001BBE392EB94BE4F845236DADD87785FF3CE441C320
                        APIs
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EAA
                          • Part of subcall function 00007FF77D6A55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A560C
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EBB
                          • Part of subcall function 00007FF77D6A5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55AC
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5ECC
                          • Part of subcall function 00007FF77D6A55C8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55DC
                          • Part of subcall function 00007FF77D69A948: RtlFreeHeap.NTDLL(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF77D6A610C), ref: 00007FF77D6A5EF3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 3458911817-0
                        • Opcode ID: 6f2171165b001c2744b9d494c76d2a7753c36df5ed5d67f3075860c83c0dbe14
                        • Instruction ID: b288ef16ba4581bc56b0ebfd55469ac10e8c2754b8a98275d16c27a205f8ae34
                        • Opcode Fuzzy Hash: 6f2171165b001c2744b9d494c76d2a7753c36df5ed5d67f3075860c83c0dbe14
                        • Instruction Fuzzy Hash: D6513033E3C64286E710FF25D5815AAE762BB987C4F804236EA8DC7695EF3CE4418760
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                        • Instruction ID: 14a8499e14123beba902dd89f1c22f41f4dd9097b921d8cf51a00b565be52fc5
                        • Opcode Fuzzy Hash: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                        • Instruction Fuzzy Hash: 09111F26B28B0589EB00DF64E8542BA73B4F759798F440E31DA6D86764EF78D1548350
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: memcpy_s
                        • String ID:
                        • API String ID: 1502251526-0
                        • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                        • Instruction ID: d25fbc313e9eb53404c1c9a001f91f18a5715038422c1878ef179c7271dc71b6
                        • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                        • Instruction Fuzzy Hash: 41C1B073A3C68687D7249F55E04466AF792F784B84F858235DB8E83744EF3DE8058B40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: $header crc mismatch$unknown header flags set
                        • API String ID: 0-1127688429
                        • Opcode ID: e32b299fc273864699ec3bddfbf8fc958dab4a7742ffdf8f0166f3b43fcc42d1
                        • Instruction ID: e64f71d1c55cb5227cd3e1608f259aa6e4ac6001c33279031de3216b302a954e
                        • Opcode Fuzzy Hash: e32b299fc273864699ec3bddfbf8fc958dab4a7742ffdf8f0166f3b43fcc42d1
                        • Instruction Fuzzy Hash: DBF19473E3C3C58BE7A5AB14C188A3BBAAAEF44784F454634DE4987790EB38E541C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionRaise_clrfp
                        • String ID:
                        • API String ID: 15204871-0
                        • Opcode ID: a4cc0e8a2f7e024105bf8074fef1866164229a93701b52dcf00f6f20498becf3
                        • Instruction ID: a0bfba8f3c0bb4cde7997d7ebcf05b6bb4503127710c1d60a7e52e8500a4730d
                        • Opcode Fuzzy Hash: a4cc0e8a2f7e024105bf8074fef1866164229a93701b52dcf00f6f20498becf3
                        • Instruction Fuzzy Hash: A3B1B373A24B848BE715CF29C84536D77E1F780B88F688922DB9D877A4DB39D451C710
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: $
                        • API String ID: 0-227171996
                        • Opcode ID: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
                        • Instruction ID: bac39b7171496ea23e6ee26e7ec05bd1f80118255af16b9213e168169ea02850
                        • Opcode Fuzzy Hash: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
                        • Instruction Fuzzy Hash: D4E1B573E3C64281DB64AE15815013EB3A3EF45BC8F94537DDA0E87694EF2AE856C710
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: incorrect header check$invalid window size
                        • API String ID: 0-900081337
                        • Opcode ID: e8ec78490181e4ccec650f854842bb3e08bcfae3bf2db5596c2af0d8e2ff5899
                        • Instruction ID: 11e2dcd2c68ae0a359083519b61e4965d8e7a984ebff72165b9e2fad7bc8f73f
                        • Opcode Fuzzy Hash: e8ec78490181e4ccec650f854842bb3e08bcfae3bf2db5596c2af0d8e2ff5899
                        • Instruction Fuzzy Hash: F4919A73E3C2C5C7E7A49E18C558A3F7AAAFB45390F514239DA4AC6790EB38E540CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: e+000$gfff
                        • API String ID: 0-3030954782
                        • Opcode ID: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
                        • Instruction ID: aec1cdcb7c2a294b89923f657d5f3370f40ce60cf30ba618ef61bf4a58a2389e
                        • Opcode Fuzzy Hash: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
                        • Instruction Fuzzy Hash: 64514627F3C2C146E7249E35980577AAB93E744BD4F888379CB9887AC6EE3DD4008710
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentFeaturePresentProcessProcessor
                        • String ID:
                        • API String ID: 1010374628-0
                        • Opcode ID: 237fa8d459c5d11eae1bba494416b753c006fbba9c027a8b8839988129060696
                        • Instruction ID: 516078e5ecaec83d4c9e5f7f43e77dc014de633a4e6fac6369469cd3fa18432e
                        • Opcode Fuzzy Hash: 237fa8d459c5d11eae1bba494416b753c006fbba9c027a8b8839988129060696
                        • Instruction Fuzzy Hash: 1A027E23E3D65241FB65BB21950027BA683AF95BE0FC54735DDADE62D6FE3CA4018320
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID: gfffffff
                        • API String ID: 0-1523873471
                        • Opcode ID: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                        • Instruction ID: 47efe2bb04f2a36297dbaae06486cd3d9f235eda863aef8a8e3d81aac1900128
                        • Opcode Fuzzy Hash: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                        • Instruction Fuzzy Hash: FCA14763E2C78586EB21DF25A0047BAB797AB50BC4F488276DB4D87785EE3DD406CB10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: TMP
                        • API String ID: 3215553584-3125297090
                        • Opcode ID: 09cdd7cf7fc9e7e425d724a32e8c9d3bd5c12dba7606eca5b930980d9b4d1239
                        • Instruction ID: 1bbcfd67540072279ba8c5cf1633a1d35bd36794e6d47e1ab30a6f5124792ead
                        • Opcode Fuzzy Hash: 09cdd7cf7fc9e7e425d724a32e8c9d3bd5c12dba7606eca5b930980d9b4d1239
                        • Instruction Fuzzy Hash: 91518B83F3C65241EA68BA265A0117BD3936F94FD4F884679DE5EC7796FE3CE4024220
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 1f9e0516fd534d967cb731c121838b59470578846d262458ea046ba55ab40ebf
                        • Instruction ID: 626926095de90d8603c66662d075983c9e3460b0ed6cf9609d95965a276da719
                        • Opcode Fuzzy Hash: 1f9e0516fd534d967cb731c121838b59470578846d262458ea046ba55ab40ebf
                        • Instruction Fuzzy Hash: DBB09B11E3B701C1ED0477155C8221556557F44740FD40235C05C80330ED2C24E55710
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5eca4e5ff3e7205525bf20f3b63783aa462e3e7adb0228d62bb7e98ab9f5e9bb
                        • Instruction ID: 64b6f3cd419dc563dc59f87ed0f4d1212fa003ba8de331c06123c9fb78744510
                        • Opcode Fuzzy Hash: 5eca4e5ff3e7205525bf20f3b63783aa462e3e7adb0228d62bb7e98ab9f5e9bb
                        • Instruction Fuzzy Hash: 5ED1B573E3C64245EB68AA25854027FA6A3EB05BC8F94037DCE0D87795EF39E845C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e75d751cc15dfd510e55d83c6141b0e8cb11d18cbed01e0c543b372a0114c593
                        • Instruction ID: b5809044f38a3583a90a478bc8b1b4da625af30407de518c9fff8c5ca241db4a
                        • Opcode Fuzzy Hash: e75d751cc15dfd510e55d83c6141b0e8cb11d18cbed01e0c543b372a0114c593
                        • Instruction Fuzzy Hash: DDC1AD726281E08BD28AEB29E46947A73E1F78934DBD5406BEF8747785C73CA414DB20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
                        • Instruction ID: ce69a63b2fcbfa9afe79f9d881fd096ae6071dd7623ccc2d76a102f9ee00e38c
                        • Opcode Fuzzy Hash: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
                        • Instruction Fuzzy Hash: F7B1BD73D3C64585E7649F28C08013EBBA3E709B88FE60279CA4E83398EF29D445C764
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
                        • Instruction ID: a7b9ef6ea967d17abf82f5356a50e0d1c447e5240800b4f2db64d57f4bbd2159
                        • Opcode Fuzzy Hash: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
                        • Instruction Fuzzy Hash: C481E177E3D28146EA649B19944037BAA93FB457D0F844339EA8D87B86EE3DE0008B10
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 403f67b08c5d8b9127b9d27d37b93e2a1e0a746a19683c5483168a42cc689f1f
                        • Instruction ID: 7a960bd1108f79ab80dfd8ccb4f464c62e456d6f53c9e55f338e3f4eeef3433f
                        • Opcode Fuzzy Hash: 403f67b08c5d8b9127b9d27d37b93e2a1e0a746a19683c5483168a42cc689f1f
                        • Instruction Fuzzy Hash: 1861EB23E3C95246F764A6A8905067ED583EF817E0F944339D69DC26D5FE6DE8008720
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                        • Instruction ID: bc652c820a445fab73090d70a7020464a0935160af26845c8c76e0c50ce1471f
                        • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                        • Instruction Fuzzy Hash: B851B7B7E3C65185E7249B19C04023A73A3EB45B98F744275CA4D87794DB3EE847C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                        • Instruction ID: 7ff963e1d7daa37137741492d1baec0cf802322f453defbc43ca5337987538e8
                        • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                        • Instruction Fuzzy Hash: DF519537E3C65181E7249B29C44023A73A3EB59B98FE54279CB4C87794EB3AE853C750
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                        • Instruction ID: 018c035b3df0932ff2cfd873333bf4af2d15986e6fbd67d19bb7087a9459f53c
                        • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                        • Instruction Fuzzy Hash: E25185B7E3C65189E7249B29C04023963A3EB54B98F744275CA8D97794EB3EEC43C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                        • Instruction ID: 304daeef299834581bc759e3f8f378b6907cfd41998a5366cf199f8c2315523e
                        • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                        • Instruction Fuzzy Hash: 2051F877E3C65585E7249B29C04033A73A3EB48B98FA54275CE4C87799DB3AE843C750
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                        • Instruction ID: 9900171e1cc1cd2a4dd74116b38dd3934732de43766b3eee5d9b7172c4cb9d16
                        • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                        • Instruction Fuzzy Hash: 2A51C677E3C65189E7249B29C14023A63A3EB54B98F744275DE4C87794EB3EE843C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                        • Instruction ID: a0075a9701050275316995b5d1eb8be82ff64c6b4c1e008007891d23d0819df0
                        • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                        • Instruction Fuzzy Hash: AC51B7B7E3C65189E7249B18C04023967A3EB45B98F744275CE4C97798EB3EE843C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                        • Instruction ID: e31ebd090da83b02917ab8d631684ba592630bbfd45f687bae9d17fcc6f3e36a
                        • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                        • Instruction Fuzzy Hash: 20419473C3D78A05ED95D91845046769A839F227E0F9813FCDD9D973CBE90E654EC120
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: 1c7003d4bfacf113f63307708dabd17e5ede6cda44dccf6aa27d02a6b9ea0481
                        • Instruction ID: a01cf79d697a2804a0fc77336b066cff1161cb6d007709a61a07a09736724b21
                        • Opcode Fuzzy Hash: 1c7003d4bfacf113f63307708dabd17e5ede6cda44dccf6aa27d02a6b9ea0481
                        • Instruction Fuzzy Hash: 7D41D423B38A5582EF04DF2ADA1457AA3A2B748FD0B999537DE4DD7B58EE3DD0418300
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 12404f4f4f1323fea4d4e583727f71dd7b5a0d93f2e51056eadc76cf5c92dd81
                        • Instruction ID: d0bb73289c56f4d7f01c22fb9d05403c733ef86304c79e1cb711848325bd4842
                        • Opcode Fuzzy Hash: 12404f4f4f1323fea4d4e583727f71dd7b5a0d93f2e51056eadc76cf5c92dd81
                        • Instruction Fuzzy Hash: 9731A273A3DB4241E764AB25A44017EA6D7AB85BD0F54433CEA9D93B95EF3CD0028714
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
                        • Instruction ID: ce96b4e79149a88492b647cfaaabf469f045715af843cb18f136b63b9f15fd92
                        • Opcode Fuzzy Hash: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
                        • Instruction Fuzzy Hash: 93F04472B382A58ADB98AF6DB84262A77D1F7483C0F908239D58DC3B14EA3C90518F14
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c3909751b2697c6481bc0460501d6177e5cf72f77169ad8285d6e0cd944102a
                        • Instruction ID: d9f5151ef415bf2dced9d0db38f648036bb5db902808a1d9d7adeafe29df196b
                        • Opcode Fuzzy Hash: 3c3909751b2697c6481bc0460501d6177e5cf72f77169ad8285d6e0cd944102a
                        • Instruction Fuzzy Hash: E6A00122D3C80AD5E644AB04A8A04B6A622FB99385BC40232E15D910A0AF2CA4049760
                        APIs
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685840
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685852
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685889
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68589B
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858B4
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858C6
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858DF
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858F1
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68590D
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68591F
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68593B
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68594D
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685969
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68597B
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685997
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859A9
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859C5
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressErrorLastProc
                        • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                        • API String ID: 199729137-653951865
                        • Opcode ID: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                        • Instruction ID: 79a2aa684798d68db572ee7fe86d9353dcc48203dacf02854a67bea2127dd6c7
                        • Opcode Fuzzy Hash: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                        • Instruction Fuzzy Hash: 90229266E3DB17D1FA05BB69A814577A7A2AF847C1BC51336C49E82364FF3CB5488230
                        APIs
                          • Part of subcall function 00007FF77D689390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF77D6845F4,00000000,00007FF77D681985), ref: 00007FF77D6893C9
                        • ExpandEnvironmentStringsW.KERNEL32(?,00007FF77D6886B7,?,?,00000000,00007FF77D683CBB), ref: 00007FF77D68822C
                          • Part of subcall function 00007FF77D682810: MessageBoxW.USER32 ref: 00007FF77D6828EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                        • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                        • API String ID: 1662231829-930877121
                        • Opcode ID: 9187bed43bf71c5340eadf58a1920dd2feb36a2730cc38c17813087cef3183ed
                        • Instruction ID: 13f5c94b32422a94e6a83ed4de74b14c0ac98d3864a61f303e0d215e65f1d957
                        • Opcode Fuzzy Hash: 9187bed43bf71c5340eadf58a1920dd2feb36a2730cc38c17813087cef3183ed
                        • Instruction Fuzzy Hash: E7514113E3C642C1EA50FB65A8516BBE393AF94BC0FC44636D64EC26D5FE2CE5058760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                        • String ID: P%
                        • API String ID: 2147705588-2959514604
                        • Opcode ID: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                        • Instruction ID: 324a2019fd3fd77a4f37da7bbf7c37a1025943420115d161faca1770fff69cc4
                        • Opcode Fuzzy Hash: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                        • Instruction Fuzzy Hash: E751CC265287A186D6349F25E4181BBFBA2F7987A1F404135DFDE83654EF3CD045D720
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: LongWindow$BlockCreateErrorLastReasonShutdown
                        • String ID: Needs to remove its temporary files.
                        • API String ID: 3975851968-2863640275
                        • Opcode ID: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                        • Instruction ID: 8f05c8cd3f3a5116c4117493b49271758d2e5c89a6cadda8ec4540b80e3b5054
                        • Opcode Fuzzy Hash: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                        • Instruction Fuzzy Hash: D7215522E3CA43C1E641AB79F84416AA752EF85FD1F984331DA5DC3394FE2CD5558220
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: -$:$f$p$p
                        • API String ID: 3215553584-2013873522
                        • Opcode ID: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                        • Instruction ID: d9aab633c8f04de42bd4728b457c556a7bdbb2263cd69309181dd9a70507b33f
                        • Opcode Fuzzy Hash: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                        • Instruction Fuzzy Hash: 48127273E3C34386FB247A94D25427BB693EB50794FC44279E689876C4EB3CE5809B21
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: f$f$p$p$f
                        • API String ID: 3215553584-1325933183
                        • Opcode ID: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                        • Instruction ID: 1fc66d006c6cbfe357807823516de38c13e5d618623b1bb0c58bbff24acb8589
                        • Opcode Fuzzy Hash: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                        • Instruction Fuzzy Hash: 571252A3E3C5438AFB207A15D05467BB6A3FB407D4FE44279D699866C4EB7CE5408B30
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                        • API String ID: 2050909247-3659356012
                        • Opcode ID: bdb51f189eec0aae26590c8a1b92bbb562030306dab734aaada4990c27a5542a
                        • Instruction ID: 01ad64ff8b063d00765917566a35483823c59f4bff9c8d3f0c7078e534128e88
                        • Opcode Fuzzy Hash: bdb51f189eec0aae26590c8a1b92bbb562030306dab734aaada4990c27a5542a
                        • Instruction Fuzzy Hash: 70415C63E3C65285EA10FB16A8006BBE797BB84BC4FC44631ED8C87785EE3CE5458320
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                        • API String ID: 2050909247-3659356012
                        • Opcode ID: a8e221c47165c0dbec1a7dc4007f346f16716469ebf4d834264a8452580f1fe3
                        • Instruction ID: 1c993f77c24be8577f77987fd2f93e51290cf9efd07bd9fdbf9392e402d31871
                        • Opcode Fuzzy Hash: a8e221c47165c0dbec1a7dc4007f346f16716469ebf4d834264a8452580f1fe3
                        • Instruction Fuzzy Hash: D1417EA3E3C64285EB10EB2194105BAE392BF847D4FC44A32ED4D87A99FE3CE5418725
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                        • Instruction ID: 3513ea4b6d242e8808e2c46404d92e596a2edcbc03762cb966261ad0d9c977c0
                        • Opcode Fuzzy Hash: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                        • Instruction Fuzzy Hash: FFD18E27E2C741CAEB20AB2494403AEA7A1FB557D8F900235DE4D97B96EF3DE494C710
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682C9E
                        • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682D63
                        • MessageBoxW.USER32 ref: 00007FF77D682D99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$CurrentFormatProcess
                        • String ID: %ls: $<FormatMessageW failed.>$Error$[PYI-%d:ERROR]
                        • API String ID: 3940978338-251083826
                        • Opcode ID: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                        • Instruction ID: 537b623d01a84f08960f518e141ccaae2c50135e1e60a1aeec94eae88f1fe8c7
                        • Opcode Fuzzy Hash: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                        • Instruction Fuzzy Hash: 8531B863B2C64192E620B715A8106ABA693BB887D4F810235EF4E93759EF3CD546C310
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD4D
                        • GetLastError.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD5B
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD85
                        • FreeLibrary.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DDF3
                        • GetProcAddress.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DDFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProc
                        • String ID: api-ms-
                        • API String ID: 2559590344-2084034818
                        • Opcode ID: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                        • Instruction ID: 1fb76656279d9900e4032762bbedfd79774d37c0b2462908baf8b221a47c4ba4
                        • Opcode Fuzzy Hash: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                        • Instruction Fuzzy Hash: C9318F23F3E642D5EE11AB1694005AAA7D6FF48BE4F994635DE1D86380FE3CE4488730
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                        • API String ID: 2050909247-2434346643
                        • Opcode ID: 2df6df0904ecf2e68063807813f252f2c523520ae69ca8fe89000ee1ae80a761
                        • Instruction ID: e930acdb83edfe63373f6dbed40ed639e00ecd0f7df7aa3d1f0f0edfdebd16b6
                        • Opcode Fuzzy Hash: 2df6df0904ecf2e68063807813f252f2c523520ae69ca8fe89000ee1ae80a761
                        • Instruction Fuzzy Hash: D0412932E3C686D1EA15EB60E4542EAA352FB943C4FC04232DA9D83695FF3CE559C760
                        APIs
                        • GetCurrentProcessId.KERNEL32(00000000,?,?,?,00000000,00007FF77D68351A,?,00000000,00007FF77D683F1B), ref: 00007FF77D682AA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: 0$WARNING$Warning$Warning [ANSI Fallback]$[PYI-%d:%s]
                        • API String ID: 2050909247-2900015858
                        • Opcode ID: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                        • Instruction ID: 1b3b05edfa342a6c7f06649f5716d58dd1f984ecc9c62e1f30ffa5f348c703cd
                        • Opcode Fuzzy Hash: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                        • Instruction Fuzzy Hash: 9A217173A3C78192E620AB55B8417E7A795FB887C4F800236EE8D93659EF3CD245C650
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 12f476f87c8743e70c8b210e20a22f1b01636e2fed05d2f1e0a082253e023e8e
                        • Instruction ID: 174cf1dcc9d109f80b6433a43d60c4efc33aa519a9ace5c3c236834d7e1bb264
                        • Opcode Fuzzy Hash: 12f476f87c8743e70c8b210e20a22f1b01636e2fed05d2f1e0a082253e023e8e
                        • Instruction Fuzzy Hash: AD214F26E3C24241F9587729669113BE6835F447F0F94477CE97EC7AC6FD2CA4408320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                        • Instruction ID: 93fa2b00c20efc0f7774d803c743df272006ca24b00337319647b22d24ae8da6
                        • Opcode Fuzzy Hash: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                        • Instruction Fuzzy Hash: D9118422E3CA4186E750AB16F85433AA7A1FB88BE4F500334D99DC7794EF3CD8148750
                        APIs
                        • GetCurrentProcess.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688EFD
                        • K32EnumProcessModules.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688F5A
                          • Part of subcall function 00007FF77D689390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF77D6845F4,00000000,00007FF77D681985), ref: 00007FF77D6893C9
                        • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688FE5
                        • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D689044
                        • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D689055
                        • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D68906A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                        • String ID:
                        • API String ID: 3462794448-0
                        • Opcode ID: 0184f5a771bb2c28f933eba3e4018dda16e38d059dd6d010c17659477659ba58
                        • Instruction ID: 77824dc5bf1fcac4117a58aed5dc672a675f41ae0319790c727e635c5f256a75
                        • Opcode Fuzzy Hash: 0184f5a771bb2c28f933eba3e4018dda16e38d059dd6d010c17659477659ba58
                        • Instruction Fuzzy Hash: FC415467E3D682C1EA30AB11A5402BBA396EB85BD4F854239DF4D97789FE3CE501C710
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B2D7
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B30D
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B33A
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B34B
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B35C
                        • SetLastError.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B377
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 341ed06667cf8b6c5416a7ef0c6dfdccbf195f5bc763a811adde1679d5f4f530
                        • Instruction ID: a96e01a7bef85c33d27e2799890d1b277947c484131ebdca5929970c70d9a0e1
                        • Opcode Fuzzy Hash: 341ed06667cf8b6c5416a7ef0c6dfdccbf195f5bc763a811adde1679d5f4f530
                        • Instruction Fuzzy Hash: F4116D26E3C64282FA54B329569113FE6879F457F0F948778E83EC76D6FE2CA4414320
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF77D681B6A), ref: 00007FF77D68295E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: %s: %s$Error$Error [ANSI Fallback]$[PYI-%d:ERROR]
                        • API String ID: 2050909247-2962405886
                        • Opcode ID: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                        • Instruction ID: 73ec6bf89455a57c58b06fa0ae3ab1c5e2a7bc309814cbec61ad3786700b431e
                        • Opcode Fuzzy Hash: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                        • Instruction Fuzzy Hash: 1831B763F3C68192E710B765A8406E7A696BF887D4F810236EE8DC3759FF3CD5468210
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                        • String ID: Unhandled exception in script
                        • API String ID: 3081866767-2699770090
                        • Opcode ID: 851ce5d4a208b56cb63585478e484d0f9d6918564d04618497f061aba15d8534
                        • Instruction ID: 446fb72b4d02c4236079d394fb0ed5ce25fc5d267de1381daf6e25d45655badc
                        • Opcode Fuzzy Hash: 851ce5d4a208b56cb63585478e484d0f9d6918564d04618497f061aba15d8534
                        • Instruction Fuzzy Hash: EC315363A3D68285E710AB21E8552FAA752FF887C4F840235EA4D87B49EF3CD1048710
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,FFFFFFFF,00000000,00007FF77D68918F,?,00007FF77D683C55), ref: 00007FF77D682BA0
                        • MessageBoxW.USER32 ref: 00007FF77D682C2A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentMessageProcess
                        • String ID: WARNING$Warning$[PYI-%d:%ls]
                        • API String ID: 1672936522-3797743490
                        • Opcode ID: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                        • Instruction ID: f63257a47553c2032eff2fe4cf6b8ec4a3197cfdd41733b07804cf9f15422fb3
                        • Opcode Fuzzy Hash: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                        • Instruction Fuzzy Hash: 3021A663B2CB4182E710AB14F4447ABA766FB887C4F800236EA8D97659EF3CD255C750
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,?,00000000,00007FF77D681B99), ref: 00007FF77D682760
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: ERROR$Error$Error [ANSI Fallback]$[PYI-%d:%s]
                        • API String ID: 2050909247-1591803126
                        • Opcode ID: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                        • Instruction ID: 01d34c8c1c0404b22cbe3ae83f56b1663057af70ef693a0824993ba038dc5048
                        • Opcode Fuzzy Hash: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                        • Instruction Fuzzy Hash: F3217F73E3C78182E720AB55B8417E7A7A5EB883C4F800236EA8D93659EF7CD1458750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                        • Instruction ID: 1770cd55ac1beb024a4d0b1099aa99eea230b739e2cc4ce52add5c26bad3d860
                        • Opcode Fuzzy Hash: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                        • Instruction Fuzzy Hash: 5DF04422E3D60681EA10AB24A45437B9762EF897E5F941339D56E851E4FF2CD444C720
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                        • Instruction ID: 213db936796fc3778afcba5c84b0d6d08a704705715f00606921d5d5fe13ce49
                        • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                        • Instruction Fuzzy Hash: 91114F23D7CA0201F6542155A89137B9062AFD93E8FE40736EBAE962DABE6C68414220
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3AF
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3CE
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3F6
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B407
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B418
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: 076d9937837767d8c0599fb7139188ad361754fd070b51876ae2b58645e7f25c
                        • Instruction ID: 83ca0808ae1361b3a0c94cd2bef51bd5ce1e9d53afcc9c135310723a2e4ed9a1
                        • Opcode Fuzzy Hash: 076d9937837767d8c0599fb7139188ad361754fd070b51876ae2b58645e7f25c
                        • Instruction Fuzzy Hash: BA116D26E3C60241FA58B329969113BA5835F447F0FD8937CE83DC66CAFE2CE4429220
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: 84df6eade7ca2759e64539926e88efdc2e23a1e9973d593929f07b0eae7a4c09
                        • Instruction ID: f538c7682a5980089d859b24db90e66a5ae9d22e0dc95da31c83f38e38dad85e
                        • Opcode Fuzzy Hash: 84df6eade7ca2759e64539926e88efdc2e23a1e9973d593929f07b0eae7a4c09
                        • Instruction Fuzzy Hash: ED110626E3C20741F958B36945A117BA5838F467F0FA487BCE93ECA6C2FD2CB4404231
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: verbose
                        • API String ID: 3215553584-579935070
                        • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                        • Instruction ID: 49fc8158dee8d03463ff35406dbe0ecb005a87ac0c8d3ef9179d083adc5d5de7
                        • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                        • Instruction Fuzzy Hash: 2191AE23E3C74681EB60AFA8D55037FB693AB41BD4FC4427ADA59872D5EE3CE4058320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                        • Instruction ID: 00767ae982e21424efe52ce2e6c62e4e55cc184f1f67ef8eba1cd89e678e24d8
                        • Opcode Fuzzy Hash: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                        • Instruction Fuzzy Hash: 8E81A473E3C202D5F764BE25811027BB6A3AB117C4FD68279CA09D7285EF2DE9499321
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2395640692-1018135373
                        • Opcode ID: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                        • Instruction ID: 1745753b4f805a345d4c0616f5d3b058fc74155de081ad507d368850db67da1f
                        • Opcode Fuzzy Hash: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                        • Instruction Fuzzy Hash: BD517023E3D602CEDB14AB15D444A7AA792EB44BD8F984231DB4E87744EF7CE841CB20
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                        • Instruction ID: 070cc0957e374de7d9a95a03585695e38ce21bbd50daed78c51e6b64d8680c66
                        • Opcode Fuzzy Hash: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                        • Instruction Fuzzy Hash: 7B616C3392CB85C5DB20AB15E4403AAB7A1FB957D8F444235EA9C43B96EF7CD190CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                        • Instruction ID: 67e3a653c59d2beac016d2c38ef232b8e60f1bc17d661ba938a5d04c8be8dfd0
                        • Opcode Fuzzy Hash: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                        • Instruction Fuzzy Hash: 5A519F33E3C242C6EB64AA21914426AB7A2EB64BC4F944236DA4C83B96DF3CE450C751
                        APIs
                        • CreateDirectoryW.KERNEL32(00000000,?,00007FF77D68352C,?,00000000,00007FF77D683F1B), ref: 00007FF77D687F32
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CreateDirectory
                        • String ID: %.*s$%s%c$\
                        • API String ID: 4241100979-1685191245
                        • Opcode ID: 302ffdc47f1f131389ecc473fe7ae023bae846d875cccfc6523225b15fd92315
                        • Instruction ID: 3c798745d1f8650b8f62018f9636e3239a9f20de0f3146175b9d1dd341fbab97
                        • Opcode Fuzzy Hash: 302ffdc47f1f131389ecc473fe7ae023bae846d875cccfc6523225b15fd92315
                        • Instruction Fuzzy Hash: 1C31BA62E3DAC185EA21A711E4507ABA356EB84BE0F844331EAAD877C5FF2CD6418750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: ERROR$Error$[PYI-%d:%ls]
                        • API String ID: 2030045667-255084403
                        • Opcode ID: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                        • Instruction ID: 31a32ef2c6f95a0c2a27cc5e00b15e28b4dc188d125b7932c4417faf45dc7aa1
                        • Opcode Fuzzy Hash: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                        • Instruction Fuzzy Hash: 1E219163B28B4182E710AB14B4447ABA7A6EB887C0F800236EA8D93659EF3CD255C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 2718003287-0
                        • Opcode ID: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                        • Instruction ID: b620f536da00e8410c8aad0e1fdc1d57d60188c4c5e9e8a437d79d7f895de897
                        • Opcode Fuzzy Hash: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                        • Instruction Fuzzy Hash: 26D1EF73F2CA818AE710DF75D4402BD77A2FB547D8B81426ADE5E97B89EA38D006C710
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_isindst
                        • String ID:
                        • API String ID: 4170891091-0
                        • Opcode ID: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                        • Instruction ID: 47c386d92cb6092024ef8aaec72e1afa5e0f926da57bb014de277f08e1199991
                        • Opcode Fuzzy Hash: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                        • Instruction Fuzzy Hash: D8510B73F3811186EB14EF6499516BDA7A3AF543E8F910339DE1D92AD9EF38A402C710
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                        • String ID:
                        • API String ID: 2780335769-0
                        • Opcode ID: 601044899bb77d1db34704472f686b9691880a3163deed0eb7e9945e8072c835
                        • Instruction ID: 8a28f5429d2e4c9e67125e252388ac25a87a77d90ee7c1001c010b0887ce1940
                        • Opcode Fuzzy Hash: 601044899bb77d1db34704472f686b9691880a3163deed0eb7e9945e8072c835
                        • Instruction Fuzzy Hash: EA518233E3865185FB10EF71D5503BEA7A3AB48798F944639DE4D87689EF38D4418360
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: LongWindow$DialogInvalidateRect
                        • String ID:
                        • API String ID: 1956198572-0
                        • Opcode ID: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                        • Instruction ID: 4db702e4260f0ae1114fb5573849cb1bf17f1f569369efbc96099a92f6ea5e0a
                        • Opcode Fuzzy Hash: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                        • Instruction Fuzzy Hash: 7611E922F3C142C2F654A769E54427B9693EB887C0FD44230DB8947B8DED3DD4D18220
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_invalid_parameter_noinfo
                        • String ID: ?
                        • API String ID: 1286766494-1684325040
                        • Opcode ID: 21862b7f5a6063227688de7d7fc5fbfc7fa1fb1d7946118fe9e576ba790fa6aa
                        • Instruction ID: ff92f2518d4ab9e194f3fd5ebea0e4a1a50341733b802b621a1c783827fed23c
                        • Opcode Fuzzy Hash: 21862b7f5a6063227688de7d7fc5fbfc7fa1fb1d7946118fe9e576ba790fa6aa
                        • Instruction Fuzzy Hash: 5041F523E3C28241E724E725945137BA692EBD0BE4F944339EE9D86ADDEF3CD4418710
                        APIs
                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D699046
                          • Part of subcall function 00007FF77D69A948: RtlFreeHeap.NTDLL(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF77D68CBA5), ref: 00007FF77D699064
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                        • String ID: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                        • API String ID: 3580290477-818140841
                        • Opcode ID: 136b352ca89953b7aac46d199a587659114d0cf60bae53edf27061cb20026a80
                        • Instruction ID: 55a836dad8fb8ed1c6f3f5e98ecb12e168b273073b0afe6edf662220781ca243
                        • Opcode Fuzzy Hash: 136b352ca89953b7aac46d199a587659114d0cf60bae53edf27061cb20026a80
                        • Instruction Fuzzy Hash: BA416E37E3C71285E714AF2595800BAB7A7FB487D0B95527AE94D83B85FE3CE4818320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: U
                        • API String ID: 442123175-4171548499
                        • Opcode ID: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                        • Instruction ID: cbeb1b35439bb3f0d7e1996fb4b1a01f507193706e99a2bb16ecf329025b6c6d
                        • Opcode Fuzzy Hash: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                        • Instruction Fuzzy Hash: E4419163A3CA4181DB20AF25E4443BAA7A2FB887C4F814235EA4DC7798EF3CD405CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID: :
                        • API String ID: 1611563598-336475711
                        • Opcode ID: d7e4ed55f29cf6b5985c16ba7c582ed18ee62b51760ed1b5a20f115a32bf7e2e
                        • Instruction ID: 964337a21861e369412d896d3835c6b074c981b240ba78b7c6488159310ffc96
                        • Opcode Fuzzy Hash: d7e4ed55f29cf6b5985c16ba7c582ed18ee62b51760ed1b5a20f115a32bf7e2e
                        • Instruction Fuzzy Hash: 6E21A073E3C34181EB20AB15904427EA3A3EB94BC4F864239D68D83695EF7CE5458761
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaise
                        • String ID: csm
                        • API String ID: 2573137834-1018135373
                        • Opcode ID: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                        • Instruction ID: ba8f854b799dacf9db38a70c412af82643bc7bf57596a335849349486092c63c
                        • Opcode Fuzzy Hash: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                        • Instruction Fuzzy Hash: 86114C33A2CB8182EB219F15E40026ABBE5FB88B84F984631DBCD47759EF3CC5558700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2671355791.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000000.00000002.2671333760.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671388999.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671411289.00007FF77D6C2000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2671454067.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DriveType_invalid_parameter_noinfo
                        • String ID: :
                        • API String ID: 2595371189-336475711
                        • Opcode ID: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                        • Instruction ID: ec74fa260558e8435e2ed8b85590191b1fb7eb131c19f089dfce8499952ac3d5
                        • Opcode Fuzzy Hash: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                        • Instruction Fuzzy Hash: 6A017163D3C20285E720BF60946127FA3A2EF847C4FD00235D58DD2685FE3CE5048B24
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Module_$Constant$String$Object$Err_$ConditionFromMask$DeallocException$Capsule_DictDict_ExitFormatInfoLongLong_MallocMem_MemoryMetaclassStartupTypeType_Unicode_UnsignedVerifyVersionmemset
                        • String ID: 00000000-0000-0000-0000-000000000000$00:00:00:00:00:00$00:00:00:FF:FF:FF$90DB8B89-0D35-4F79-8CE9-49EA0AC8B7CD$A42E7CDA-D03F-480C-9CC2-A4DE20ABB878$AF_APPLETALK$AF_BLUETOOTH$AF_DECnet$AF_HYPERV$AF_INET$AF_INET6$AF_IPX$AF_IRDA$AF_LINK$AF_SNA$AF_UNSPEC$AI_ADDRCONFIG$AI_ALL$AI_CANONNAME$AI_NUMERICHOST$AI_NUMERICSERV$AI_PASSIVE$AI_V4MAPPED$BDADDR_ANY$BDADDR_LOCAL$BTPROTO_RFCOMM$CAPI$E0E16197-DD56-4A10-9195-5EE7A155A838$EAI_AGAIN$EAI_BADFLAGS$EAI_FAIL$EAI_FAMILY$EAI_MEMORY$EAI_NODATA$EAI_NONAME$EAI_SERVICE$EAI_SOCKTYPE$FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF$HVSOCKET_ADDRESS_FLAG_PASSTHRU$HVSOCKET_CONNECTED_SUSPEND$HVSOCKET_CONNECT_TIMEOUT$HVSOCKET_CONNECT_TIMEOUT_MAX$HV_GUID_BROADCAST$HV_GUID_CHILDREN$HV_GUID_LOOPBACK$HV_GUID_PARENT$HV_GUID_WILDCARD$HV_GUID_ZERO$HV_PROTOCOL_RAW$INADDR_ALLHOSTS_GROUP$INADDR_ANY$INADDR_BROADCAST$INADDR_LOOPBACK$INADDR_MAX_LOCAL_GROUP$INADDR_NONE$INADDR_UNSPEC_GROUP$IPPORT_RESERVED$IPPORT_USERRESERVED$IPPROTO_AH$IPPROTO_CBT$IPPROTO_DSTOPTS$IPPROTO_EGP$IPPROTO_ESP$IPPROTO_FRAGMENT$IPPROTO_GGP$IPPROTO_HOPOPTS$IPPROTO_ICLFXBM$IPPROTO_ICMP$IPPROTO_ICMPV6$IPPROTO_IDP$IPPROTO_IGMP$IPPROTO_IGP$IPPROTO_IP$IPPROTO_IPV4$IPPROTO_IPV6$IPPROTO_L2TP$IPPROTO_MAX$IPPROTO_ND$IPPROTO_NONE$IPPROTO_PGM$IPPROTO_PIM$IPPROTO_PUP$IPPROTO_RAW$IPPROTO_RDP$IPPROTO_ROUTING$IPPROTO_SCTP$IPPROTO_ST$IPPROTO_TCP$IPPROTO_UDP$IPV6_CHECKSUM$IPV6_DONTFRAG$IPV6_HOPLIMIT$IPV6_HOPOPTS$IPV6_JOIN_GROUP$IPV6_LEAVE_GROUP$IPV6_MULTICAST_HOPS$IPV6_MULTICAST_IF$IPV6_MULTICAST_LOOP$IPV6_PKTINFO$IPV6_RECVRTHDR$IPV6_RECVTCLASS$IPV6_RTHDR$IPV6_TCLASS$IPV6_UNICAST_HOPS$IPV6_V6ONLY$IP_ADD_MEMBERSHIP$IP_ADD_SOURCE_MEMBERSHIP$IP_BLOCK_SOURCE$IP_DROP_MEMBERSHIP$IP_DROP_SOURCE_MEMBERSHIP$IP_HDRINCL$IP_MULTICAST_IF$IP_MULTICAST_LOOP$IP_MULTICAST_TTL$IP_OPTIONS$IP_PKTINFO$IP_RECVDSTADDR$IP_RECVTOS$IP_TOS$IP_TTL$IP_UNBLOCK_SOURCE$MSG_BCAST$MSG_CTRUNC$MSG_DONTROUTE$MSG_ERRQUEUE$MSG_MCAST$MSG_OOB$MSG_PEEK$MSG_TRUNC$MSG_WAITALL$NI_DGRAM$NI_MAXHOST$NI_MAXSERV$NI_NAMEREQD$NI_NOFQDN$NI_NUMERICHOST$NI_NUMERICSERV$RCVALL_MAX$RCVALL_OFF$RCVALL_ON$RCVALL_SOCKETLEVELONLY$SHUT_RD$SHUT_RDWR$SHUT_WR$SIO_KEEPALIVE_VALS$SIO_LOOPBACK_FAST_PATH$SIO_RCVALL$SOCK_DGRAM$SOCK_RAW$SOCK_RDM$SOCK_SEQPACKET$SOCK_STREAM$SOL_IP$SOL_SOCKET$SOL_TCP$SOL_UDP$SOMAXCONN$SO_ACCEPTCONN$SO_BROADCAST$SO_DEBUG$SO_DONTROUTE$SO_ERROR$SO_EXCLUSIVEADDRUSE$SO_KEEPALIVE$SO_LINGER$SO_OOBINLINE$SO_RCVBUF$SO_RCVLOWAT$SO_RCVTIMEO$SO_REUSEADDR$SO_SNDBUF$SO_SNDLOWAT$SO_SNDTIMEO$SO_TYPE$SO_USELOOPBACK$SocketType$TCP_FASTOPEN$TCP_KEEPCNT$TCP_KEEPIDLE$TCP_KEEPINTVL$TCP_MAXSEG$TCP_NODELAY$WSAStartup failed: error code %d$WSAStartup failed: network not ready$WSAStartup failed: requested version not supported$_socket.CAPI$error$gaierror$has_ipv6$herror$socket.gaierror$socket.herror$timeout
                        • API String ID: 1196102948-1188461360
                        • Opcode ID: 0fb31f2eee656220925b4e47e62874025d6cd115870c459d51081d29a567eca9
                        • Instruction ID: 793fe9db789615f8576ce65e197cf62a071756f2d7b2b83fd003fb7fd1d769df
                        • Opcode Fuzzy Hash: 0fb31f2eee656220925b4e47e62874025d6cd115870c459d51081d29a567eca9
                        • Instruction Fuzzy Hash: D8D2C961F08E1389F6148B23EC543649654BF65FE1F80D0B9D93EAA274EF6DE245C388

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 229 7ff77d681000-7ff77d683806 call 7ff77d68fe18 call 7ff77d68fe20 call 7ff77d68c850 call 7ff77d6953f0 call 7ff77d695484 call 7ff77d6836b0 243 7ff77d683808-7ff77d68380f 229->243 244 7ff77d683814-7ff77d683836 call 7ff77d681950 229->244 245 7ff77d683c97-7ff77d683cb2 call 7ff77d68c550 243->245 250 7ff77d68383c-7ff77d683856 call 7ff77d681c80 244->250 251 7ff77d68391b-7ff77d683931 call 7ff77d6845c0 244->251 255 7ff77d68385b-7ff77d68389b call 7ff77d688830 250->255 257 7ff77d68396a-7ff77d68397f call 7ff77d682710 251->257 258 7ff77d683933-7ff77d683960 call 7ff77d687f90 251->258 262 7ff77d68389d-7ff77d6838a3 255->262 263 7ff77d6838c1-7ff77d6838cc call 7ff77d694f30 255->263 271 7ff77d683c8f 257->271 269 7ff77d683984-7ff77d6839a6 call 7ff77d681c80 258->269 270 7ff77d683962-7ff77d683965 call 7ff77d69004c 258->270 266 7ff77d6838a5-7ff77d6838ad 262->266 267 7ff77d6838af-7ff77d6838bd call 7ff77d6889a0 262->267 278 7ff77d6839fc-7ff77d683a2a call 7ff77d688940 call 7ff77d6889a0 * 3 263->278 279 7ff77d6838d2-7ff77d6838e1 call 7ff77d688830 263->279 266->267 267->263 280 7ff77d6839b0-7ff77d6839b9 269->280 270->257 271->245 304 7ff77d683a2f-7ff77d683a3e call 7ff77d688830 278->304 287 7ff77d6838e7-7ff77d6838ed 279->287 288 7ff77d6839f4-7ff77d6839f7 call 7ff77d694f30 279->288 280->280 283 7ff77d6839bb-7ff77d6839d8 call 7ff77d681950 280->283 283->255 295 7ff77d6839de-7ff77d6839ef call 7ff77d682710 283->295 292 7ff77d6838f0-7ff77d6838fc 287->292 288->278 296 7ff77d6838fe-7ff77d683903 292->296 297 7ff77d683905-7ff77d683908 292->297 295->271 296->292 296->297 297->288 299 7ff77d68390e-7ff77d683916 call 7ff77d694f30 297->299 299->304 308 7ff77d683b45-7ff77d683b53 304->308 309 7ff77d683a44-7ff77d683a47 304->309 310 7ff77d683b59-7ff77d683b5d 308->310 311 7ff77d683a67 308->311 309->308 312 7ff77d683a4d-7ff77d683a50 309->312 313 7ff77d683a6b-7ff77d683a90 call 7ff77d694f30 310->313 311->313 314 7ff77d683a56-7ff77d683a5a 312->314 315 7ff77d683b14-7ff77d683b17 312->315 324 7ff77d683aab-7ff77d683ac0 313->324 325 7ff77d683a92-7ff77d683aa6 call 7ff77d688940 313->325 314->315 316 7ff77d683a60 314->316 317 7ff77d683b19-7ff77d683b1d 315->317 318 7ff77d683b2f-7ff77d683b40 call 7ff77d682710 315->318 316->311 317->318 320 7ff77d683b1f-7ff77d683b2a 317->320 328 7ff77d683c7f-7ff77d683c87 318->328 320->313 326 7ff77d683be8-7ff77d683bfa call 7ff77d688830 324->326 327 7ff77d683ac6-7ff77d683aca 324->327 325->324 336 7ff77d683c2e 326->336 337 7ff77d683bfc-7ff77d683c02 326->337 331 7ff77d683bcd-7ff77d683be2 call 7ff77d681940 327->331 332 7ff77d683ad0-7ff77d683ae8 call 7ff77d695250 327->332 328->271 331->326 331->327 342 7ff77d683aea-7ff77d683b02 call 7ff77d695250 332->342 343 7ff77d683b62-7ff77d683b7a call 7ff77d695250 332->343 344 7ff77d683c31-7ff77d683c40 call 7ff77d694f30 336->344 340 7ff77d683c1e-7ff77d683c2c 337->340 341 7ff77d683c04-7ff77d683c1c 337->341 340->344 341->344 342->331 353 7ff77d683b08-7ff77d683b0f 342->353 351 7ff77d683b7c-7ff77d683b80 343->351 352 7ff77d683b87-7ff77d683b9f call 7ff77d695250 343->352 354 7ff77d683c46-7ff77d683c4a 344->354 355 7ff77d683d41-7ff77d683d63 call 7ff77d6844e0 344->355 351->352 364 7ff77d683bac-7ff77d683bc4 call 7ff77d695250 352->364 365 7ff77d683ba1-7ff77d683ba5 352->365 353->331 357 7ff77d683cd4-7ff77d683ce6 call 7ff77d688830 354->357 358 7ff77d683c50-7ff77d683c5f call 7ff77d6890e0 354->358 368 7ff77d683d65-7ff77d683d6f call 7ff77d684630 355->368 369 7ff77d683d71-7ff77d683d82 call 7ff77d681c80 355->369 375 7ff77d683ce8-7ff77d683ceb 357->375 376 7ff77d683d35-7ff77d683d3c 357->376 373 7ff77d683cb3-7ff77d683cbd call 7ff77d688660 358->373 374 7ff77d683c61 358->374 364->331 388 7ff77d683bc6 364->388 365->364 379 7ff77d683d87-7ff77d683d96 368->379 369->379 393 7ff77d683cc8-7ff77d683ccf 373->393 394 7ff77d683cbf-7ff77d683cc6 373->394 382 7ff77d683c68 call 7ff77d682710 374->382 375->376 377 7ff77d683ced-7ff77d683d10 call 7ff77d681c80 375->377 376->382 395 7ff77d683d2b-7ff77d683d33 call 7ff77d694f30 377->395 396 7ff77d683d12-7ff77d683d26 call 7ff77d682710 call 7ff77d694f30 377->396 385 7ff77d683dbc-7ff77d683dd2 call 7ff77d689390 379->385 386 7ff77d683d98-7ff77d683d9f 379->386 389 7ff77d683c6d-7ff77d683c77 382->389 401 7ff77d683dd4 385->401 402 7ff77d683de0-7ff77d683dfc SetDllDirectoryW 385->402 386->385 391 7ff77d683da1-7ff77d683da5 386->391 388->331 389->328 391->385 397 7ff77d683da7-7ff77d683db6 LoadLibraryExW 391->397 393->379 394->382 395->379 396->389 397->385 401->402 405 7ff77d683ef9-7ff77d683f00 402->405 406 7ff77d683e02-7ff77d683e11 call 7ff77d688830 402->406 408 7ff77d683f06-7ff77d683f0d 405->408 409 7ff77d684000-7ff77d684008 405->409 416 7ff77d683e2a-7ff77d683e34 call 7ff77d694f30 406->416 417 7ff77d683e13-7ff77d683e19 406->417 408->409 413 7ff77d683f13-7ff77d683f1d call 7ff77d6833c0 408->413 414 7ff77d68402d-7ff77d684042 call 7ff77d6836a0 call 7ff77d683360 call 7ff77d683670 409->414 415 7ff77d68400a-7ff77d684027 PostMessageW GetMessageW 409->415 413->389 427 7ff77d683f23-7ff77d683f37 call 7ff77d6890c0 413->427 438 7ff77d684047-7ff77d68405f call 7ff77d686fc0 call 7ff77d686d70 414->438 415->414 429 7ff77d683eea-7ff77d683ef4 call 7ff77d688940 416->429 430 7ff77d683e3a-7ff77d683e40 416->430 421 7ff77d683e1b-7ff77d683e23 417->421 422 7ff77d683e25-7ff77d683e27 417->422 421->422 422->416 436 7ff77d683f5c-7ff77d683f9f call 7ff77d688940 call 7ff77d6889e0 call 7ff77d686fc0 call 7ff77d686d70 call 7ff77d6888e0 427->436 437 7ff77d683f39-7ff77d683f56 PostMessageW GetMessageW 427->437 429->405 430->429 434 7ff77d683e46-7ff77d683e4c 430->434 439 7ff77d683e4e-7ff77d683e50 434->439 440 7ff77d683e57-7ff77d683e59 434->440 478 7ff77d683fed-7ff77d683ffb call 7ff77d681900 436->478 479 7ff77d683fa1-7ff77d683fb7 call 7ff77d688ed0 call 7ff77d6888e0 436->479 437->436 443 7ff77d683e52 439->443 444 7ff77d683e5f-7ff77d683e7b call 7ff77d686dc0 call 7ff77d687340 439->444 440->405 440->444 443->405 456 7ff77d683e7d-7ff77d683e84 444->456 457 7ff77d683e86-7ff77d683e8d 444->457 459 7ff77d683ed3-7ff77d683ee8 call 7ff77d682a50 call 7ff77d686fc0 call 7ff77d686d70 456->459 460 7ff77d683ea7-7ff77d683eb1 call 7ff77d6871b0 457->460 461 7ff77d683e8f-7ff77d683e9c call 7ff77d686e00 457->461 459->405 473 7ff77d683ebc-7ff77d683eca call 7ff77d6874f0 460->473 474 7ff77d683eb3-7ff77d683eba 460->474 461->460 472 7ff77d683e9e-7ff77d683ea5 461->472 472->459 473->405 486 7ff77d683ecc 473->486 474->459 478->389 479->478 490 7ff77d683fb9-7ff77d683fce 479->490 486->459 491 7ff77d683fe8 call 7ff77d682a50 490->491 492 7ff77d683fd0-7ff77d683fe3 call 7ff77d682710 call 7ff77d681900 490->492 491->478 492->389
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastModuleName
                        • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag$pyi-runtime-tmpdir
                        • API String ID: 2776309574-4232158417
                        • Opcode ID: e13306a1dc2fdd2583e75603ea30a2f2fc44fee967f56f1d82945797d443fea0
                        • Instruction ID: ebd3ec9b3ec3dca448e77d6bdf3460358655604b8587c5c124c62c269f785eff
                        • Opcode Fuzzy Hash: e13306a1dc2fdd2583e75603ea30a2f2fc44fee967f56f1d82945797d443fea0
                        • Instruction Fuzzy Hash: 86325B23E3C682D1EA15BB2594542BBA793AF957C0FC44236DA5DC3296FF2CE558C320

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 832 7ff77d6a6964-7ff77d6a69d7 call 7ff77d6a6698 835 7ff77d6a69f1-7ff77d6a69fb call 7ff77d698520 832->835 836 7ff77d6a69d9-7ff77d6a69e2 call 7ff77d694ee8 832->836 841 7ff77d6a6a16-7ff77d6a6a7f CreateFileW 835->841 842 7ff77d6a69fd-7ff77d6a6a14 call 7ff77d694ee8 call 7ff77d694f08 835->842 843 7ff77d6a69e5-7ff77d6a69ec call 7ff77d694f08 836->843 845 7ff77d6a6a81-7ff77d6a6a87 841->845 846 7ff77d6a6afc-7ff77d6a6b07 GetFileType 841->846 842->843 854 7ff77d6a6d32-7ff77d6a6d52 843->854 851 7ff77d6a6ac9-7ff77d6a6af7 GetLastError call 7ff77d694e7c 845->851 852 7ff77d6a6a89-7ff77d6a6a8d 845->852 848 7ff77d6a6b5a-7ff77d6a6b61 846->848 849 7ff77d6a6b09-7ff77d6a6b44 GetLastError call 7ff77d694e7c CloseHandle 846->849 857 7ff77d6a6b63-7ff77d6a6b67 848->857 858 7ff77d6a6b69-7ff77d6a6b6c 848->858 849->843 866 7ff77d6a6b4a-7ff77d6a6b55 call 7ff77d694f08 849->866 851->843 852->851 859 7ff77d6a6a8f-7ff77d6a6ac7 CreateFileW 852->859 863 7ff77d6a6b72-7ff77d6a6bc7 call 7ff77d698438 857->863 858->863 864 7ff77d6a6b6e 858->864 859->846 859->851 871 7ff77d6a6be6-7ff77d6a6c17 call 7ff77d6a6418 863->871 872 7ff77d6a6bc9-7ff77d6a6bd5 call 7ff77d6a68a0 863->872 864->863 866->843 878 7ff77d6a6c19-7ff77d6a6c1b 871->878 879 7ff77d6a6c1d-7ff77d6a6c5f 871->879 872->871 877 7ff77d6a6bd7 872->877 880 7ff77d6a6bd9-7ff77d6a6be1 call 7ff77d69aac0 877->880 878->880 881 7ff77d6a6c81-7ff77d6a6c8c 879->881 882 7ff77d6a6c61-7ff77d6a6c65 879->882 880->854 885 7ff77d6a6d30 881->885 886 7ff77d6a6c92-7ff77d6a6c96 881->886 882->881 884 7ff77d6a6c67-7ff77d6a6c7c 882->884 884->881 885->854 886->885 888 7ff77d6a6c9c-7ff77d6a6ce1 CloseHandle CreateFileW 886->888 889 7ff77d6a6ce3-7ff77d6a6d11 GetLastError call 7ff77d694e7c call 7ff77d698660 888->889 890 7ff77d6a6d16-7ff77d6a6d2b 888->890 889->890 890->885
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                        • String ID:
                        • API String ID: 1617910340-0
                        • Opcode ID: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                        • Instruction ID: 638d7e9c8017b22b817c77545fc0c9addb2e3502f45f0a0012853819baa71786
                        • Opcode Fuzzy Hash: baaa1bd2bfcf3e8d87424e6061cd652f961a4b3dae6ad7eaae94581ee29caa63
                        • Instruction Fuzzy Hash: 7DC1B233F38A4285EB10EFA9D4902AE7762F789BD8B414325DA5E97794EF38E411C310
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                        • Instruction ID: ef05c9abaec79f1baf501e12dc119f0554db9dea8a58efbf38667a894d5111d3
                        • Opcode Fuzzy Hash: 3849ca1beccae91a12aeced599bc73bdbec409d6dd090ca7d2ec6d5d284a4285
                        • Instruction Fuzzy Hash: 6AF08623E3C64186E7A09B64B49476BB751AB843A4F440336D9AD416D5EF3CD0588600

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 498 7ffe13335afc-7ffe13335b4d PyType_GetModuleByDef 499 7ffe13335b4f-7ffe13335b59 498->499 500 7ffe13335b5b-7ffe13335b80 PySys_Audit 498->500 499->500 501 7ffe13335b9b-7ffe13335ba9 499->501 502 7ffe13335b82-7ffe13335b85 500->502 503 7ffe13335bd6 500->503 507 7ffe13335d6e-7ffe13335d7e PyLong_AsLongLong 501->507 508 7ffe13335baf-7ffe13335bb7 501->508 505 7ffe13335e46-7ffe13335ea9 PyEval_SaveThread WSASocketW PyEval_RestoreThread 502->505 506 7ffe13335b8b-7ffe13335b95 502->506 504 7ffe13335bdb-7ffe13335bfe call 7ffe13332a00 503->504 510 7ffe13335d20-7ffe13335d25 call 7ffe13334a88 505->510 511 7ffe13335eaf-7ffe13335ecd call 7ffe13334420 505->511 506->501 506->505 514 7ffe13335d80-7ffe13335d89 PyErr_Occurred 507->514 515 7ffe13335dab-7ffe13335dda memset getsockname 507->515 512 7ffe13335bff-7ffe13335c08 508->512 513 7ffe13335bb9-7ffe13335bd0 PyErr_Format 508->513 510->503 532 7ffe13335d44-7ffe13335d4d closesocket 511->532 533 7ffe13335ed3-7ffe13335ed5 511->533 520 7ffe13335c10-7ffe13335c61 512->520 513->503 514->503 516 7ffe13335d8f-7ffe13335da6 PyErr_SetString 514->516 518 7ffe13335de8-7ffe13335deb 515->518 519 7ffe13335ddc-7ffe13335ddf 515->519 516->503 518->510 525 7ffe13335df1-7ffe13335dfc WSAGetLastError 518->525 523 7ffe13335de1-7ffe13335de6 519->523 524 7ffe13335e02-7ffe13335e06 519->524 520->520 526 7ffe13335c63-7ffe13335cd6 PySys_Audit 520->526 523->524 530 7ffe13335e41-7ffe13335e44 524->530 531 7ffe13335e08-7ffe13335e36 getsockopt 524->531 525->510 525->524 526->503 529 7ffe13335cdc-7ffe13335d1e PyEval_SaveThread WSASocketW PyEval_RestoreThread 526->529 529->510 534 7ffe13335d2a-7ffe13335d3a SetHandleInformation 529->534 530->511 531->510 535 7ffe13335e3c 531->535 532->503 533->504 536 7ffe13335d52-7ffe13335d69 534->536 537 7ffe13335d3c-7ffe13335d3e PyErr_SetFromWindowsErr 534->537 535->530 536->511 537->532
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_Eval_Thread$AuditLongRestoreSaveSocketSys_$ErrorFormatFromHandleInformationLastLong_ModuleOccurredStringType_Windowsclosesocketgetsocknamegetsockoptmemset
                        • String ID: Oiii$negative file descriptor$socket descriptor string has wrong size, should be %zu bytes.$socket.__new__
                        • API String ID: 3363282672-2881308447
                        • Opcode ID: 4cb0448f202c41487222ee5ef5d738bee55fded3baec7f269166aa18e43a2a4b
                        • Instruction ID: b97a3cc58f1252197cce44a4863e6dc2eb1446be83d9cf868311c271099ad0a1
                        • Opcode Fuzzy Hash: 4cb0448f202c41487222ee5ef5d738bee55fded3baec7f269166aa18e43a2a4b
                        • Instruction Fuzzy Hash: 1EB14062A08E85C6F6109F2A94042B9A7A0FBA5FB4F049375DA6D636F1DF3CE5C48704

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 538 7ffe13334c58-7ffe13334c86 539 7ffe13334c8c-7ffe13334cee PyEval_SaveThread getaddrinfo PyEval_RestoreThread 538->539 540 7ffe13334d7d-7ffe13334d8e strcmp 538->540 541 7ffe13334e74-7ffe13334e84 call 7ffe13334abc 539->541 542 7ffe13334cf4-7ffe13334cff 539->542 543 7ffe13334ece-7ffe13334ed9 540->543 544 7ffe13334d94-7ffe13334da5 strcmp 540->544 568 7ffe13334e89-7ffe13334eb6 memcpy freeaddrinfo 541->568 547 7ffe13334d01-7ffe13334d04 542->547 548 7ffe13334d37 542->548 545 7ffe13334ee7-7ffe13334eec 543->545 546 7ffe13334edb 543->546 544->543 550 7ffe13334dab-7ffe13334dba 544->550 553 7ffe13334ef3 545->553 546->545 554 7ffe13334d30-7ffe13334d35 547->554 555 7ffe13334d06-7ffe13334d0f freeaddrinfo 547->555 556 7ffe13334d3c-7ffe13334d41 548->556 551 7ffe13334de1-7ffe13334de5 550->551 552 7ffe13334dbc-7ffe13334dd2 inet_pton 550->552 560 7ffe13334de7-7ffe13334df8 strchr 551->560 561 7ffe13334e2c-7ffe13334e70 PyEval_SaveThread getaddrinfo PyEval_RestoreThread 551->561 558 7ffe13334dd4-7ffe13334dd7 552->558 559 7ffe13334ddc-7ffe13334ddf 552->559 562 7ffe13334ef8-7ffe13334f11 553->562 554->556 563 7ffe13334d16-7ffe13334d2b PyErr_SetString 555->563 564 7ffe13334d55-7ffe13334d78 memcpy freeaddrinfo 556->564 565 7ffe13334d43-7ffe13334d53 freeaddrinfo 556->565 558->553 559->551 559->560 560->561 566 7ffe13334dfa-7ffe13334e1d inet_pton 560->566 567 7ffe13334e72 561->567 561->568 563->562 564->562 565->563 566->561 569 7ffe13334e1f 566->569 567->541 568->553 570 7ffe13334eb8-7ffe13334ebc 568->570 571 7ffe13334e22-7ffe13334e27 569->571 570->571 572 7ffe13334ec2 570->572 571->562 572->543
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Threadfreeaddrinfo$RestoreSavegetaddrinfoinet_ptonmemcpystrcmp$Err_Stringstrchr
                        • String ID: 255.255.255.255$<broadcast>$address family mismatched$unknown address family$unsupported address family$wildcard resolved to multiple address
                        • API String ID: 535957624-1715193308
                        • Opcode ID: 84e0856cd869813e583fc43c899fd160c3153486a779d11b04d7bc0fb41145c4
                        • Instruction ID: 45b36c55ae07bede03ab2d6d827c35276558d0f5b4a7049a375df1c7337c356c
                        • Opcode Fuzzy Hash: 84e0856cd869813e583fc43c899fd160c3153486a779d11b04d7bc0fb41145c4
                        • Instruction Fuzzy Hash: 78718125A08E428AF7608F279404279A360FB68FA0F54C271DE6E736B5DF3CE5958708

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 573 7ffe13335190-7ffe133351c4 574 7ffe133351c7-7ffe133351ca 573->574 575 7ffe133351dc-7ffe133351df 574->575 576 7ffe133351cc-7ffe133351d4 574->576 579 7ffe133351e1-7ffe133351ed _PyDeadline_Get 575->579 580 7ffe13335203-7ffe13335212 _PyDeadline_Init 575->580 577 7ffe133351da 576->577 578 7ffe1333527b-7ffe1333529d PyEval_SaveThread PyEval_RestoreThread 576->578 581 7ffe13335215 577->581 588 7ffe1333529f-7ffe133352a2 578->588 589 7ffe133352fd-7ffe13335300 578->589 582 7ffe133351ef-7ffe133351f2 579->582 583 7ffe13335218-7ffe13335228 call 7ffe13334594 579->583 580->581 581->583 585 7ffe133351f8-7ffe133351fe 582->585 586 7ffe1333530c-7ffe1333531d PyErr_SetString 582->586 591 7ffe1333522d-7ffe13335230 583->591 590 7ffe13335323 585->590 586->590 594 7ffe133352a4-7ffe133352aa WSAGetLastError 588->594 595 7ffe133352ac-7ffe133352b7 WSAGetLastError 588->595 592 7ffe13335302 589->592 593 7ffe13335308-7ffe1333530a 589->593 596 7ffe13335328-7ffe13335336 590->596 597 7ffe13335272-7ffe13335275 591->597 598 7ffe13335232-7ffe13335235 591->598 592->593 593->596 594->595 599 7ffe133352c5-7ffe133352ca 595->599 600 7ffe133352b9-7ffe133352c1 PyErr_CheckSignals 595->600 597->578 597->582 601 7ffe1333523f-7ffe1333524a WSAGetLastError 598->601 602 7ffe13335237-7ffe1333523d WSAGetLastError 598->602 604 7ffe133352f3-7ffe133352f6 599->604 605 7ffe133352cc-7ffe133352db WSAGetLastError 599->605 600->578 603 7ffe133352c3 600->603 606 7ffe13335250-7ffe13335258 PyErr_CheckSignals 601->606 607 7ffe133352f8-7ffe133352fb 601->607 602->601 608 7ffe1333525e-7ffe13335261 603->608 604->590 604->607 605->574 609 7ffe133352e1-7ffe133352ec WSAGetLastError 605->609 606->574 606->608 607->590 608->590 610 7ffe13335267-7ffe1333526d 608->610 609->604 612 7ffe133352ee 609->612 610->590 612->574
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorLast$Eval_Thread$Err_$CheckDeadline_RestoreSaveSignals$InitStringTime_Timeval_clampselect
                        • String ID: timed out
                        • API String ID: 497267021-3163636755
                        • Opcode ID: e8d612662e15c7c42ff97858117ad99e66a695495dedd8023d3accc3127b9541
                        • Instruction ID: 80c77a4c33465ad9b07df6bb4c63610289dc35ba118497851f27eb81e5ed3df2
                        • Opcode Fuzzy Hash: e8d612662e15c7c42ff97858117ad99e66a695495dedd8023d3accc3127b9541
                        • Instruction Fuzzy Hash: 72414A61E0CE42CEFA615B67A444379E290AF64F74F0482B0DD6DA26F4DF7CA8858609

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 613 7ff77d681950-7ff77d68198b call 7ff77d6845c0 616 7ff77d681c4e-7ff77d681c72 call 7ff77d68c550 613->616 617 7ff77d681991-7ff77d6819d1 call 7ff77d687f90 613->617 622 7ff77d681c3b-7ff77d681c3e call 7ff77d69004c 617->622 623 7ff77d6819d7-7ff77d6819e7 call 7ff77d6906d4 617->623 627 7ff77d681c43-7ff77d681c4b 622->627 628 7ff77d6819e9-7ff77d681a03 call 7ff77d694f08 call 7ff77d682910 623->628 629 7ff77d681a08-7ff77d681a24 call 7ff77d69039c 623->629 627->616 628->622 635 7ff77d681a26-7ff77d681a40 call 7ff77d694f08 call 7ff77d682910 629->635 636 7ff77d681a45-7ff77d681a5a call 7ff77d694f28 629->636 635->622 643 7ff77d681a5c-7ff77d681a76 call 7ff77d694f08 call 7ff77d682910 636->643 644 7ff77d681a7b-7ff77d681afc call 7ff77d681c80 * 2 call 7ff77d6906d4 636->644 643->622 655 7ff77d681b01-7ff77d681b14 call 7ff77d694f44 644->655 658 7ff77d681b16-7ff77d681b30 call 7ff77d694f08 call 7ff77d682910 655->658 659 7ff77d681b35-7ff77d681b4e call 7ff77d69039c 655->659 658->622 665 7ff77d681b50-7ff77d681b6a call 7ff77d694f08 call 7ff77d682910 659->665 666 7ff77d681b6f-7ff77d681b8b call 7ff77d690110 659->666 665->622 673 7ff77d681b9e-7ff77d681bac 666->673 674 7ff77d681b8d-7ff77d681b99 call 7ff77d682710 666->674 673->622 677 7ff77d681bb2-7ff77d681bb9 673->677 674->622 679 7ff77d681bc1-7ff77d681bc7 677->679 680 7ff77d681bc9-7ff77d681bd6 679->680 681 7ff77d681be0-7ff77d681bef 679->681 682 7ff77d681bf1-7ff77d681bfa 680->682 681->681 681->682 683 7ff77d681bfc-7ff77d681bff 682->683 684 7ff77d681c0f 682->684 683->684 686 7ff77d681c01-7ff77d681c04 683->686 685 7ff77d681c11-7ff77d681c24 684->685 688 7ff77d681c2d-7ff77d681c39 685->688 689 7ff77d681c26 685->689 686->684 687 7ff77d681c06-7ff77d681c09 686->687 687->684 690 7ff77d681c0b-7ff77d681c0d 687->690 688->622 688->679 689->688 690->685
                        APIs
                          • Part of subcall function 00007FF77D687F90: _fread_nolock.LIBCMT ref: 00007FF77D68803A
                        • _fread_nolock.LIBCMT ref: 00007FF77D681A1B
                          • Part of subcall function 00007FF77D682910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF77D681B6A), ref: 00007FF77D68295E
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _fread_nolock$CurrentProcess
                        • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                        • API String ID: 2397952137-3497178890
                        • Opcode ID: b18f55c6ecb75a3fc56284abae084b4e17b12eab67ba0458cb036b44204923da
                        • Instruction ID: 83922bc56829acc6bac01e1bf8f7adc290153d9d7fcf2b094e8aaa3f7ec5f98e
                        • Opcode Fuzzy Hash: b18f55c6ecb75a3fc56284abae084b4e17b12eab67ba0458cb036b44204923da
                        • Instruction Fuzzy Hash: 2C816272E3C686C5EB60AB14D0502BAA792EF887C4F844635D98DC7685FE3CE5858760

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                        • API String ID: 2050909247-3659356012
                        • Opcode ID: d2721f8f4a1b86741b69537dbfe1e2307113a529978f64cbd07fd1568b1093b8
                        • Instruction ID: 1c993f77c24be8577f77987fd2f93e51290cf9efd07bd9fdbf9392e402d31871
                        • Opcode Fuzzy Hash: d2721f8f4a1b86741b69537dbfe1e2307113a529978f64cbd07fd1568b1093b8
                        • Instruction Fuzzy Hash: D1417EA3E3C64285EB10EB2194105BAE392BF847D4FC44A32ED4D87A99FE3CE5418725

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorLast$Eval_Thread$CheckErr_RestoreSaveSignalsconnect
                        • String ID: 3'
                        • API String ID: 4284410693-280543908
                        • Opcode ID: 5ee1b2844932ffeb3788b70137a3e3ec97db18574fdf692120edec56d670c67d
                        • Instruction ID: 4adae62879985039c43fc6627b2dac055c004e2c493851fd361ff8f2373c725e
                        • Opcode Fuzzy Hash: 5ee1b2844932ffeb3788b70137a3e3ec97db18574fdf692120edec56d670c67d
                        • Instruction Fuzzy Hash: 18313225F08F428AF7604F67A544279A690AF64FB4F048175EE6EB37B5DF3CE4408648

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 895 7ff77d681210-7ff77d68126d call 7ff77d68bd80 898 7ff77d681297-7ff77d6812af call 7ff77d694f44 895->898 899 7ff77d68126f-7ff77d681296 call 7ff77d682710 895->899 904 7ff77d6812d4-7ff77d6812e4 call 7ff77d694f44 898->904 905 7ff77d6812b1-7ff77d6812cf call 7ff77d694f08 call 7ff77d682910 898->905 911 7ff77d681309-7ff77d68131b 904->911 912 7ff77d6812e6-7ff77d681304 call 7ff77d694f08 call 7ff77d682910 904->912 917 7ff77d681439-7ff77d68146d call 7ff77d68ba60 call 7ff77d694f30 * 2 905->917 913 7ff77d681320-7ff77d681345 call 7ff77d69039c 911->913 912->917 924 7ff77d68134b-7ff77d681355 call 7ff77d690110 913->924 925 7ff77d681431 913->925 924->925 931 7ff77d68135b-7ff77d681367 924->931 925->917 933 7ff77d681370-7ff77d681398 call 7ff77d68a1c0 931->933 936 7ff77d68139a-7ff77d68139d 933->936 937 7ff77d681416-7ff77d68142c call 7ff77d682710 933->937 939 7ff77d681411 936->939 940 7ff77d68139f-7ff77d6813a9 936->940 937->925 939->937 941 7ff77d6813ab-7ff77d6813b9 call 7ff77d690adc 940->941 942 7ff77d6813d4-7ff77d6813d7 940->942 946 7ff77d6813be-7ff77d6813c1 941->946 944 7ff77d6813ea-7ff77d6813ef 942->944 945 7ff77d6813d9-7ff77d6813e7 call 7ff77d6a9e30 942->945 944->933 948 7ff77d6813f5-7ff77d6813f8 944->948 945->944 949 7ff77d6813c3-7ff77d6813cd call 7ff77d690110 946->949 950 7ff77d6813cf-7ff77d6813d2 946->950 952 7ff77d68140c-7ff77d68140f 948->952 953 7ff77d6813fa-7ff77d6813fd 948->953 949->944 949->950 950->937 952->925 953->937 955 7ff77d6813ff-7ff77d681407 953->955 955->913
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                        • API String ID: 2050909247-2813020118
                        • Opcode ID: ab383ac4b995131bdd40696453c0f16ebeee9cffe796343d9728e2385cbc1d23
                        • Instruction ID: 6fc43e447a5e945ef554c006f7a8bc8e178cab03547c7e4315cf93f1e5f21b37
                        • Opcode Fuzzy Hash: ab383ac4b995131bdd40696453c0f16ebeee9cffe796343d9728e2385cbc1d23
                        • Instruction Fuzzy Hash: 8951BE63E3CA4281EA60BB15A4503BBA693BF857D4FC44235ED4D87799FE3CE5428720

                        Control-flow Graph

                        APIs
                        • GetModuleFileNameW.KERNEL32(?,00007FF77D683804), ref: 00007FF77D6836E1
                        • GetLastError.KERNEL32(?,00007FF77D683804), ref: 00007FF77D6836EB
                          • Part of subcall function 00007FF77D682C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682C9E
                          • Part of subcall function 00007FF77D682C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682D63
                          • Part of subcall function 00007FF77D682C50: MessageBoxW.USER32 ref: 00007FF77D682D99
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                        • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                        • API String ID: 3187769757-2863816727
                        • Opcode ID: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                        • Instruction ID: 2e476d2f6d941a74fd16b2d7717fb61c0f2e0d329c3e561c0342d00257dee15e
                        • Opcode Fuzzy Hash: 7a7bb6314ef99d1ea6b5a99dff4d55fbb7227be169d5ba9e119ffda366a0a745
                        • Instruction Fuzzy Hash: 9E212162F3C642C1FA20B724E8152BB9252BF983D4FC04336D59EC66D5FE2CE5048724

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1056 7ff77d69ba5c-7ff77d69ba82 1057 7ff77d69ba84-7ff77d69ba98 call 7ff77d694ee8 call 7ff77d694f08 1056->1057 1058 7ff77d69ba9d-7ff77d69baa1 1056->1058 1074 7ff77d69be8e 1057->1074 1060 7ff77d69be77-7ff77d69be83 call 7ff77d694ee8 call 7ff77d694f08 1058->1060 1061 7ff77d69baa7-7ff77d69baae 1058->1061 1080 7ff77d69be89 call 7ff77d69a8e0 1060->1080 1061->1060 1063 7ff77d69bab4-7ff77d69bae2 1061->1063 1063->1060 1066 7ff77d69bae8-7ff77d69baef 1063->1066 1069 7ff77d69baf1-7ff77d69bb03 call 7ff77d694ee8 call 7ff77d694f08 1066->1069 1070 7ff77d69bb08-7ff77d69bb0b 1066->1070 1069->1080 1072 7ff77d69bb11-7ff77d69bb17 1070->1072 1073 7ff77d69be73-7ff77d69be75 1070->1073 1072->1073 1078 7ff77d69bb1d-7ff77d69bb20 1072->1078 1077 7ff77d69be91-7ff77d69bea8 1073->1077 1074->1077 1078->1069 1082 7ff77d69bb22-7ff77d69bb47 1078->1082 1080->1074 1085 7ff77d69bb7a-7ff77d69bb81 1082->1085 1086 7ff77d69bb49-7ff77d69bb4b 1082->1086 1087 7ff77d69bb83-7ff77d69bb8f call 7ff77d69d5fc 1085->1087 1088 7ff77d69bb56-7ff77d69bb6d call 7ff77d694ee8 call 7ff77d694f08 call 7ff77d69a8e0 1085->1088 1089 7ff77d69bb72-7ff77d69bb78 1086->1089 1090 7ff77d69bb4d-7ff77d69bb54 1086->1090 1096 7ff77d69bb94-7ff77d69bbab call 7ff77d69a948 * 2 1087->1096 1122 7ff77d69bd00 1088->1122 1093 7ff77d69bbf8-7ff77d69bc0f 1089->1093 1090->1088 1090->1089 1094 7ff77d69bc11-7ff77d69bc19 1093->1094 1095 7ff77d69bc8a-7ff77d69bc94 call 7ff77d6a391c 1093->1095 1094->1095 1098 7ff77d69bc1b-7ff77d69bc1d 1094->1098 1108 7ff77d69bc9a-7ff77d69bcaf 1095->1108 1109 7ff77d69bd1e 1095->1109 1117 7ff77d69bbc8-7ff77d69bbf3 call 7ff77d69c284 1096->1117 1118 7ff77d69bbad-7ff77d69bbc3 call 7ff77d694f08 call 7ff77d694ee8 1096->1118 1098->1095 1102 7ff77d69bc1f-7ff77d69bc35 1098->1102 1102->1095 1106 7ff77d69bc37-7ff77d69bc43 1102->1106 1106->1095 1111 7ff77d69bc45-7ff77d69bc47 1106->1111 1108->1109 1114 7ff77d69bcb1-7ff77d69bcc3 GetConsoleMode 1108->1114 1113 7ff77d69bd23-7ff77d69bd43 ReadFile 1109->1113 1111->1095 1116 7ff77d69bc49-7ff77d69bc61 1111->1116 1119 7ff77d69bd49-7ff77d69bd51 1113->1119 1120 7ff77d69be3d-7ff77d69be46 GetLastError 1113->1120 1114->1109 1121 7ff77d69bcc5-7ff77d69bccd 1114->1121 1116->1095 1126 7ff77d69bc63-7ff77d69bc6f 1116->1126 1117->1093 1118->1122 1119->1120 1128 7ff77d69bd57 1119->1128 1123 7ff77d69be63-7ff77d69be66 1120->1123 1124 7ff77d69be48-7ff77d69be5e call 7ff77d694f08 call 7ff77d694ee8 1120->1124 1121->1113 1130 7ff77d69bccf-7ff77d69bcf1 ReadConsoleW 1121->1130 1125 7ff77d69bd03-7ff77d69bd0d call 7ff77d69a948 1122->1125 1136 7ff77d69bcf9-7ff77d69bcfb call 7ff77d694e7c 1123->1136 1137 7ff77d69be6c-7ff77d69be6e 1123->1137 1124->1122 1125->1077 1126->1095 1135 7ff77d69bc71-7ff77d69bc73 1126->1135 1139 7ff77d69bd5e-7ff77d69bd73 1128->1139 1131 7ff77d69bd12-7ff77d69bd1c 1130->1131 1132 7ff77d69bcf3 GetLastError 1130->1132 1131->1139 1132->1136 1135->1095 1144 7ff77d69bc75-7ff77d69bc85 1135->1144 1136->1122 1137->1125 1139->1125 1146 7ff77d69bd75-7ff77d69bd80 1139->1146 1144->1095 1149 7ff77d69bd82-7ff77d69bd9b call 7ff77d69b674 1146->1149 1150 7ff77d69bda7-7ff77d69bdaf 1146->1150 1155 7ff77d69bda0-7ff77d69bda2 1149->1155 1151 7ff77d69bdb1-7ff77d69bdc3 1150->1151 1152 7ff77d69be2b-7ff77d69be38 call 7ff77d69b4b4 1150->1152 1156 7ff77d69bdc5 1151->1156 1157 7ff77d69be1e-7ff77d69be26 1151->1157 1152->1155 1155->1125 1160 7ff77d69bdca-7ff77d69bdd1 1156->1160 1157->1125 1161 7ff77d69bdd3-7ff77d69bdd7 1160->1161 1162 7ff77d69be0d-7ff77d69be18 1160->1162 1163 7ff77d69bdf3 1161->1163 1164 7ff77d69bdd9-7ff77d69bde0 1161->1164 1162->1157 1166 7ff77d69bdf9-7ff77d69be09 1163->1166 1164->1163 1165 7ff77d69bde2-7ff77d69bde6 1164->1165 1165->1163 1167 7ff77d69bde8-7ff77d69bdf1 1165->1167 1166->1160 1168 7ff77d69be0b 1166->1168 1167->1166 1168->1157
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: c3f57b6cd1f658b3a1cfdd45bc75f21d2f6c8be166295f0eb40444005b392bd6
                        • Instruction ID: 80d9848ce04a3ccc5ac468d0a5d3889eb111a81db3293cd5f5d8d96e5f846de3
                        • Opcode Fuzzy Hash: c3f57b6cd1f658b3a1cfdd45bc75f21d2f6c8be166295f0eb40444005b392bd6
                        • Instruction Fuzzy Hash: 21C1D523D3C68691E650AB1990802BFBF57FB81BC0F950379EA4D83395EE7CE4498721

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1169 7ffe1333599c-7ffe133359d4 1170 7ffe133359e2-7ffe133359ec 1169->1170 1171 7ffe133359d6-7ffe133359e0 1169->1171 1172 7ffe133359f7-7ffe13335a38 _PyArg_UnpackKeywords 1170->1172 1173 7ffe133359ee-7ffe133359f5 1170->1173 1171->1172 1174 7ffe13335a3e-7ffe13335a41 1172->1174 1175 7ffe13335ad6 1172->1175 1173->1172 1173->1174 1177 7ffe13335abf-7ffe13335acf call 7ffe13335afc 1174->1177 1178 7ffe13335a43-7ffe13335a49 1174->1178 1176 7ffe13335adb-7ffe13335af9 call 7ffe13332a00 1175->1176 1188 7ffe13335ad4 1177->1188 1179 7ffe13335a69-7ffe13335a70 1178->1179 1180 7ffe13335a4b-7ffe13335a56 _PyLong_AsInt 1178->1180 1186 7ffe13335a90-7ffe13335a97 1179->1186 1187 7ffe13335a72-7ffe13335a7d _PyLong_AsInt 1179->1187 1183 7ffe13335a63-7ffe13335a67 1180->1183 1184 7ffe13335a58-7ffe13335a61 PyErr_Occurred 1180->1184 1183->1177 1183->1179 1184->1175 1184->1183 1191 7ffe13335a99-7ffe13335aa5 _PyLong_AsInt 1186->1191 1192 7ffe13335abb 1186->1192 1189 7ffe13335a7f-7ffe13335a88 PyErr_Occurred 1187->1189 1190 7ffe13335a8a-7ffe13335a8e 1187->1190 1188->1176 1189->1175 1189->1190 1190->1177 1190->1186 1193 7ffe13335ab2-7ffe13335ab9 1191->1193 1194 7ffe13335aa7-7ffe13335ab0 PyErr_Occurred 1191->1194 1192->1177 1193->1177 1193->1192 1194->1175 1194->1193
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_Long_Occurred$Arg_KeywordsUnpack
                        • String ID:
                        • API String ID: 591546834-0
                        • Opcode ID: eaa410074ab6af26ceaef7c7596cb67db9cb42dc3dbf0cc41afd0b861dd1535a
                        • Instruction ID: 6ac3a1aaa2476cb816bcf56a99ddc9b1bafe6f3906480d3bc7f45471325f6687
                        • Opcode Fuzzy Hash: eaa410074ab6af26ceaef7c7596cb67db9cb42dc3dbf0cc41afd0b861dd1535a
                        • Instruction Fuzzy Hash: 9541A362A19E42CAFE529B63A454374A290BF24FB4F188675DE3D637E0DF3CE4849344

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                        • API String ID: 2050909247-2434346643
                        • Opcode ID: 111e0a7e53993944da2df5d9c96cd3a7cea32e86f931b773c4ccd6a62d35c348
                        • Instruction ID: e930acdb83edfe63373f6dbed40ed639e00ecd0f7df7aa3d1f0f0edfdebd16b6
                        • Opcode Fuzzy Hash: 111e0a7e53993944da2df5d9c96cd3a7cea32e86f931b773c4ccd6a62d35c348
                        • Instruction Fuzzy Hash: D0412932E3C686D1EA15EB60E4542EAA352FB943C4FC04232DA9D83695FF3CE559C760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_AuditFreeMem_ParseSizeSys_Tuple_
                        • String ID: et:gethostbyname$idna$socket.gethostbyname
                        • API String ID: 3195760359-1353326193
                        • Opcode ID: 8c3671177d6417e8f700e328b80b74f8916f546f18c6b125032ce1e96dbaf85f
                        • Instruction ID: 03d6ba511f82d25d6f243373a026db6e17cc10f129c529ce798c670919311f0d
                        • Opcode Fuzzy Hash: 8c3671177d6417e8f700e328b80b74f8916f546f18c6b125032ce1e96dbaf85f
                        • Instruction Fuzzy Hash: F1115461B18E8289E7109B23F4441A6A761FFA8FE4F408171EAAE67775DE3CD145C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Restore$Err_ErrorFromLastSaveWindowsioctlsocket
                        • String ID:
                        • API String ID: 863680558-0
                        • Opcode ID: 964070f957597cead12d681d8d9d4b975f1a861eb6e29b6fc22a496edc13ce25
                        • Instruction ID: e62046da84133128b76eda7a5a6240090914351252c905e921934f5329109777
                        • Opcode Fuzzy Hash: 964070f957597cead12d681d8d9d4b975f1a861eb6e29b6fc22a496edc13ce25
                        • Instruction Fuzzy Hash: CB014425B19E42C6E3509B77F444169A3A0EF98FF1B508070E96E63774CE3CD4D58704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 1279662727-0
                        • Opcode ID: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                        • Instruction ID: ea7e72c7268e0419abb72c941a83c969c7be7a1269a0cadce512aafad17464ad
                        • Opcode Fuzzy Hash: b1746a8a916bbf96797ffba89da9809a683c49b2a7b1d8f7dd6efe5c63c8eb6a
                        • Instruction Fuzzy Hash: A7419273D3C78183E610AB20951037AA662FB943E4F508339EA9C47AD5EF6CA5A08710
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$RestoreSaveTime_Timeval_clampselect
                        • String ID:
                        • API String ID: 3905867726-0
                        • Opcode ID: 12a889711c2c2e54b49b1f454469c8620633830652707fbfba1c602784efdac5
                        • Instruction ID: b6401b1962018c88e5468518815d68d8756b9dae774ccf28dc6e9be0a8189d48
                        • Opcode Fuzzy Hash: 12a889711c2c2e54b49b1f454469c8620633830652707fbfba1c602784efdac5
                        • Instruction Fuzzy Hash: F931B872B08F818AE760CF27A8443A5A390FB98BB4F504275DA7D637A4DF3CD4058708
                        APIs
                          • Part of subcall function 00007FFE13333DD0: PyErr_Format.PYTHON312 ref: 00007FFE13334154
                        • PySys_Audit.PYTHON312 ref: 00007FFE133353FC
                          • Part of subcall function 00007FFE13334484: PyEval_SaveThread.PYTHON312 ref: 00007FFE133344A2
                          • Part of subcall function 00007FFE13334484: connect.WS2_32 ref: 00007FFE133344B5
                          • Part of subcall function 00007FFE13334484: PyEval_RestoreThread.PYTHON312 ref: 00007FFE133344C0
                          • Part of subcall function 00007FFE13334484: WSAGetLastError.WS2_32 ref: 00007FFE133344CE
                          • Part of subcall function 00007FFE13334484: WSAGetLastError.WS2_32 ref: 00007FFE133344DA
                          • Part of subcall function 00007FFE13334484: PyErr_CheckSignals.PYTHON312 ref: 00007FFE133344E7
                          • Part of subcall function 00007FFE13334484: WSASetLastError.WS2_32 ref: 00007FFE13334501
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorLast$Err_Eval_Thread$AuditCheckFormatRestoreSaveSignalsSys_connect
                        • String ID: connect$socket.connect
                        • API String ID: 2206401578-326844852
                        • Opcode ID: f61d2d1e51494460e737621043c48afaf6b2b37121598ef846ec6ce56cffa346
                        • Instruction ID: 62ac3c42190a2e0aa211a407fecc58f078779d752994e60564538a6204a19685
                        • Opcode Fuzzy Hash: f61d2d1e51494460e737621043c48afaf6b2b37121598ef846ec6ce56cffa346
                        • Instruction Fuzzy Hash: 9F115B21B08E82C9FB209B13F4403A6B360BF64BE4F409072DE6D67AA5DE3CE141C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 3251591375-0
                        • Opcode ID: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                        • Instruction ID: 914ca16ccf4346beff4d0740888d0e3adcdcd3908f1196b53007a2791beb6d9e
                        • Opcode Fuzzy Hash: b3dd18574e8b698ea28c35ed35ed65a6730a16d6ac14c38d0a8ba428da0d66bc
                        • Instruction Fuzzy Hash: 2E314A23E3C24385FA14BB6594212BBA6839F853C4FC55235EA4DC72D7FE2CA808C230
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 148d460979eed4a43ebbf671c65dc2dc638c0d89c9c01e8e00358d5495882c84
                        • Instruction ID: 34d50d27d36c7eb228f4ae2060e3627701440c600119799c8ca60bb6fb0ff0f3
                        • Opcode Fuzzy Hash: 148d460979eed4a43ebbf671c65dc2dc638c0d89c9c01e8e00358d5495882c84
                        • Instruction Fuzzy Hash: 11D09E12F3C74642EB183F755C5507E965BAF88781F94267DC84BC6393FD2CA8494320
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                        • Instruction ID: 21c0bdc59a7a93c0742b9ae98d83d451d752be6ea68830a80dd56eb435c3a41b
                        • Opcode Fuzzy Hash: 2fd4b9cf4e2c203a215f80a0453bc9b94d2a0e119ef729a2f51343e3c0f92604
                        • Instruction Fuzzy Hash: F451D823F3D24286E764BA65940067BA793AF84BE4F984778DD6DD37C9EE3CD4018620
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                        • Instruction ID: fe1c6438bf410d08f137c0ca01d62abe3ad886dae487efa23d711f97814a878c
                        • Opcode Fuzzy Hash: 7d52f85de62641260209e8dbb28c5e1251e01e8bf24b4306ce9dcd9badf2c9c6
                        • Instruction Fuzzy Hash: A811B662A3CA4181DA209B15B85417AB753AB45FF4F944335EE7D877D5EE3CD0118704
                        APIs
                        • CloseHandle.KERNELBASE(?,?,?,00007FF77D69A9D5,?,?,00000000,00007FF77D69AA8A), ref: 00007FF77D69ABC6
                        • GetLastError.KERNEL32(?,?,?,00007FF77D69A9D5,?,?,00000000,00007FF77D69AA8A), ref: 00007FF77D69ABD0
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                        • Instruction ID: e2ad6391bf9841f06cbde35e8cc9902471aad44a92eb800acae98f259ce72047
                        • Opcode Fuzzy Hash: ae1e15d82824e1a5fac1c7302ca2ff5641fe0b0e43db7728cd9339717749910c
                        • Instruction Fuzzy Hash: 8A219252F3C68241EAA07751959037FA6C39F84BE4F8443BDE96ECB7D5EE6CE4414220
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                        • Instruction ID: 1341a35870d3daf0a261345285948970b17c3c62fb942517886956d6244abe96
                        • Opcode Fuzzy Hash: 5a303e376ae32d58fd1e52f1ac99a64fdc1cf63549abbe0bdd4da132c2ec767e
                        • Instruction Fuzzy Hash: C541A833D3C24187EA24AB19A58017AB7A3EB55BC0F500379D68EC36D5EF6CE402CB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _fread_nolock
                        • String ID:
                        • API String ID: 840049012-0
                        • Opcode ID: 099000bfa7eb4d531f925c94d3ef225b080b4c69407bccb7aa9f501698e7d18a
                        • Instruction ID: 95eef0b9fb9ae0f7f0e94ee4543e26550f4de6ba46678be69ddfdd3d6290369d
                        • Opcode Fuzzy Hash: 099000bfa7eb4d531f925c94d3ef225b080b4c69407bccb7aa9f501698e7d18a
                        • Instruction Fuzzy Hash: D6216F22F7C69286EA50BA2269043BBD752BF45FC4FC84535EE0D9B786EE7DE0418210
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                        • Instruction ID: 3e39e0dda8aef983554fb3a1958000068eba41bd1e8be829d58bd4f8ac2e56f6
                        • Opcode Fuzzy Hash: 0fe3e981c7cf3185d146a9a4244026f2f164e791e6f92d2a50fd94940550a020
                        • Instruction Fuzzy Hash: 3E317423E3C60285E6117B69948137EAA53AF95BE0FC10379D91D833D2EE7CE4418735
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: HandleModule$AddressFreeLibraryProc
                        • String ID:
                        • API String ID: 3947729631-0
                        • Opcode ID: 42808d7c08696a35870eb95595f0ae95ff90971c005bfc8769c42bb91e99b0de
                        • Instruction ID: 27d2d722566f3883fccce894ffa33606881ef06c02cb5dc04ad4876933af58f1
                        • Opcode Fuzzy Hash: 42808d7c08696a35870eb95595f0ae95ff90971c005bfc8769c42bb91e99b0de
                        • Instruction Fuzzy Hash: 31219C72E2874589EB24AF74C4802BD33AAEB04358F84163BE75C86A85FF38D444C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                        • Instruction ID: 136951fb9509d705491368f8ee86a25d4afcc9f1a3e8ff0f38ff872a8c37cef5
                        • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                        • Instruction Fuzzy Hash: 27113333E3D64281EA60BF11940017BE667AF85BD4F844679EA8C97A9DEF3DE4015720
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                        • Instruction ID: d1bb41677979dd9643b95bed57c614ae39378a41c57e0cf896c9ca7ba700f38e
                        • Opcode Fuzzy Hash: 3765a10cee1e255344ee37f065f4be71d58868c9c9e645b3056c9746d3493235
                        • Instruction Fuzzy Hash: D821A473A3CA4286DB60AF58D44037AB6A2FBD4B94F944334E69D876D5EF3CD4018B10
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                        • Instruction ID: 027e05393a801b3cf4312072a579ee1b0245e3008372fa877798353260f46892
                        • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                        • Instruction Fuzzy Hash: F8017022E3C74180E644BB52990007AE793AB95FE0F884775EE5CA3BDAEE3CD4118310
                        APIs
                          • Part of subcall function 00007FF77D689390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF77D6845F4,00000000,00007FF77D681985), ref: 00007FF77D6893C9
                        • LoadLibraryExW.KERNELBASE(?,00007FF77D686476,?,00007FF77D68336E), ref: 00007FF77D688EA2
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ByteCharLibraryLoadMultiWide
                        • String ID:
                        • API String ID: 2592636585-0
                        • Opcode ID: 3eee33850ff877a76f59ec51b6af72cd7d073a691558276a485592abc3036afa
                        • Instruction ID: db3d74427a2f92bbedf783d37f0326c31954e9341216ed21b0192f6d2321361b
                        • Opcode Fuzzy Hash: 3eee33850ff877a76f59ec51b6af72cd7d073a691558276a485592abc3036afa
                        • Instruction Fuzzy Hash: 58D0CD02F3815542EA44B767754663A91535FC9BC0FC8C035EE4D43749FC3CD0414700
                        APIs
                        • HeapAlloc.KERNEL32(?,?,?,00007FF77D690C90,?,?,?,00007FF77D6922FA,?,?,?,?,?,00007FF77D693AE9), ref: 00007FF77D69D63A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                        • Instruction ID: e83b0a8adcd1f60e09fa382d63607825a85069ea51ee0710c564be3489a39218
                        • Opcode Fuzzy Hash: 510c613edcbd96140e332c46b5608733b20d975e117422ad796dc4540c81bb80
                        • Instruction Fuzzy Hash: 83F03A26E7D20240FE547BA1585527692934FC47E0F8C0778DA2EC62C2FD2CA4808930
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$ErrorLast$ObjectProcessSingleWait$CloseCreateHandlePeekWindow_invalid_parameter_noinfo$ByteCharClassCodeCommandConsoleCtrlCurrentDestroyDispatchExitFormatHandlerInfoLineMultiRegisterStartupTerminateTranslateWide
                        • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
                        • API String ID: 3832162212-3165540532
                        • Opcode ID: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                        • Instruction ID: 34e00377a7c517d4f3711e910cfb026c9c9e8db004f15c7c2e3c4c669b66cad1
                        • Opcode Fuzzy Hash: 99838be411f58a84d89697932930ae4644c798f1dd42cd928399edbb9bf0e48e
                        • Instruction Fuzzy Hash: BCD15533E3CA8286E710AF34E8542AABB62FF84B94F800335DA5D87695EF3CD5458750
                        APIs
                        • WSAGetLastError.WS2_32 ref: 00007FFE13333B4A
                          • Part of subcall function 00007FFE13334B14: _Py_BuildValue_SizeT.PYTHON312(?,?,?,00007FFE13333B5A), ref: 00007FFE13334B2F
                          • Part of subcall function 00007FFE13334B14: PyErr_SetObject.PYTHON312(?,?,?,00007FFE13333B5A), ref: 00007FFE13334B44
                          • Part of subcall function 00007FFE13334B14: _Py_Dealloc.PYTHON312(?,?,?,00007FFE13333B5A), ref: 00007FFE13334B58
                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE13333B6E
                        • PyErr_SetFromErrno.PYTHON312 ref: 00007FFE13333B84
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_$BuildDeallocErrnoErrorFromLastObjectSizeValue__errno
                        • String ID: NOO$surrogatepass$unsupported address family
                        • API String ID: 316901363-472101058
                        • Opcode ID: b91f96f39c30ed59f8962875126381abc059683d57aa2602eb85b04b624b84c7
                        • Instruction ID: 407dead9bf38496847ba8c84407135c9e545c47bef09f57d6d523f07ff94e995
                        • Opcode Fuzzy Hash: b91f96f39c30ed59f8962875126381abc059683d57aa2602eb85b04b624b84c7
                        • Instruction Fuzzy Hash: C5816021E09E4689EA558F22A444279E3A0FF65FB5F04C175DA6D637B4EF3CE481C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Mem_$FreeSubtypeType_$DataErr_FromKindMallocMemoryReallocUnicode_
                        • String ID:
                        • API String ID: 3719493655-0
                        • Opcode ID: 0b61fa8abd9dfcdf7751d429d18c280f61a1d7a5a4373fae919a70ebd3257318
                        • Instruction ID: 4fa7ae44544d6461abb3095b6afa45663efd54d19575fb4517c2f3d43d72559f
                        • Opcode Fuzzy Hash: 0b61fa8abd9dfcdf7751d429d18c280f61a1d7a5a4373fae919a70ebd3257318
                        • Instruction Fuzzy Hash: 13020372B0CA9282EB258F14E45477927A1FB85786F584131D78E867BAEE3DF944C308
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 313767242-0
                        • Opcode ID: 5130b0c2a8b4ddc3ad2379c44f9e6e14e4431d38d65cb8e8484721bef110eafb
                        • Instruction ID: 2bee7c634e848ba860b70c4efc3d09a5c8cd37528dfe8bb370483b3e27ef7693
                        • Opcode Fuzzy Hash: 5130b0c2a8b4ddc3ad2379c44f9e6e14e4431d38d65cb8e8484721bef110eafb
                        • Instruction Fuzzy Hash: 7C313B72609F818AEB608F61E8803EDB364FB94B64F44803ADA5E57BA5DF3CD548C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 313767242-0
                        • Opcode ID: 077b0f214cb87451efc13930c849abf149ec882450af492fe5d50a1ac414abff
                        • Instruction ID: 4078ca2cf40a8712100cdaf5ce872dc258a52ac47d6736011578d35cc5faec49
                        • Opcode Fuzzy Hash: 077b0f214cb87451efc13930c849abf149ec882450af492fe5d50a1ac414abff
                        • Instruction Fuzzy Hash: 44312C72609B819AEB608F60E8503FE7364FB84746F44443ADB4E47BAADF38D648C714
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 313767242-0
                        • Opcode ID: 99395305cdb11cdb041beb820624a25ea4585affacafc0dcd255409337a1a2bc
                        • Instruction ID: c4dff98e0cc2426d8c08e78b8292b3360ced648ed605492f40c6d5a7c958929d
                        • Opcode Fuzzy Hash: 99395305cdb11cdb041beb820624a25ea4585affacafc0dcd255409337a1a2bc
                        • Instruction Fuzzy Hash: DB311B72609F8186EB609F61E8803F9B364FB85754F44447AEA4E57BA8EF38D64C8710
                        APIs
                        • FindFirstFileW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D68842B
                        • RemoveDirectoryW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884AE
                        • DeleteFileW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884CD
                        • FindNextFileW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884DB
                        • FindClose.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884EC
                        • RemoveDirectoryW.KERNEL32(?,00007FF77D688919,00007FF77D683F9D), ref: 00007FF77D6884F5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                        • String ID: %s\*
                        • API String ID: 1057558799-766152087
                        • Opcode ID: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                        • Instruction ID: c07d5cb395715dd410a49aadce718f7da0e29f8871393ed39e3004db75572869
                        • Opcode Fuzzy Hash: 9215641a051a597ab69d89bbe09b444c24fb25eba6eed844fe9e008ab190e420
                        • Instruction Fuzzy Hash: 3A410F23E3C642C5EA60AB64B4441BBA7A2FB98BD4FD00332E69DC2695FF3CD5458750
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Mem_$MallocSubtypeType_$DeallocErr_FreeMemory
                        • String ID:
                        • API String ID: 4139299733-0
                        • Opcode ID: bb7a1583b311f9023fc161d2ea2417430d383a05e2e7d543d3dd2600494f88aa
                        • Instruction ID: 0d22f4a137b36585a2124edee999a806dac0a99209667b3ff869187a07288b90
                        • Opcode Fuzzy Hash: bb7a1583b311f9023fc161d2ea2417430d383a05e2e7d543d3dd2600494f88aa
                        • Instruction Fuzzy Hash: 43E1BDB2E0CA5382EB248F15D054B7D27A1EB51786F140131EB4F837BAEE6CEA41C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 3140674995-0
                        • Opcode ID: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                        • Instruction ID: 7d1036c6c82a6052f7ed7e1c180a54b758027f9c70dad95328147599a9ae7eed
                        • Opcode Fuzzy Hash: 357b26123f7cc0566be18cabbec560c6351d8abd4e8582c9dfa9d4018571b442
                        • Instruction Fuzzy Hash: C3311273A28B8185EB60DF64E8503EE6765FB84744F44413ADB8D87B94EF38D548C720
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$AuditErr_FormatRestoreSaveSys_bind
                        • String ID: bind$socket.bind
                        • API String ID: 1695574521-187351271
                        • Opcode ID: c772f091d13961e78706c3e49babb2eae7ea45e540c7b9e2188f6b33e05915ab
                        • Instruction ID: 50bb82d91c76d9e78f8e6753514f46ef3fcf7c032cf1a7e501cf7d51a2025156
                        • Opcode Fuzzy Hash: c772f091d13961e78706c3e49babb2eae7ea45e540c7b9e2188f6b33e05915ab
                        • Instruction Fuzzy Hash: B111DB21A09E82C5FA209B52F4443AAB364FF68FA4F048171DA5D67B64DE3CE5458708
                        APIs
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5C45
                          • Part of subcall function 00007FF77D6A5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55AC
                          • Part of subcall function 00007FF77D69A948: HeapFree.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                          • Part of subcall function 00007FF77D69A900: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF77D69A8DF,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69A909
                          • Part of subcall function 00007FF77D69A900: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF77D69A8DF,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69A92E
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5C34
                          • Part of subcall function 00007FF77D6A55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A560C
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EAA
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EBB
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5ECC
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF77D6A610C), ref: 00007FF77D6A5EF3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                        • String ID:
                        • API String ID: 4070488512-0
                        • Opcode ID: 677ea417f3249c8bdb60afb6413c0575e0f743ff33606516b420b369f71394b1
                        • Instruction ID: 84a1d99538c7b729871c4fd621ae15e0faac0752d833767e992d1e87c2e3ead1
                        • Opcode Fuzzy Hash: 677ea417f3249c8bdb60afb6413c0575e0f743ff33606516b420b369f71394b1
                        • Instruction Fuzzy Hash: E0D18F33E3C25245E724FF2595411BAA792EB947C4FC48236EA8D87A99FF3CE4418760
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                        • String ID:
                        • API String ID: 1239891234-0
                        • Opcode ID: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                        • Instruction ID: 2168f0251e0edc82cf9c3ff9d270d03f838ae3f58a0b4a548375ef2d03e2967c
                        • Opcode Fuzzy Hash: ae2d74aaff6e8c1310ec24f87c3395aa5518f909cdba62f6f822c67f0a9cc142
                        • Instruction Fuzzy Hash: D6317437A28B8185DB60DB24E8402BF77A5FB84798F940236EA9D83B55EF3CC155CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Arg_ParseRestoreSaveSizeTuple_listen
                        • String ID: |i:listen
                        • API String ID: 3610171639-1087349693
                        • Opcode ID: e8d47ebe0e10a6c5cc8300ffc03bcd4294c79b16c36a614c1882deaffce03895
                        • Instruction ID: 7d71855075454d5161dfa195fa9e40390847241e36c1d68978340be76b02f034
                        • Opcode Fuzzy Hash: e8d47ebe0e10a6c5cc8300ffc03bcd4294c79b16c36a614c1882deaffce03895
                        • Instruction Fuzzy Hash: 9A012D21E18E41CBEA558B17E88416AA370FFA4FA0F148171DA6E53B64DF3CE4958708
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFindFirst_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 2227656907-0
                        • Opcode ID: 471de8175ffa50438b20796c5ba06e190623de8bcba55c14971da5e7bf2bc1ae
                        • Instruction ID: 125be0b080765887eaaac8652f811729fe6dc44776966959b9e78c55322146d3
                        • Opcode Fuzzy Hash: 471de8175ffa50438b20796c5ba06e190623de8bcba55c14971da5e7bf2bc1ae
                        • Instruction Fuzzy Hash: 38B1A963F3C69641EA61AB2195001BBE392EB94BE4F845236DADD87785FF3CE441C320
                        APIs
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EAA
                          • Part of subcall function 00007FF77D6A55F8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A560C
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5EBB
                          • Part of subcall function 00007FF77D6A5598: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55AC
                        • _get_daylight.LIBCMT ref: 00007FF77D6A5ECC
                          • Part of subcall function 00007FF77D6A55C8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D6A55DC
                          • Part of subcall function 00007FF77D69A948: HeapFree.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF77D6A610C), ref: 00007FF77D6A5EF3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 3458911817-0
                        • Opcode ID: 179af59534a267e8b56f66eebf2dbf2058aebcf107c16e98e161f461d30bd41f
                        • Instruction ID: b288ef16ba4581bc56b0ebfd55469ac10e8c2754b8a98275d16c27a205f8ae34
                        • Opcode Fuzzy Hash: 179af59534a267e8b56f66eebf2dbf2058aebcf107c16e98e161f461d30bd41f
                        • Instruction Fuzzy Hash: D6513033E3C64286E710FF25D5815AAE762BB987C4F804236EA8DC7695EF3CE4418760
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: memsetrecvfrom
                        • String ID:
                        • API String ID: 3853191257-0
                        • Opcode ID: f031a1c2a463a518b847baec274cdf4d934d90cae8577544affea3f0f72a4b2a
                        • Instruction ID: 94fd41cdad84d617df0d6043dd33423bf33e90b12e5fd7e019f0f371e1c1a457
                        • Opcode Fuzzy Hash: f031a1c2a463a518b847baec274cdf4d934d90cae8577544affea3f0f72a4b2a
                        • Instruction Fuzzy Hash: B5F019B6A14F8586DB208F26E080169B3B1F798FE8F248221DF6C577A8DF38C491C744
                        APIs
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685840
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685852
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685889
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68589B
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858B4
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858C6
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858DF
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6858F1
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68590D
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68591F
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68593B
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68594D
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685969
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D68597B
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D685997
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859A9
                        • GetProcAddress.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859C5
                        • GetLastError.KERNEL32(?,00007FF77D6864CF,?,00007FF77D68336E), ref: 00007FF77D6859D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressErrorLastProc
                        • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                        • API String ID: 199729137-653951865
                        • Opcode ID: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                        • Instruction ID: 79a2aa684798d68db572ee7fe86d9353dcc48203dacf02854a67bea2127dd6c7
                        • Opcode Fuzzy Hash: a72b1b0889ffc37889110ad0e4f068dcb4eb8b0bbe2e77bf2d8672c26fae6e03
                        • Instruction Fuzzy Hash: 90229266E3DB17D1FA05BB69A814577A7A2AF847C1BC51336C49E82364FF3CB5488230
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressErrorLastProc
                        • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                        • API String ID: 199729137-3427451314
                        • Opcode ID: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                        • Instruction ID: e2cd111523718ad98217b7b84b7b650eb24fd88aca6d7889f8e3b3a670434045
                        • Opcode Fuzzy Hash: 939c8a0ebf27c7f5789cd4a10996167767bc86255d761b2ba34a42bc6fc861e3
                        • Instruction Fuzzy Hash: 8E02B762D3DB07D1EA14BB59A8105B7A7A3AF857C5FC41331D5AE82260FF7CB5898230
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $this $unsigned $void$volatile$wchar_t
                        • API String ID: 2943138195-1482988683
                        • Opcode ID: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                        • Instruction ID: 5c88346a1f5f333869e985466dc0456801a4d5599bf480a8075749a0f3c82d9e
                        • Opcode Fuzzy Hash: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                        • Instruction Fuzzy Hash: 810262B6F18E1288FB14AB66D9501FC27B1BB06B64F5441F7CA0D93ABADF2C9564C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_Format$Deallochtons
                        • String ID: %s(): AF_HYPERV address must be tuple, not %.500s$%s(): AF_HYPERV address service_id is not a valid UUID string$%s(): AF_HYPERV address vm_id is not a valid UUID string$%s(): AF_INET address must be tuple, not %.500s$%s(): AF_INET6 address must be tuple, not %.500s$%s(): bad family$%s(): flowinfo must be 0-1048575.$%s(): port must be 0-65535.$%s(): unknown Bluetooth protocol$%s(): unsupported AF_HYPERV protocol: %d$%s(): wrong format$O&i;AF_INET address must be a pair (host, port)$O&i|II;AF_INET6 address must be a tuple (host, port[, flowinfo[, scopeid]])$UU;AF_HYPERV address must be a str tuple (vm_id, service_id)
                        • API String ID: 2819711985-3631354148
                        • Opcode ID: 45b9cbe3931565f39d19f7ca0834f8d3210d56543519b54c99f57147fbdc8962
                        • Instruction ID: d5ac2b6c49ca719d282243b67acb9f24d8f67bab467bca62badb96a3fdb3e5f4
                        • Opcode Fuzzy Hash: 45b9cbe3931565f39d19f7ca0834f8d3210d56543519b54c99f57147fbdc8962
                        • Instruction Fuzzy Hash: 7EC11A76A08E46C9EB108F67D8442B9A3A0FB64FA8F508172DA6D67774DF3CE554C308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Dealloc$String$Err_Eval_List_SizeThreadUnicode_freeaddrinfo$AppendArg_AuditBuildEncodedKeywords_Object_ParseRestoreSaveSys_TupleValue_getaddrinfo
                        • String ID: Int or String expected$OOiii$OO|iiii:getaddrinfo$getaddrinfo() argument 1 must be string or None$idna$iiisO$socket.getaddrinfo
                        • API String ID: 3469260611-1074899869
                        • Opcode ID: 2f423c6ffa71151a3adb167c7cdb8e101b5c9d8c3bce7bb13a85d95737d9847a
                        • Instruction ID: ecbd25fa9b85a6c27ef499063b4676d8086b4bce4410224a1b4a3b6114d2cb28
                        • Opcode Fuzzy Hash: 2f423c6ffa71151a3adb167c7cdb8e101b5c9d8c3bce7bb13a85d95737d9847a
                        • Instruction Fuzzy Hash: 2BC14E32A08E42CEEB55CF62D4446B8B7A0BB68FA4F0081B5DD6D62664DF3CE585C308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Size$Arg_Err_ParseRestoreSaveStringTuple_$AuditBuildDecodeS_snprintfSys_Unicode_Value_freeaddrinfogetaddrinfogetnameinfohtonl
                        • String ID: $(O)$IPv4 sockaddr must be 2 tuple$Oi:getnameinfo$getnameinfo() argument 1 must be a tuple$getnameinfo(): flowinfo must be 0-1048575.$si|II;getnameinfo(): illegal sockaddr argument$sockaddr resolved to multiple addresses$socket.getnameinfo$surrogatepass
                        • API String ID: 2526741257-243639936
                        • Opcode ID: 04604c1635eafd80c084e70278c0c195183a3ebb5ddeaecdd157658cd547c5cb
                        • Instruction ID: ddb83d2b85cab8a96cfefdccebe505b7838e3767ccc60cb37d8764de4ed3476f
                        • Opcode Fuzzy Hash: 04604c1635eafd80c084e70278c0c195183a3ebb5ddeaecdd157658cd547c5cb
                        • Instruction Fuzzy Hash: 59813D72A08E468AE710CF26E4402A9B3B0FB94FA4F108176DA6D67774DF7CE545CB44
                        APIs
                        • _PyTime_FromSecondsObject.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2356
                        • PyErr_ExceptionMatches.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E236A
                        • PyErr_SetString.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E23B6
                          • Part of subcall function 00007FFE148E266C: PySequence_Fast.PYTHON312(00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2694
                        • _PyDeadline_Init.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2471
                        • PyEval_SaveThread.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24AB
                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24B4
                        • select.WS2_32(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24CD
                        • PyEval_RestoreThread.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24D9
                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24DF
                        • PyErr_CheckSignals.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E24EE
                        • _PyDeadline_Get.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E250B
                        • _PyTime_AsTimeval_clamp.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2529
                        • PyErr_Occurred.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2584
                        • PyTuple_Pack.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E259D
                        • _Py_Dealloc.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E25BA
                        • _Py_Dealloc.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E25D3
                        • _Py_Dealloc.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E25EC
                        • WSAGetLastError.WS2_32(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2652
                        • PyErr_SetExcFromWindowsErr.PYTHON312(?,?,?,00007FFDFB75D250,?,?,00007FFE148E22E5), ref: 00007FFE148E2664
                          • Part of subcall function 00007FFE148E266C: PyObject_AsFileDescriptor.PYTHON312(?,?,00007FFE148E22E5), ref: 00007FFE148E2709
                          • Part of subcall function 00007FFE148E266C: PyErr_SetString.PYTHON312(?,?,00007FFE148E22E5), ref: 00007FFE148E278F
                          • Part of subcall function 00007FFE148E266C: _Py_Dealloc.PYTHON312(?,?,00007FFE148E22E5), ref: 00007FFE148E27A3
                          • Part of subcall function 00007FFE148E266C: _Py_Dealloc.PYTHON312(?,?,00007FFE148E22E5), ref: 00007FFE148E27B7
                          • Part of subcall function 00007FFE148E266C: _Py_Dealloc.PYTHON312(?,?,00007FFE148E22E5), ref: 00007FFE148E27D2
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DeallocErr_$Deadline_Eval_FromStringThreadTime__errno$CheckDescriptorErrorExceptionFastFileInitLastMatchesObjectObject_OccurredPackRestoreSaveSecondsSequence_SignalsTimeval_clampTuple_Windowsselect
                        • String ID: timeout must be a float or None$timeout must be non-negative
                        • API String ID: 1581318368-2150404077
                        • Opcode ID: d788fc8d8f2c4c3425777ff2c68e582025ccc74bbe31b0ae76aafc8d094d01c2
                        • Instruction ID: f4c3cf032189b3248589dc517d5033da8ee389644114b3521e5d41e3600ff92f
                        • Opcode Fuzzy Hash: d788fc8d8f2c4c3425777ff2c68e582025ccc74bbe31b0ae76aafc8d094d01c2
                        • Instruction Fuzzy Hash: E0912F61A08E8399EB219F26D8941B9A3A0FF46BA4F400175FA4E677B8DF3DD54DC700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BuildSizeValue_
                        • String ID: OiII$Unknown Bluetooth protocol$iy#
                        • API String ID: 1740464280-1931379703
                        • Opcode ID: 902a55de1e61e57d9b75f782d95346036916bf3d28d7f19c3b677d66217b6a38
                        • Instruction ID: 0da0ff9ca4f501d822c01c8c4d00017b7cc5c5b3e3ba7b6c1d9b492d1b1b64ac
                        • Opcode Fuzzy Hash: 902a55de1e61e57d9b75f782d95346036916bf3d28d7f19c3b677d66217b6a38
                        • Instruction Fuzzy Hash: 7C514F25A0CE429AEA649B53E544179E360BF65FB1F40C1B1DA7E736B4EF2CE484C308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+$Replicator::operator[]
                        • String ID: `anonymous namespace'
                        • API String ID: 3863519203-3062148218
                        • Opcode ID: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                        • Instruction ID: b0aecc6a5b2ee625eb65b6c04eb6cd1c2b65b4eb29808fc0c3c241776bc2e4aa
                        • Opcode Fuzzy Hash: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                        • Instruction Fuzzy Hash: A2E16DB2B08F8299EB10EF26D8801BD77A0FB45B58F4081B6EA8D17B65DF38D565C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_Release$Err_$String$From$Arg_ErrnoFormatParseSizeTuple_Unicode_inet_ntop
                        • String ID: invalid length of packed IP address string$iy*:inet_ntop$unknown address family %d
                        • API String ID: 1507301079-2822559286
                        • Opcode ID: 53b98e0b39da5fdef2c7c0ee4bcb4f09635da776308b6f8e1f3f5746954ec4bc
                        • Instruction ID: 37ea05d13dd3faf9a72bbc1d09545028be3070e5ac5b9bff6f81c3023bcc27c8
                        • Opcode Fuzzy Hash: 53b98e0b39da5fdef2c7c0ee4bcb4f09635da776308b6f8e1f3f5746954ec4bc
                        • Instruction Fuzzy Hash: B9317E21A1CE43C9EA50CB16E8507B9A3A0FFA8F64F408071D56EA7274DF3CE488C708
                        APIs
                          • Part of subcall function 00007FF77D689390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF77D6845F4,00000000,00007FF77D681985), ref: 00007FF77D6893C9
                        • ExpandEnvironmentStringsW.KERNEL32(?,00007FF77D6886B7,?,?,00000000,00007FF77D683CBB), ref: 00007FF77D68822C
                          • Part of subcall function 00007FF77D682810: MessageBoxW.USER32 ref: 00007FF77D6828EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                        • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                        • API String ID: 1662231829-930877121
                        • Opcode ID: 34679b23be2e6a85bad270fe565fa16c5e09c528fb77942a9d4832d630ea4d55
                        • Instruction ID: 13f5c94b32422a94e6a83ed4de74b14c0ac98d3864a61f303e0d215e65f1d957
                        • Opcode Fuzzy Hash: 34679b23be2e6a85bad270fe565fa16c5e09c528fb77942a9d4832d630ea4d55
                        • Instruction Fuzzy Hash: E7514113E3C642C1EA50FB65A8516BBE393AF94BC0FC44636D64EC26D5FE2CE5058760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_Err_ParseSizeTuple_$Buffer_ClearReleasesetsockopt$Format
                        • String ID: iiO!I:setsockopt$iii:setsockopt$iiy*:setsockopt$socket option is larger than %i bytes
                        • API String ID: 418579395-1608436615
                        • Opcode ID: e5620e990f8220b448d5b59fe45baab9dc0f6dbd4740d24abe31777b74632af3
                        • Instruction ID: 37eb83a0043176d8e38104c07592b3e53788ef4d317d5b53fc7912319d67e3dc
                        • Opcode Fuzzy Hash: e5620e990f8220b448d5b59fe45baab9dc0f6dbd4740d24abe31777b74632af3
                        • Instruction Fuzzy Hash: 4A412C31A08E86DAEB208F12E4447A9B360FB98FA4F508171DA6D53B74DF3CD549C748
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: From$AuditCharComputerErr_ErrorLastNameSys_Unicode_WideWindows
                        • String ID: socket.gethostname
                        • API String ID: 1075394898-2650736202
                        • Opcode ID: 25ae612990bab75232c8daec9245eaa7fbb0b38a1306ba03551d9cdaf76ece37
                        • Instruction ID: af14e5011c33825234d4c61409a6e7881f5d319c55ee4b89cf652ba1ac2598af
                        • Opcode Fuzzy Hash: 25ae612990bab75232c8daec9245eaa7fbb0b38a1306ba03551d9cdaf76ece37
                        • Instruction Fuzzy Hash: 4231F021A0CE42CAE7249B22E85437AE365FFA8FA5F44C075D95E966B4DE3CE044C604
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Dealloc$FreeTable$Err_FromList_Windows$AppendBuildConvertInterfaceLuidNameSizeTable2Value_memcpy
                        • String ID:
                        • API String ID: 1684791173-0
                        • Opcode ID: 6e5f08eccdd5b29cfe341dff8070fb2ed0092c75082b83863e899f864d342429
                        • Instruction ID: 5d2f2c753f9d539958950d76ca20bc391bc37e335e80b0c7acdac5b89442db22
                        • Opcode Fuzzy Hash: 6e5f08eccdd5b29cfe341dff8070fb2ed0092c75082b83863e899f864d342429
                        • Instruction Fuzzy Hash: 7C413131E0CF42CAEA545B22E8543B9B3A0FFA5F65F048075C96E666B4DF2CE4498744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: NameName::$Name::operator+atolswprintf_s
                        • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                        • API String ID: 2331677841-2441609178
                        • Opcode ID: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                        • Instruction ID: 93562e20a7cb230eb50f8f01d2e8e48d429b6c114f72410326a843cfe3031cc9
                        • Opcode Fuzzy Hash: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                        • Instruction Fuzzy Hash: 3FF1AEE2F08E1284FB25FB66D5551BC27A1AF45F64F4040F7CA4E16AB6DF3CA5698300
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                        • API String ID: 2050909247-1550345328
                        • Opcode ID: e8f7eb8be34c1f40e570a1d721804810372ce1450404f1b708da05039a63d225
                        • Instruction ID: 2d90dc93eb87c9af10278bff285bdb620f9fc7c968573217592183f3775d7416
                        • Opcode Fuzzy Hash: e8f7eb8be34c1f40e570a1d721804810372ce1450404f1b708da05039a63d225
                        • Instruction Fuzzy Hash: D25166A2E3C64392EA10BB2594001BBA393BF947D4FC44735EE4D87696FE3CE5858320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ParseSizeTuple_$Ioctl$Err_FormatFromLongLong_Unsigned
                        • String ID: invalid ioctl command %lu$k(kkk):ioctl$kI:ioctl$kO:ioctl
                        • API String ID: 1148432870-4238462244
                        • Opcode ID: 3f76204c42d358388be91a2e0fa01af582f79ca479d8e6d2f391cea6ebf1b823
                        • Instruction ID: 4ae6b5c1d392135578ce423187629574e72613d274bd158fb832f65f8b88a671
                        • Opcode Fuzzy Hash: 3f76204c42d358388be91a2e0fa01af582f79ca479d8e6d2f391cea6ebf1b823
                        • Instruction Fuzzy Hash: 2E516F71A18E02CDE710CB66E8406ED73B0FB58B68F548276EA6DA3AA4DF3CD154C744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Bytes_String$DeallocErr_Size
                        • String ID: encoding of hostname failed$host name must not contain null character$idna$str, bytes or bytearray expected, not %s
                        • API String ID: 2522550923-2120988924
                        • Opcode ID: 4bff7bdefa987b91148ee3b18d677af03c6520adca83e4b60bb055ec74d24b36
                        • Instruction ID: 21b4f9791c90663e4762bbdcdfb830996afbe1037831761cb9b853560844b421
                        • Opcode Fuzzy Hash: 4bff7bdefa987b91148ee3b18d677af03c6520adca83e4b60bb055ec74d24b36
                        • Instruction Fuzzy Hash: 78414C69A08F0289EB548B17E450378A360EF64FB4F54D0B1DA3E673B0DF2CE4A18309
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: SizeTuple_$Arg_Buffer_ParseRelease$AuditErr_FormatFromLong_Ssize_tSys_
                        • String ID: sendto$sendto() takes 2 or 3 arguments (%zd given)$socket.sendto$y*O:sendto$y*iO:sendto
                        • API String ID: 3528750861-2448770124
                        • Opcode ID: 88304e7169643b13afbf15443212dc575dcb254fe66de0b973b6d6862d59c8aa
                        • Instruction ID: d9ce175c4e31859b7e69567d8986d1d224341ce656ea70bca5143f0f22c15824
                        • Opcode Fuzzy Hash: 88304e7169643b13afbf15443212dc575dcb254fe66de0b973b6d6862d59c8aa
                        • Instruction Fuzzy Hash: 49412F71A08E46C9E710CF66E8442AAB3B4FB98BA4F408172DA5D63778DF3CD544CB44
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Module_$DeallocObjectObject_$ConstantFromSpecStringTrackTypeType_
                        • String ID: 15.0.0$8`G$_ucnhash_CAPI$ucd_3_2_0$unidata_version
                        • API String ID: 2663085338-2601521091
                        • Opcode ID: 35f2a36de3bf8fc04aa01d781381661ddda8c4355416510f682401fb826b2ab5
                        • Instruction ID: 9c6ba3e57d7c500ab3d83d1d0a78685e5ee48f25cb300148464b805f6faf78c8
                        • Opcode Fuzzy Hash: 35f2a36de3bf8fc04aa01d781381661ddda8c4355416510f682401fb826b2ab5
                        • Instruction Fuzzy Hash: B7311221E0CA0792F6155F21E92437926A1AF4ABD7F985431DB0D467BFEFACF5448308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: String$Err_Eval_Thread$Arg_AuditFromParseRestoreSaveSizeSys_Tuple_Unicode_getservbyporthtons
                        • String ID: getservbyport: port must be 0-65535.$i|s:getservbyport$port/proto not found$socket.getservbyport
                        • API String ID: 3420281234-2618607128
                        • Opcode ID: df385e0b112e720f1497a781268f28e1972b04836732b04ec17d0f334ba274de
                        • Instruction ID: 81017025f3777f8872d61529cf199f8f8287dd8fbd06277b772a5282bc76bd5a
                        • Opcode Fuzzy Hash: df385e0b112e720f1497a781268f28e1972b04836732b04ec17d0f334ba274de
                        • Instruction Fuzzy Hash: 60213E61A18E07C9EA40DB17E894279A371FF99FA4F508071DA5E67674DF3DE048C708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CompareUnicode_$DeallocStringWith
                        • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                        • API String ID: 1004266020-3528878251
                        • Opcode ID: 1585b7f006c3bc3ef317b73109392006e48ef7fb1c9bb5363a1940f6ac4bfac5
                        • Instruction ID: 570a17308d29e61a0bdee7ad3f2084434c93d36e7f26920a2c383c8d6a25ee52
                        • Opcode Fuzzy Hash: 1585b7f006c3bc3ef317b73109392006e48ef7fb1c9bb5363a1940f6ac4bfac5
                        • Instruction Fuzzy Hash: 50415F61A0CE0391EB549B21E86437967A1BF85BCAF844035DB8E4B77ADF3DE4849308
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID:
                        • API String ID: 2943138195-0
                        • Opcode ID: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                        • Instruction ID: 2e7bae8358ff074180c73b1976c0d414eba33ed367bfbf5dccadc2b75fdc8e4b
                        • Opcode Fuzzy Hash: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                        • Instruction Fuzzy Hash: 62F1AEB6B08A829EF711EF66D4501FC37B0EB04B5CB4044B3EA4D57AA9EE38D566C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CompareStringUnicode_With$Mem_$FreeMallocSubtypeType_
                        • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                        • API String ID: 1723213316-3528878251
                        • Opcode ID: 0183ee75f38b3d9b4e000f242270cd4c61522a137d2eba0fb5a9939ca12be486
                        • Instruction ID: e2650e245481f322360354a0dcb3cc0f553687f6a543d9e720396b35562a03a8
                        • Opcode Fuzzy Hash: 0183ee75f38b3d9b4e000f242270cd4c61522a137d2eba0fb5a9939ca12be486
                        • Instruction Fuzzy Hash: 1051B161E0CA4382FB608B26A5607792790AF56BC2F045171EB4E97BBFDF2CF5418708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentFromStringSubtypeType_Unicode_
                        • String ID: $%04X$a unicode character$argument$decomposition
                        • API String ID: 1318908108-4056541097
                        • Opcode ID: 2aa5bcb769f9567ef44792d0b8645ff4acf96607a2464068c30a17cc2bf935c6
                        • Instruction ID: 9ae14673202e9e47b64824f51da9fab5d3c1504cd594c92e8e18b17b983a1158
                        • Opcode Fuzzy Hash: 2aa5bcb769f9567ef44792d0b8645ff4acf96607a2464068c30a17cc2bf935c6
                        • Instruction Fuzzy Hash: 9F41DE71E08A8692EB258B15E4143B92361FF85B9AF440235DB5E4B7EEEF3CE585C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_AuditErr_FreeMem_ParseSizeStringSys_Tuple_
                        • String ID: et:gethostbyaddr$idna$socket.gethostbyaddr$unsupported address family
                        • API String ID: 1738687268-1751716127
                        • Opcode ID: c83d73dceb3c4610a70c8c8e411a58869078ba58085a6a2956745bc7e2575713
                        • Instruction ID: 78835616520ce2abf2d078c122d675ba06901deff97d13e26615ef8c8fa5fd6c
                        • Opcode Fuzzy Hash: c83d73dceb3c4610a70c8c8e411a58869078ba58085a6a2956745bc7e2575713
                        • Instruction Fuzzy Hash: 5A316F61A08E86C9E6209B17E8547EAA360FBA8FE0F448072DEAD67774DE3CD445C744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_Release$Size$Arg_BuildDeallocErr_Keywords_ParseStringTupleValue_
                        • String ID: nbytes is greater than the length of the buffer$negative buffersize in recvfrom_into$w*|ni:recvfrom_into
                        • API String ID: 252658603-4033050226
                        • Opcode ID: cbd05dbb59b33da20bee7d15abf173420b95374231d8228cad919bc37cd99a43
                        • Instruction ID: d8dad086dd6eefa33f9a1186e6bda3f7011f7940ac23b52999b015d6c1852d62
                        • Opcode Fuzzy Hash: cbd05dbb59b33da20bee7d15abf173420b95374231d8228cad919bc37cd99a43
                        • Instruction Fuzzy Hash: 04311A71A08F42C9EA108B52E4942B9B364FBA9FB4F408176DAAD63670DF7DD588C704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Arg_AuditErr_FromLongLong_ParseRestoreSaveSizeStringSys_Tuple_getservbynamehtons
                        • String ID: service/proto not found$socket.getservbyname$s|s:getservbyname
                        • API String ID: 1135235387-1257235949
                        • Opcode ID: 3b5f47b3c7fe93ff51d3c351ac1364b9cc3afc28ca2730272accc108aa8dca2c
                        • Instruction ID: a3521df37f8b0e18942634b39b465b1e070e9cd60ea21b4056d3c916d8bd3ce9
                        • Opcode Fuzzy Hash: 3b5f47b3c7fe93ff51d3c351ac1364b9cc3afc28ca2730272accc108aa8dca2c
                        • Instruction Fuzzy Hash: C311FE65A08E42C9EA408B13E854379A370FB69FA5F508071DA9D63674DF3CD485C704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BlockFrameHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 4223619315-393685449
                        • Opcode ID: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                        • Instruction ID: e48452420167fd4016481dcbd2d7482d51d7b7028674ea83e554c8d18ca61680
                        • Opcode Fuzzy Hash: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                        • Instruction Fuzzy Hash: FFD1B3B2B08B4186EB60AF66D4502BD77A0FB45FA8F1041B6EE4D57B65DF38E1A0C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Replicator::operator[]
                        • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                        • API String ID: 3676697650-3207858774
                        • Opcode ID: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                        • Instruction ID: b5c5640df7dcb937c0033f08ff8f980e5b36e6882d1b4293bf9711aad441de39
                        • Opcode Fuzzy Hash: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                        • Instruction Fuzzy Hash: A591AEA2B18E8699FB21EF22D4512B833B1AB54F68F4481F3DA5D036A5DF3CE565C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                        • String ID: P%
                        • API String ID: 2147705588-2959514604
                        • Opcode ID: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                        • Instruction ID: 324a2019fd3fd77a4f37da7bbf7c37a1025943420115d161faca1770fff69cc4
                        • Opcode Fuzzy Hash: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                        • Instruction Fuzzy Hash: E751CC265287A186D6349F25E4181BBFBA2F7987A1F404135DFDE83654EF3CD045D720
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Bytes_FromSizegetsockopt$Arg_DeallocLongLong_ParseResizeStringTuple_
                        • String ID: getsockopt buflen out of range$ii|i:getsockopt
                        • API String ID: 3532181676-2750947780
                        • Opcode ID: 9b7346a9f4b417b4410470c21b5fb1116251040c05f54305fa742b3d80924aa3
                        • Instruction ID: fe9158ab8376717cd0d34a5079c65de3665ebb21e471ed6b6f02d392223fcf21
                        • Opcode Fuzzy Hash: 9b7346a9f4b417b4410470c21b5fb1116251040c05f54305fa742b3d80924aa3
                        • Instruction Fuzzy Hash: 15316D72A0DE46CAEB14CF26E440569B3A0FB94F64F504175EA9E93AB4DF3CD445CB04
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: LongWindow$BlockCreateErrorLastReasonShutdown
                        • String ID: Needs to remove its temporary files.
                        • API String ID: 3975851968-2863640275
                        • Opcode ID: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                        • Instruction ID: 8f05c8cd3f3a5116c4117493b49271758d2e5c89a6cadda8ec4540b80e3b5054
                        • Opcode Fuzzy Hash: fca9629812ae98fc4dea80e51924cd1fa5b6a95a0379263e815d251d6ca0a567
                        • Instruction Fuzzy Hash: D7215522E3CA43C1E641AB79F84416AA752EF85FD1F984331DA5DC3394FE2CD5558220
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_Release$Arg_Err_FromKeywords_Long_ParseSizeSsize_tStringTuple
                        • String ID: buffer too small for requested bytes$negative buffersize in recv_into$w*|ni:recv_into
                        • API String ID: 1544103690-1758107600
                        • Opcode ID: 673946159e8f77a6d26c868030c16ac5463a28c82a9e80c6b2633c18a65d49cd
                        • Instruction ID: 7d25c0bdc4e1763afbc16a9482783694a6ed131dade767381b67f77e7cd08689
                        • Opcode Fuzzy Hash: 673946159e8f77a6d26c868030c16ac5463a28c82a9e80c6b2633c18a65d49cd
                        • Instruction Fuzzy Hash: 0E21D961A08E42C9EB108B52E4542B9A364BB69BB0F408176D96E63674DF3CE588C709
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID:
                        • API String ID: 2943138195-0
                        • Opcode ID: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                        • Instruction ID: 6fb72a7b33907f36b10538f7b77f9c94779bffe61cc6cabd7b9bce20e22d6a9b
                        • Opcode Fuzzy Hash: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                        • Instruction Fuzzy Hash: 797140B2B05E46ADFB11EF62D4501FC33B1AB45B9CB4048B2DA0D57AAADF34D625C390
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                        • API String ID: 2943138195-1464470183
                        • Opcode ID: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                        • Instruction ID: 6fc5acf3494eeb3f8701cc411fabb80c64b441b178f4a56e7a5f9de271fbf314
                        • Opcode Fuzzy Hash: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                        • Instruction Fuzzy Hash: 89518CB2F08F52C9FB11EB66E8841BC27B1BB05B64F5040F6DA5D13AA9DF28E564C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_Err_Release$Arg_CheckDeadline_ParseSignalsSizeStringTuple_
                        • String ID: timed out$y*|i:sendall
                        • API String ID: 1463051379-3431350491
                        • Opcode ID: 6a75edbffb958b18a743e733ce9c1f25ab04acde408a5ac49f293f7a7651ded7
                        • Instruction ID: 63bf0a88489103a88b28e1f46e019c30fdbe789cfc2ca04519b9adbae9778e3e
                        • Opcode Fuzzy Hash: 6a75edbffb958b18a743e733ce9c1f25ab04acde408a5ac49f293f7a7651ded7
                        • Instruction Fuzzy Hash: 49410C32A08A82C9E7109F16E8403A9B364FB54FA4F448075DE6D63765DF3CE4459704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Bytes_DeallocSizeStringTuple_$Arg_Err_FromPackParseResize
                        • String ID: negative buffersize in recvfrom$n|i:recvfrom
                        • API String ID: 3092067012-1867657612
                        • Opcode ID: 73346fe6d78f416ddd0d404cc1eab1bd50427c101807ce8ae55e63a2c3ceedcf
                        • Instruction ID: 1bc7ce6837107091dbf164da3f225ca84d5be819b4ff7ad6c24a2809cdcea0aa
                        • Opcode Fuzzy Hash: 73346fe6d78f416ddd0d404cc1eab1bd50427c101807ce8ae55e63a2c3ceedcf
                        • Instruction Fuzzy Hash: B8313E71E09F428EEA458B16E484279A3A0FFA4FB0F048075DA5E57775DE3CE084D708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_$ArgumentCheckDigitErr_FromLongLong_PositionalStringUnicode_
                        • String ID: a unicode character$argument 1$digit$not a digit
                        • API String ID: 4245020737-4278345224
                        • Opcode ID: d2c025be6f32e1fa96eb3f1c6703f3e18d3fbf46a97c983d3ea169cd79d16b21
                        • Instruction ID: bd3323611e4bf2da7ba8db35e1984f09f8b00b63baaaee2d13687cc6b1b172bc
                        • Opcode Fuzzy Hash: d2c025be6f32e1fa96eb3f1c6703f3e18d3fbf46a97c983d3ea169cd79d16b21
                        • Instruction Fuzzy Hash: 3D213C35F08A4281EB508B15D4542792364FF99B8AF544036DB4E8BB7EDF3DE585C704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Arg_AuditFreeMem_ParseRestoreSaveSizeSys_Tuple_gethostbyname
                        • String ID: et:gethostbyname_ex$idna$socket.gethostbyname
                        • API String ID: 646687969-574663143
                        • Opcode ID: ec482da62ace3c18e29763a798791d74dcac66a763997dd1372a643aceded0d3
                        • Instruction ID: efa7706a075720c3c6c72e364b19ca93856ddf8ab8d93a1e25c7eb4a3602fd6c
                        • Opcode Fuzzy Hash: ec482da62ace3c18e29763a798791d74dcac66a763997dd1372a643aceded0d3
                        • Instruction Fuzzy Hash: 7E217161B18E828AEB509B23F8043AAA360FB98FE0F448172DE6D67764DF3CD005C744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_$Arg_ErrnoFromParseSizeStringTuple_inet_pton
                        • String ID: illegal IP address string passed to inet_pton$is:inet_pton$unknown address family
                        • API String ID: 907464-903159468
                        • Opcode ID: 5f6f26fc013610328acae758eccd67dd248d553df625ba587abfcb104ef9a032
                        • Instruction ID: b76e9215b4284225cf9aeec324e66977c13c1936b399a34afe4365bb69ecda2c
                        • Opcode Fuzzy Hash: 5f6f26fc013610328acae758eccd67dd248d553df625ba587abfcb104ef9a032
                        • Instruction Fuzzy Hash: 28212461A1CD42CAEA50DB12E450279A761FFA4F74F508071E56EA79B4CF3CE548C705
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: 91504536c4c753e82cdbe588412995d0809db0d3d25c664ce5a0f1fe9eeb7b4f
                        • Instruction ID: 540efc5eb9ea3d922e966a49d67bfd45b57e3b77f7500925d7f5168edf133533
                        • Opcode Fuzzy Hash: 91504536c4c753e82cdbe588412995d0809db0d3d25c664ce5a0f1fe9eeb7b4f
                        • Instruction Fuzzy Hash: FF816F20E0CE438EFA50AB57D4412B9A290AF65FB0F54C0B5D96DA77B2DE3CE845C708
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: bc53fe8a0eda1481b36a314380ac74b5aff62c5ee69524d86cd6bd6c99e3d1c0
                        • Instruction ID: f1d6aefaa9ecd11a99e0152788eae0eb2e804b6a750f8c6fada09de7cdcf2a0c
                        • Opcode Fuzzy Hash: bc53fe8a0eda1481b36a314380ac74b5aff62c5ee69524d86cd6bd6c99e3d1c0
                        • Instruction Fuzzy Hash: CB81CF21F0C64346FB65AB65A64127922A0AF87782F548136EB0C533BFDFBCF9458708
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: b57b117b731fe6fadf01a2aa5e6dfd03c7664753ee25818152bc9f2dcd8646e2
                        • Instruction ID: 4f114a5d4cb9a870bf8768fd905f01e2966f9acb4107f974a0e85a711d135814
                        • Opcode Fuzzy Hash: b57b117b731fe6fadf01a2aa5e6dfd03c7664753ee25818152bc9f2dcd8646e2
                        • Instruction Fuzzy Hash: B4815E21E08E4386FA509B6798C12F9E291AF47BA4F4481B5F94D677B7DF2CE84D8700
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Long$Err_FromLong_Socketclosesocket$CurrentDuplicateHandleInformationOccurredProcessWindows
                        • String ID:
                        • API String ID: 3394293678-0
                        • Opcode ID: 4c347251b0cb3e997720691e5f1e8047ee37cb6823bc12014edeb51918814818
                        • Instruction ID: 3be6c8a792d505c79f87e68736eaf3eedf94f288b355b5f08a482d1ffbc9f993
                        • Opcode Fuzzy Hash: 4c347251b0cb3e997720691e5f1e8047ee37cb6823bc12014edeb51918814818
                        • Instruction Fuzzy Hash: 26214921F18E4285FA555B23A8183B5A250AF64FB5F0482B4D87E667F4DF3CE0448604
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: -$:$f$p$p
                        • API String ID: 3215553584-2013873522
                        • Opcode ID: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                        • Instruction ID: d9aab633c8f04de42bd4728b457c556a7bdbb2263cd69309181dd9a70507b33f
                        • Opcode Fuzzy Hash: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                        • Instruction Fuzzy Hash: 48127273E3C34386FB247A94D25427BB693EB50794FC44279E689876C4EB3CE5809B21
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: f$f$p$p$f
                        • API String ID: 3215553584-1325933183
                        • Opcode ID: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                        • Instruction ID: 1fc66d006c6cbfe357807823516de38c13e5d618623b1bb0c58bbff24acb8589
                        • Opcode Fuzzy Hash: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                        • Instruction Fuzzy Hash: 571252A3E3C5438AFB207A15D05467BB6A3FB407D4FE44279D699866C4EB7CE5408B30
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 211107550-393685449
                        • Opcode ID: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                        • Instruction ID: 84db0f3033635d0a868e712f29b609f6a017eeff5fc66594e5dbf62a63eb592f
                        • Opcode Fuzzy Hash: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                        • Instruction Fuzzy Hash: 60E1D2B3B08B828AE751AF36D4903BD77A0FB45B68F1401B6DA4D57666CF38E5A1C700
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                        • API String ID: 2050909247-3659356012
                        • Opcode ID: b335e3e51a8458dc0a826c3b61de4e36bd76f5e9c0fd9c19ac7df80fec457176
                        • Instruction ID: 01ad64ff8b063d00765917566a35483823c59f4bff9c8d3f0c7078e534128e88
                        • Opcode Fuzzy Hash: b335e3e51a8458dc0a826c3b61de4e36bd76f5e9c0fd9c19ac7df80fec457176
                        • Instruction Fuzzy Hash: 70415C63E3C65285EA10FB16A8006BBE797BB84BC4FC44631ED8C87785EE3CE5458320
                        APIs
                        • GetTempPathW.KERNEL32(?,?,00000000,00007FF77D683CBB), ref: 00007FF77D688704
                        • GetCurrentProcessId.KERNEL32(?,00000000,00007FF77D683CBB), ref: 00007FF77D68870A
                        • CreateDirectoryW.KERNEL32(?,00000000,00007FF77D683CBB), ref: 00007FF77D68874C
                          • Part of subcall function 00007FF77D688830: GetEnvironmentVariableW.KERNEL32(00007FF77D68388E), ref: 00007FF77D688867
                          • Part of subcall function 00007FF77D688830: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF77D688889
                          • Part of subcall function 00007FF77D698238: _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D698251
                          • Part of subcall function 00007FF77D682810: MessageBoxW.USER32 ref: 00007FF77D6828EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Environment$CreateCurrentDirectoryExpandMessagePathProcessStringsTempVariable_invalid_parameter_noinfo
                        • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                        • API String ID: 3563477958-1339014028
                        • Opcode ID: e09d7b167afd2147c660aa35db8091a51c6906773476d98e2344c67e24741bda
                        • Instruction ID: 50204aff8da51a422479435c137203fc0330067df22e64af5479c5e94f38ef68
                        • Opcode Fuzzy Hash: e09d7b167afd2147c660aa35db8091a51c6906773476d98e2344c67e24741bda
                        • Instruction Fuzzy Hash: FF418E13E3D64284EA10B765A8552BB9393AF85BC4FC40336ED4EC769AFE3CE5018760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Dealloc$DescriptorErr_FastFileObject_Sequence_String
                        • String ID: arguments 1-3 must be sequences$too many file descriptors in select()
                        • API String ID: 3320488554-3996108163
                        • Opcode ID: 663c9d7e54148f1ae31ea019f9802c07c2ccdac2675d68113b08dfc84bed29b7
                        • Instruction ID: 0ff7c6baa9bbed62cc43e5876c8b7d189be9f88e30ceaee73e99b7e41936ac1f
                        • Opcode Fuzzy Hash: 663c9d7e54148f1ae31ea019f9802c07c2ccdac2675d68113b08dfc84bed29b7
                        • Instruction Fuzzy Hash: 98419136A08F0289EB158F16E884178B7A1FB86BB4F1442B5EA5E537B4DF3CE459C300
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                        • API String ID: 2943138195-2239912363
                        • Opcode ID: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                        • Instruction ID: a50961141b2aa76dd593645c823cb9b5a686f9e17db93be2c79e1738c74976c0
                        • Opcode Fuzzy Hash: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                        • Instruction Fuzzy Hash: C2513BA2F18F5298FB519B62D8402BD37B0BB08B68F4442F7DA4D13AA5DF3C91A4C754
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Time_$Err_FromSecondsString$MillisecondsObjectTimeval
                        • String ID: Timeout value out of range$timeout doesn't fit into C timeval
                        • API String ID: 4240314503-2798848688
                        • Opcode ID: c3110628e0ff8c45ed48e6e42bc6a9de53dce8f64d393fbe66996934f00f37bc
                        • Instruction ID: aba4c75471e18ba74472538c44d124be78e372bf3501378d249909cc0ec465a3
                        • Opcode Fuzzy Hash: c3110628e0ff8c45ed48e6e42bc6a9de53dce8f64d393fbe66996934f00f37bc
                        • Instruction Fuzzy Hash: 9B113021B08E02C6FB508B6AD4502346651AF64FB0F00C271E93E977F0DF6CD5948308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_$Eval_ExceptionThread$MatchesRaisedResourceRestoreSaveUnraisableWarningWriteclosesocket
                        • String ID: unclosed %R
                        • API String ID: 1660182617-2306019038
                        • Opcode ID: 25b85fd08a291e67ea72e71a9db263f5598e99ae11a4cc00c223ef1659b4300f
                        • Instruction ID: 98d7c8b02308405061e7f1421defa732938bddca374bab55db80ed546b1eeefa
                        • Opcode Fuzzy Hash: 25b85fd08a291e67ea72e71a9db263f5598e99ae11a4cc00c223ef1659b4300f
                        • Instruction Fuzzy Hash: 4D01A525A18F42C6E6149B23A8041A4A364BF59FB4B049371DE7F677E5CF3CD4958314
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Arg_Err_ParseRestoreSaveSizeStringTuple_getprotobyname
                        • String ID: protocol not found$s:getprotobyname
                        • API String ID: 862796068-630402058
                        • Opcode ID: 5e26fb8bbdc9310467d939e6e5269e35e791270880cd3d67430df1cfafc901d3
                        • Instruction ID: 283ad89f4b40581c1f8a40fdcd7203a89890ee5eba45b2518ad00daba6d815da
                        • Opcode Fuzzy Hash: 5e26fb8bbdc9310467d939e6e5269e35e791270880cd3d67430df1cfafc901d3
                        • Instruction Fuzzy Hash: 79012165A18E42CAEA159B13E984179A360FFA8FA1F448071C96E63734DF3CD094C708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: SizeString$Arg_Bytes_Err_FromParseTuple_inet_addrstrcmp
                        • String ID: 255.255.255.255$illegal IP address string passed to inet_aton$s:inet_aton
                        • API String ID: 717551241-4110412280
                        • Opcode ID: 084e9850ab497b4604530a89a794d3b40a20c62355ffc3e93d442b1fc817a547
                        • Instruction ID: 401e1b2d96862767ed8d7254ded9b5f96b36c91421951c8761cb7f9cfede639c
                        • Opcode Fuzzy Hash: 084e9850ab497b4604530a89a794d3b40a20c62355ffc3e93d442b1fc817a547
                        • Instruction Fuzzy Hash: 34014F61E08D03C9EA00AB26EC541B9A771EFA1FB4F6081B1D63DA66B4DF2DD449C708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_ReleaseString$Arg_Err_FromParseSizeTuple_Unicode_inet_ntoa
                        • String ID: packed IP wrong length for inet_ntoa$y*:inet_ntoa
                        • API String ID: 1492101624-3027498899
                        • Opcode ID: a37c0709ab42e32b6aa69015115254f28bf8fa2c783f834efdb7c9b9a77bb895
                        • Instruction ID: fc017d22836e0abad56760b925e388ea7e70d94ec8e8e9011c2a214c67bed505
                        • Opcode Fuzzy Hash: a37c0709ab42e32b6aa69015115254f28bf8fa2c783f834efdb7c9b9a77bb895
                        • Instruction Fuzzy Hash: E3017131A0CE02CAEB10CF26E8941B9A360FB98F64F408171C55E63274CF3CD149C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_$ErrorFromLastLongclosesocket$CheckHandleInformationLong_SignalsStringWindowsmemset
                        • String ID:
                        • API String ID: 205095079-0
                        • Opcode ID: 63de80f4fcd19a662b9f0a98f01459b248b276ca4dd52e658008932bb04675d9
                        • Instruction ID: 25029d9899dbde9f28ddc4f4961df2840276cc4c5275ebf48c66f48399be87ff
                        • Opcode Fuzzy Hash: 63de80f4fcd19a662b9f0a98f01459b248b276ca4dd52e658008932bb04675d9
                        • Instruction Fuzzy Hash: 7C412231A0CF82C9FA649B12E4443F9A3A0FF69FA4F048171DA9D66BA5DF7DD0418744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                        • Instruction ID: 3513ea4b6d242e8808e2c46404d92e596a2edcbc03762cb966261ad0d9c977c0
                        • Opcode Fuzzy Hash: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
                        • Instruction Fuzzy Hash: FFD18E27E2C741CAEB20AB2494403AEA7A1FB557D8F900235DE4D97B96EF3DE494C710
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                        • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                        • API String ID: 1852475696-928371585
                        • Opcode ID: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                        • Instruction ID: 94ed81efe7f57d1ae8c2a69ed7d50f2aa5380855d6dfe5f07c6e85ae284c8123
                        • Opcode Fuzzy Hash: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                        • Instruction Fuzzy Hash: 7B5190A2B19E8692DA20EB12F8502B9A360FF44FA4F0445B3DA5D43778DF3CE525C700
                        APIs
                        • FreeLibrary.KERNEL32(?,?,?,00007FF77D69F0AA,?,?,-00000018,00007FF77D69AD53,?,?,?,00007FF77D69AC4A,?,?,?,00007FF77D695F3E), ref: 00007FF77D69EE8C
                        • GetProcAddress.KERNEL32(?,?,?,00007FF77D69F0AA,?,?,-00000018,00007FF77D69AD53,?,?,?,00007FF77D69AC4A,?,?,?,00007FF77D695F3E), ref: 00007FF77D69EE98
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressFreeLibraryProc
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3013587201-537541572
                        • Opcode ID: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                        • Instruction ID: 3f419700d9c87f4cc518c828b84b93490e374cb9828bfc36d435b36294ff061f
                        • Opcode Fuzzy Hash: 113d78e4ddfca44ef7199ea688f338981f8b4522c7c5ddaba00381c3941a83e2
                        • Instruction Fuzzy Hash: D041C127F3EA1281EA15AB169800577A293BF49BD0FD84639DD1DC7785FE3CE4098220
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682C9E
                        • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF77D683706,?,00007FF77D683804), ref: 00007FF77D682D63
                        • MessageBoxW.USER32 ref: 00007FF77D682D99
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message$CurrentFormatProcess
                        • String ID: %ls: $<FormatMessageW failed.>$Error$[PYI-%d:ERROR]
                        • API String ID: 3940978338-251083826
                        • Opcode ID: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                        • Instruction ID: 537b623d01a84f08960f518e141ccaae2c50135e1e60a1aeec94eae88f1fe8c7
                        • Opcode Fuzzy Hash: c67c27f58c2af476bbbd059d0433c12e6f67668a4e3ecf6e42cf1bc8669f0b6b
                        • Instruction Fuzzy Hash: 8531B863B2C64192E620B715A8106ABA693BB887D4F810235EF4E93759EF3CD546C310
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457069
                        • GetLastError.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457077
                        • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457090
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A4570A2
                        • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457110
                        • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A45711C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                        • String ID: api-ms-
                        • API String ID: 916704608-2084034818
                        • Opcode ID: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                        • Instruction ID: 6664a0b00e140a49ea41bd201f55bccb93ae670519e61bde195a6ec51cb72521
                        • Opcode Fuzzy Hash: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                        • Instruction Fuzzy Hash: D4316F61B1AF8295EE11EB03A8005B563E4BF44FB4F5949B6DD2E4B3A4EF3CE5648300
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Bytes_SizeString$Arg_DeallocErr_FromParseResizeTuple_
                        • String ID: negative buffersize in recv$n|i:recv
                        • API String ID: 1342606314-3647384195
                        • Opcode ID: 29fb8dffb30c6af5d72d23fc4fc4b8e2e26d01538630a85b1ae85e9e50577ef5
                        • Instruction ID: b1cd865dc43c1dd7e4a7d870e57943864af4146083a3e79a0f280404c4fa4bf6
                        • Opcode Fuzzy Hash: 29fb8dffb30c6af5d72d23fc4fc4b8e2e26d01538630a85b1ae85e9e50577ef5
                        • Instruction Fuzzy Hash: E7114D71A09E42C9EA108B52E4842BAE370FFA4FB4F008172D99D667B5DF7CE144D704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_DeallocErr_ParseSizeStringTuple_if_nametoindex
                        • String ID: O&:if_nametoindex$no interface with this name
                        • API String ID: 3052430728-3835682882
                        • Opcode ID: 3ac5c3a51fb341192d0c4d14695c2bd4c19b6b6ccdf855b40aa773fc1d6a75dc
                        • Instruction ID: 51c7a5b8833b9d4733ae7585523635fc511548edc086eadc5e1a6a9e75d54220
                        • Opcode Fuzzy Hash: 3ac5c3a51fb341192d0c4d14695c2bd4c19b6b6ccdf855b40aa773fc1d6a75dc
                        • Instruction Fuzzy Hash: 58011261E0CE03C9E7109F23E880279A360FFA9F64F508471C96E66270CE7DD4488708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_Err_FromLongLong_ParseSizeStringTuple_Unsignedhtons
                        • String ID: htons: Python int too large to convert to C 16-bit unsigned integer$htons: can't convert negative Python int to C 16-bit unsigned integer$i:htons
                        • API String ID: 1102113319-997571130
                        • Opcode ID: 6fe04cd82cc3000d18dcf2e81bb2daf4d1c2563f8a0b84c539f7a4416ede929e
                        • Instruction ID: 0f9e5c28411b88c61817ce67de4d69ac38933b6c1c4934cc4231e32bf5fb8f46
                        • Opcode Fuzzy Hash: 6fe04cd82cc3000d18dcf2e81bb2daf4d1c2563f8a0b84c539f7a4416ede929e
                        • Instruction Fuzzy Hash: 7EF09661E0DD43D9EA158B17E890274B360BF64F61F90C4B1C46EA6170CF2CE804D318
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_Err_FromLongLong_ParseSizeStringTuple_Unsignedhtons
                        • String ID: i:ntohs$ntohs: Python int too large to convert to C 16-bit unsigned integer$ntohs: can't convert negative Python int to C 16-bit unsigned integer
                        • API String ID: 1102113319-2476431691
                        • Opcode ID: 89a767ad913e0f8faf4df47f62d0b46607f468db7b7541010cbad5f5dbaaabd7
                        • Instruction ID: 605603c2b073f10162f0a3f75e8a67b74d5270de95776ad46c55917bc1c0e904
                        • Opcode Fuzzy Hash: 89a767ad913e0f8faf4df47f62d0b46607f468db7b7541010cbad5f5dbaaabd7
                        • Instruction Fuzzy Hash: AAF0FF65E0CD43C9FA549B17E8502B4A360AF64F61F9084B5C56E6A174DE2CE548D318
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort$AdjustPointer
                        • String ID:
                        • API String ID: 1501936508-0
                        • Opcode ID: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                        • Instruction ID: a4978e7ee7698631ff501eb76c3296e22e32bc2b5e6074913a1a1f1cd7a594c8
                        • Opcode Fuzzy Hash: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                        • Instruction Fuzzy Hash: 6B51B4A1B09F4281FAA6AB13944467863A4AF44FB4B0944F7EE5D077B5DF3CE466C700
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort$AdjustPointer
                        • String ID:
                        • API String ID: 1501936508-0
                        • Opcode ID: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                        • Instruction ID: e40670b8eb57816f2c1d056eca00c665782a1e9bb4590be741aafe81845a1856
                        • Opcode Fuzzy Hash: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                        • Instruction Fuzzy Hash: E451D8A2B09E4281EEA5EB53A44463C63A4AF54FB4F0584F7EA5D077B4DF3CE4619700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: {for
                        • API String ID: 2943138195-864106941
                        • Opcode ID: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                        • Instruction ID: a7c774f889c1db850d00febc479d16f6673b4272eb53b0ad85fbbb64df639d16
                        • Opcode Fuzzy Hash: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                        • Instruction Fuzzy Hash: 4B513CB2B08E45A9F711AF26D4413F837A1EB45B58F4084B2EA4C07BA5DF7CD564C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentFromStringSubtypeType_Unicode_
                        • String ID: a unicode character$argument$category
                        • API String ID: 1318908108-2068800536
                        • Opcode ID: c31e599aff6ce8fd118d7930930d13bb61e4023c7ccaaddb711cf16cebfbc0cd
                        • Instruction ID: 8fa94afedb5c7c33744dbbb0e421c6cfe28aa9f5efef4a2c4ba5cd3ca844851e
                        • Opcode Fuzzy Hash: c31e599aff6ce8fd118d7930930d13bb61e4023c7ccaaddb711cf16cebfbc0cd
                        • Instruction Fuzzy Hash: 2551CBA2F19A5682EF648B09D4603792361FB44B86F440035DB8F477B9DF3CE891C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentFromStringSubtypeType_Unicode_
                        • String ID: a unicode character$argument$bidirectional
                        • API String ID: 1318908108-2110215792
                        • Opcode ID: 2be184d8cc6ee1ee00809d45acc887d572eb9887141ab2374770304697e252f3
                        • Instruction ID: cac4205d5816d135a4be173deb98e53c4222853bda58ea10acadcceb51c9cbea
                        • Opcode Fuzzy Hash: 2be184d8cc6ee1ee00809d45acc887d572eb9887141ab2374770304697e252f3
                        • Instruction Fuzzy Hash: A741E766B18A9382EB688B15D4613792361FB04BD2F445039DB5E47BFACF2DE890C308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: NameName::atol
                        • String ID: `template-parameter$void
                        • API String ID: 2130343216-4057429177
                        • Opcode ID: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                        • Instruction ID: 65f398a89f83fb43c1b66a9be4ed9a392c78d19a3d9c7cbe8bf1b71a77ebed61
                        • Opcode Fuzzy Hash: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                        • Instruction Fuzzy Hash: 7A414BA2F08F5688FB11DBA2D8512FC23B1BB48BA4F5441B6DE0C17669DF7CA565C340
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD4D
                        • GetLastError.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD5B
                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DD85
                        • FreeLibrary.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DDF3
                        • GetProcAddress.KERNEL32(?,?,?,00007FF77D68DF7A,?,?,?,00007FF77D68DC6C,?,?,?,00007FF77D68D869), ref: 00007FF77D68DDFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProc
                        • String ID: api-ms-
                        • API String ID: 2559590344-2084034818
                        • Opcode ID: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                        • Instruction ID: 1fb76656279d9900e4032762bbedfd79774d37c0b2462908baf8b221a47c4ba4
                        • Opcode Fuzzy Hash: 276526191d17588ee9fa22b972cdf0953455baf5c8a53fb276b347519b5968a9
                        • Instruction Fuzzy Hash: C9318F23F3E642D5EE11AB1694005AAA7D6FF48BE4F994635DE1D86380FE3CE4488730
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+Replicator::operator[]
                        • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                        • API String ID: 1405650943-2211150622
                        • Opcode ID: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                        • Instruction ID: a452b16370b518dbc48d18b56aeada359cb9f7a9f502f39c13c0ae49ebffb65d
                        • Opcode Fuzzy Hash: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                        • Instruction Fuzzy Hash: A64126B2B08E469CF7029BA6D8502B837B1BB08B68F9445F2CA5C13765DF7CA564D700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: char $int $long $short $unsigned
                        • API String ID: 2943138195-3894466517
                        • Opcode ID: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                        • Instruction ID: 1401689a4dfaf7cc22e032df7bb4adae8887ced41eef325a4d0b7d3a7c4ee6aa
                        • Opcode Fuzzy Hash: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                        • Instruction Fuzzy Hash: FA3151B2B18F5188FB01AF6AD8541BC27B2BB09B55F4481F2DA4C07779DE3C9568CB10
                        APIs
                        • GetCurrentProcessId.KERNEL32(00000000,?,?,?,00000000,00007FF77D68351A,?,00000000,00007FF77D683F1B), ref: 00007FF77D682AA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: 0$WARNING$Warning$Warning [ANSI Fallback]$[PYI-%d:%s]
                        • API String ID: 2050909247-2900015858
                        • Opcode ID: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                        • Instruction ID: 1b3b05edfa342a6c7f06649f5716d58dd1f984ecc9c62e1f30ffa5f348c703cd
                        • Opcode Fuzzy Hash: d3ff72078d09a899d0ca032b5bdbc8691629937d026b54217f09319e947088a3
                        • Instruction Fuzzy Hash: 9A217173A3C78192E620AB55B8417E7A795FB887C4F800236EE8D93659EF3CD245C650
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                        • String ID:
                        • API String ID: 995526605-0
                        • Opcode ID: fa90e23b90d603ff8a1fc3170628a297920662056bab6e12f28c88f429b12389
                        • Instruction ID: 94258746bd98367c86d28a0d08f67c62ef3f8c4008dd103b7e33b55fc64fbf5b
                        • Opcode Fuzzy Hash: fa90e23b90d603ff8a1fc3170628a297920662056bab6e12f28c88f429b12389
                        • Instruction Fuzzy Hash: CF21F422E2C64381EA50AB55B54423BE7A2EBC5BE4FD00335E6AD83AD5EE6CD8458710
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: bd40692f84e3da01acd5c9e715af8932c2ff4b5b564443a413d720313231dc09
                        • Instruction ID: 174cf1dcc9d109f80b6433a43d60c4efc33aa519a9ace5c3c236834d7e1bb264
                        • Opcode Fuzzy Hash: bd40692f84e3da01acd5c9e715af8932c2ff4b5b564443a413d720313231dc09
                        • Instruction Fuzzy Hash: AD214F26E3C24241F9587729669113BE6835F447F0F94477CE97EC7AC6FD2CA4408320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                        • Instruction ID: 93fa2b00c20efc0f7774d803c743df272006ca24b00337319647b22d24ae8da6
                        • Opcode Fuzzy Hash: 3755c2f75cb97972cd4ab37a7e27d28fd0bf6f95a56d27d10542fc75f089f0eb
                        • Instruction Fuzzy Hash: D9118422E3CA4186E750AB16F85433AA7A1FB88BE4F500334D99DC7794EF3CD8148750
                        APIs
                        • _PyArg_CheckPositional.PYTHON312 ref: 00007FFE004536E7
                        • _PyArg_BadArgument.PYTHON312 ref: 00007FFE0045371A
                          • Part of subcall function 00007FFE004511B0: PyUnicode_CompareWithASCIIString.PYTHON312 ref: 00007FFE004511E2
                          • Part of subcall function 00007FFE004511B0: PyUnicode_CompareWithASCIIString.PYTHON312 ref: 00007FFE004511FA
                          • Part of subcall function 00007FFE004511B0: PyType_IsSubtype.PYTHON312 ref: 00007FFE0045121D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_CompareStringUnicode_With$ArgumentCheckPositionalSubtypeType_
                        • String ID: argument 1$argument 2$normalize$str
                        • API String ID: 4101545800-1320425463
                        • Opcode ID: 6a3206665d50624963465f038f79663c2d3d68664346081dad0779ef5a43a2b4
                        • Instruction ID: cc004fb67dd9a989c02c314886d3232b8b7a078a2e9b057c8f66ac527758f1e6
                        • Opcode Fuzzy Hash: 6a3206665d50624963465f038f79663c2d3d68664346081dad0779ef5a43a2b4
                        • Instruction Fuzzy Hash: F11161A1B08A8691EB60CF55E4517B92760AF08FC6F588036DB0D0B7BEDE2CE584C745
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_$ArgumentCheckPositional
                        • String ID: argument 1$argument 2$is_normalized$str
                        • API String ID: 3876575403-184702317
                        • Opcode ID: 7c950a274d1c530a4e2b2ee5c75bc666441a244dd8d061769435580234d1272f
                        • Instruction ID: 2408cda255180eb9a92560bc21179e21e299031d70e3f510792eb2e972041d12
                        • Opcode Fuzzy Hash: 7c950a274d1c530a4e2b2ee5c75bc666441a244dd8d061769435580234d1272f
                        • Instruction Fuzzy Hash: 70016D60F08A86A5EB509B12E491BB52360EF84FC9F488031DB4D0B77DCF2CE489C744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_LongLong_Unsigned$FormatFromOccurredhtonl
                        • String ID: expected int, %s found
                        • API String ID: 3347179618-1178442907
                        • Opcode ID: 1cbb25d059c373463275cb9141ec41ce007bb3d03350516039de7c41e169b97a
                        • Instruction ID: c67dd3cc2a3891f4490e3df3a97f7e80c9a7637687c85c13e46c8692403fb1bc
                        • Opcode Fuzzy Hash: 1cbb25d059c373463275cb9141ec41ce007bb3d03350516039de7c41e169b97a
                        • Instruction Fuzzy Hash: 6FF03661E08E42C9E6549B239884279A760BF65F75F148575D56E676B0CF3CD48CC304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_LongLong_Unsigned$FormatFromOccurredhtonl
                        • String ID: expected int, %s found
                        • API String ID: 3347179618-1178442907
                        • Opcode ID: b2daa29250e1f6628aa8a96a2420fefb0829875c2a9b427d46b77ebb6b88cbc8
                        • Instruction ID: f56613d29fb0fb63b9b2251ac243b593e00e62e04733a1c8765ba8077c7c56c2
                        • Opcode Fuzzy Hash: b2daa29250e1f6628aa8a96a2420fefb0829875c2a9b427d46b77ebb6b88cbc8
                        • Instruction Fuzzy Hash: 5AF0A921E0DE42CAEA559B23E885278A360BF68F75F148575D56F632B0CF3CD858C304
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+$NameName::
                        • String ID:
                        • API String ID: 168861036-0
                        • Opcode ID: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                        • Instruction ID: 24c0c3a8ebe99c137ac6d4cd598463d31257035ead3d87dccea6baa833f6595b
                        • Opcode Fuzzy Hash: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                        • Instruction Fuzzy Hash: FB7169B2B08F4289F711DBA2E8902BC37A1BB44B64F5080F6DA1D176A5DF79E462C740
                        APIs
                        • GetCurrentProcess.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688EFD
                        • K32EnumProcessModules.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688F5A
                          • Part of subcall function 00007FF77D689390: MultiByteToWideChar.KERNEL32(?,?,?,00007FF77D6845F4,00000000,00007FF77D681985), ref: 00007FF77D6893C9
                        • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D688FE5
                        • K32GetModuleFileNameExW.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D689044
                        • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D689055
                        • FreeLibrary.KERNEL32(?,FFFFFFFF,00000000,00007FF77D683FA9), ref: 00007FF77D68906A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                        • String ID:
                        • API String ID: 3462794448-0
                        • Opcode ID: 51e73ccb600dcf9d750c353d1e93921ada3daf916e275faff0d4d54491eeaa6f
                        • Instruction ID: 77824dc5bf1fcac4117a58aed5dc672a675f41ae0319790c727e635c5f256a75
                        • Opcode Fuzzy Hash: 51e73ccb600dcf9d750c353d1e93921ada3daf916e275faff0d4d54491eeaa6f
                        • Instruction Fuzzy Hash: FC415467E3D682C1EA30AB11A5402BBA396EB85BD4F854239DF4D97789FE3CE501C710
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                        • String ID:
                        • API String ID: 3741236498-0
                        • Opcode ID: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                        • Instruction ID: 2c22617a3d5710520fa0a9b58cdcc255bf9f470f33cf0513c182b61d8dba4c76
                        • Opcode Fuzzy Hash: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                        • Instruction Fuzzy Hash: 2631A462B19F9151EA15EB27A80457973A0FF49FF0B5985B2DD2D033A0EE7DE865C300
                        APIs
                          • Part of subcall function 00007FF77D688570: GetCurrentProcess.KERNEL32 ref: 00007FF77D688590
                          • Part of subcall function 00007FF77D688570: OpenProcessToken.ADVAPI32 ref: 00007FF77D6885A3
                          • Part of subcall function 00007FF77D688570: GetTokenInformation.ADVAPI32 ref: 00007FF77D6885C8
                          • Part of subcall function 00007FF77D688570: GetLastError.KERNEL32 ref: 00007FF77D6885D2
                          • Part of subcall function 00007FF77D688570: GetTokenInformation.ADVAPI32 ref: 00007FF77D688612
                          • Part of subcall function 00007FF77D688570: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF77D68862E
                          • Part of subcall function 00007FF77D688570: CloseHandle.KERNEL32 ref: 00007FF77D688646
                        • LocalFree.KERNEL32(?,00007FF77D683C55), ref: 00007FF77D68916C
                        • LocalFree.KERNEL32(?,00007FF77D683C55), ref: 00007FF77D689175
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                        • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                        • API String ID: 6828938-1529539262
                        • Opcode ID: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                        • Instruction ID: 2dce878d88bfbae65d5177f2ef36d88d8a86a456530baf3d0837dc4e58a400d1
                        • Opcode Fuzzy Hash: 0222097b9c90264a1a2c87a2a2fde68e1a94831f5278aced0db9eca26447961c
                        • Instruction Fuzzy Hash: E7211462E3C74181E650BB10E5152EBA262FB887C0FC44236EA8D93796FF3CE5458760
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B2D7
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B30D
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B33A
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B34B
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B35C
                        • SetLastError.KERNEL32(?,?,?,00007FF77D694F11,?,?,?,?,00007FF77D69A48A,?,?,?,?,00007FF77D69718F), ref: 00007FF77D69B377
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 511c86220214880ca4b01c77dd55d0a7de68e458561f726588d357ec3f22002e
                        • Instruction ID: a96e01a7bef85c33d27e2799890d1b277947c484131ebdca5929970c70d9a0e1
                        • Opcode Fuzzy Hash: 511c86220214880ca4b01c77dd55d0a7de68e458561f726588d357ec3f22002e
                        • Instruction Fuzzy Hash: F4116D26E3C64282FA54B329569113FE6879F457F0F948778E83EC76D6FE2CA4414320
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_LongThread$Err_ErrorLastLong_OccurredRestoreSaveclosesocket
                        • String ID:
                        • API String ID: 586723380-0
                        • Opcode ID: 88cad95bcb5dfa4951526296af0bf2ff21b88eb4dabe66cc17352eaa9c495d40
                        • Instruction ID: 25f9106cce97fb6ff3476657ae54d6f7f53136f3ab109ebe8b65cf80bb6b52d8
                        • Opcode Fuzzy Hash: 88cad95bcb5dfa4951526296af0bf2ff21b88eb4dabe66cc17352eaa9c495d40
                        • Instruction Fuzzy Hash: 48F0E110E1CE07D9FA5567A3A5481B4D255AF38FB1F0496B5C97E623F0DE2CE5C48218
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort$CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 2889003569-2084237596
                        • Opcode ID: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                        • Instruction ID: 817ccf16e5f614c8ae2b0fa91b85b32bd61ce66d1facdc8703b5e3ccb96781d0
                        • Opcode Fuzzy Hash: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                        • Instruction Fuzzy Hash: 8591B3B3B08B918AE750DB66E4402BD77B1F744B98F1041AAEE8D4BB65DF38D165C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                        • API String ID: 2943138195-757766384
                        • Opcode ID: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                        • Instruction ID: 7a7b97423d2f4e3aed724f1d9a5f055a775e46facd1498bf98c907ba038ee296
                        • Opcode Fuzzy Hash: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                        • Instruction Fuzzy Hash: C6714AB2B08E4688FB14AB2699500B867B5BB05BA4F8446F7DA4D53AA5DF2CE170C344
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort$CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 2889003569-2084237596
                        • Opcode ID: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                        • Instruction ID: e71589378b1fe1701979186732e1bc8cec8fc63fd15ceeb90e19ffd39fffeafd
                        • Opcode Fuzzy Hash: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                        • Instruction Fuzzy Hash: 16619773A08FC581D7619B16E4403B9B7A0FB85BA4F0442A6EB9D43765DF3CE1A4CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileHeader
                        • String ID: MOC$RCC$csm$csm
                        • API String ID: 104395404-1441736206
                        • Opcode ID: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                        • Instruction ID: 0498f6a2c30bcfe646609de0339eedfc56350870012fcedeb6dc47dcf2698f5c
                        • Opcode Fuzzy Hash: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                        • Instruction Fuzzy Hash: 2F5190B2B09A4296EAA0AB27914417D76A0FF44F65F1440F3EE4D87761DF3CE4718B82
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF77D681B6A), ref: 00007FF77D68295E
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: %s: %s$Error$Error [ANSI Fallback]$[PYI-%d:ERROR]
                        • API String ID: 2050909247-2962405886
                        • Opcode ID: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                        • Instruction ID: 73ec6bf89455a57c58b06fa0ae3ab1c5e2a7bc309814cbec61ad3786700b431e
                        • Opcode Fuzzy Hash: b3354eec44a94607d33eb4f3788ab89374ba031f66333e1b118589dca889f3f3
                        • Instruction Fuzzy Hash: 1831B763F3C68192E710B765A8406E7A696BF887D4F810236EE8DC3759FF3CD5468210
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                        • String ID: Unhandled exception in script
                        • API String ID: 3081866767-2699770090
                        • Opcode ID: 1a8653f9ef4157c26f2335c81c204ff7a5d47729ffdf6617f9212c2ec85f79f4
                        • Instruction ID: 446fb72b4d02c4236079d394fb0ed5ce25fc5d267de1381daf6e25d45655badc
                        • Opcode Fuzzy Hash: 1a8653f9ef4157c26f2335c81c204ff7a5d47729ffdf6617f9212c2ec85f79f4
                        • Instruction Fuzzy Hash: EC315363A3D68285E710AB21E8552FAA752FF887C4F840235EA4D87B49EF3CD1048710
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,FFFFFFFF,00000000,00007FF77D68918F,?,00007FF77D683C55), ref: 00007FF77D682BA0
                        • MessageBoxW.USER32 ref: 00007FF77D682C2A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentMessageProcess
                        • String ID: WARNING$Warning$[PYI-%d:%ls]
                        • API String ID: 1672936522-3797743490
                        • Opcode ID: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                        • Instruction ID: f63257a47553c2032eff2fe4cf6b8ec4a3197cfdd41733b07804cf9f15422fb3
                        • Opcode Fuzzy Hash: 4a0b6e8ebe13cae449087f655af1d2523953ec7fd560ce9a50e7097f48d063a1
                        • Instruction Fuzzy Hash: 3021A663B2CB4182E710AB14F4447ABA766FB887C4F800236EA8D97659EF3CD255C750
                        APIs
                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,?,00000000,00007FF77D681B99), ref: 00007FF77D682760
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentProcess
                        • String ID: ERROR$Error$Error [ANSI Fallback]$[PYI-%d:%s]
                        • API String ID: 2050909247-1591803126
                        • Opcode ID: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                        • Instruction ID: 01d34c8c1c0404b22cbe3ae83f56b1663057af70ef693a0824993ba038dc5048
                        • Opcode Fuzzy Hash: a4fe537d534c2fb53088f6f6b76b448a80ccad2508d4dc842b27f1a8247accfc
                        • Instruction Fuzzy Hash: F3217F73E3C78182E720AB55B8417E7A7A5EB883C4F800236EA8D93659EF7CD1458750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentSubtypeType_
                        • String ID: a unicode character$argument$east_asian_width
                        • API String ID: 1522575347-3913127203
                        • Opcode ID: 7b891638b4a45313673a93616f0d216ddcfc167a757208e07fea525010fbe4c5
                        • Instruction ID: 13e012abcce93fd39a42a6e7be8276b237c1d5a7b7cdb2b68fd7b6e2a4b3213e
                        • Opcode Fuzzy Hash: 7b891638b4a45313673a93616f0d216ddcfc167a757208e07fea525010fbe4c5
                        • Instruction Fuzzy Hash: D821C025E08E8291EB549B22D46027D2BA1FF88B8AF448035D70D4B77EDF2CE5D5C308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DoubleErr_Float_FromNumericStringSubtypeType_Unicode_
                        • String ID: not a numeric character
                        • API String ID: 1034370217-2058156748
                        • Opcode ID: 8a252d4494416c01de2789638a4ecad70e8503ee6f61509ac703bcac1011aaf0
                        • Instruction ID: c40aa3938edad6da05e6df974d900c46434ed1174543448c0f9eb54a9c87a452
                        • Opcode Fuzzy Hash: 8a252d4494416c01de2789638a4ecad70e8503ee6f61509ac703bcac1011aaf0
                        • Instruction Fuzzy Hash: 06216021E08D42C5EB658B25E42413967A1FF84B8AF148531DB1E4BBBEDF2CF8C58748
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DecimalDigitErr_FromLongLong_StringSubtypeType_Unicode_
                        • String ID: not a decimal
                        • API String ID: 3750391552-3590249192
                        • Opcode ID: 30abf5ee6eb06e173e75edeec379c503cf6988d9432b31e93c7c03d97c2bbd6f
                        • Instruction ID: 4546d90a88596dd1d909e384785519a291017e7d6947988237aefc61a6d0331d
                        • Opcode Fuzzy Hash: 30abf5ee6eb06e173e75edeec379c503cf6988d9432b31e93c7c03d97c2bbd6f
                        • Instruction Fuzzy Hash: 94115121F48A4291FB54CB65E42433927A1AF85B8AF488430DB4E4B77EDF2CE8808748
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_$ArgumentCheckPositional
                        • String ID: a unicode character$argument 1$decimal
                        • API String ID: 3876575403-2474051849
                        • Opcode ID: d3484de5ee44d7a33ec5e53d5364025946576caca118cb4f9bd9e3e7fb1b6d42
                        • Instruction ID: b404335b7f66874474a558b0bccd46cc82b971cf4837ccbb239a8114cbe35a76
                        • Opcode Fuzzy Hash: d3484de5ee44d7a33ec5e53d5364025946576caca118cb4f9bd9e3e7fb1b6d42
                        • Instruction Fuzzy Hash: 5F115A31B08A8295EA509F42E4802A96360EB85BC9F588436DF4D4B77EDF7DE696C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_$ArgumentCheckPositional
                        • String ID: a unicode character$argument 1$numeric
                        • API String ID: 3876575403-2385192657
                        • Opcode ID: f2c4218ba94db24fb659ccbfd3ee4767c89f092abad47c48dbe9f437d0b50517
                        • Instruction ID: 38cfeac6abde39e19d719b493601317b381da845676b8778ee80f2fcefc6dddc
                        • Opcode Fuzzy Hash: f2c4218ba94db24fb659ccbfd3ee4767c89f092abad47c48dbe9f437d0b50517
                        • Instruction Fuzzy Hash: F4115E31F08A4295EA509B46E4402A96370EB84FC9F584436DF1D4B77ECF6DE599C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_$ArgumentCheckPositional
                        • String ID: a unicode character$argument 1$name
                        • API String ID: 3876575403-4190364640
                        • Opcode ID: ab7f7404489c6aefaed3bb65c109ab607c61dcc8bacd4a48ace643e301676b9f
                        • Instruction ID: b8f962f648a6ca76bbd9d4643b5d657622ed7763dc9d87224629ba89f75b6e59
                        • Opcode Fuzzy Hash: ab7f7404489c6aefaed3bb65c109ab607c61dcc8bacd4a48ace643e301676b9f
                        • Instruction Fuzzy Hash: 5C119E35F08A8285EA50DF42E4402A92360EB84BC9F588032DB4D4B77ECF2DE695C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Buffer_ErrorLastRelease$Arg_CheckErr_FromLong_ParseSignalsSizeSsize_tTuple_
                        • String ID: y*|i:send
                        • API String ID: 3302300731-3140140677
                        • Opcode ID: 70f7d7a80c76ac7ebf331995eccc1240174c4d9e6f46aa044d17b734aac3d8e0
                        • Instruction ID: 63d5cfc674a0e753bd760138dba467adf999a1431e1f9cd352f48dece86d6020
                        • Opcode Fuzzy Hash: 70f7d7a80c76ac7ebf331995eccc1240174c4d9e6f46aa044d17b734aac3d8e0
                        • Instruction Fuzzy Hash: F6115E72608F45CAE710CF66E4443AAB3A0FB98BA4F104072EA9D97764DF3DD484CB54
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentErr_Occurred
                        • String ID: a unicode character$argument$combining
                        • API String ID: 3979797681-4202047184
                        • Opcode ID: f57a56bca3f03315399802cbb188705c8f0221a3905f8c719d86b24713be5e96
                        • Instruction ID: 6fb646e48418979c65c7e90b7783516da0c63ada046e592f59a8da2e2f841c42
                        • Opcode Fuzzy Hash: f57a56bca3f03315399802cbb188705c8f0221a3905f8c719d86b24713be5e96
                        • Instruction Fuzzy Hash: 15018460F08A4381EA249B51E4501B923A0FF8879AF800535EB0D4B3BEDE3CE5D58708
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Arg_ArgumentErr_Occurred
                        • String ID: a unicode character$argument$mirrored
                        • API String ID: 3979797681-4001128513
                        • Opcode ID: 9496c058ca4f3a92d16c11e0dea8752c802f91a4b5f675f0277ed2c6365c313a
                        • Instruction ID: 6f7469f7d8c9fffca2b4c78233b85cda653bafb309843b3fc69968309c8f0545
                        • Opcode Fuzzy Hash: 9496c058ca4f3a92d16c11e0dea8752c802f91a4b5f675f0277ed2c6365c313a
                        • Instruction Fuzzy Hash: 26018F60E08A4385EA64DB61E8601B923A0FF8879AF400531D74D4B3BEDE2CEAD4C309
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Capsule_DeallocPointer
                        • String ID: _socket.CAPI
                        • API String ID: 898671391-3774308389
                        • Opcode ID: 147324779042020adf52fa7f054c0f0e2125f6212a673ba3a80a163640bf1b1a
                        • Instruction ID: 47ca38d90de03ec488765a910bddb146b960cd4dd2b43f1edd7e832ec1ede28b
                        • Opcode Fuzzy Hash: 147324779042020adf52fa7f054c0f0e2125f6212a673ba3a80a163640bf1b1a
                        • Instruction Fuzzy Hash: 4C01C432E0DD42CDE6555F27C8543B8A264AB65F36F54C0B0CA6D652B0CF7DA8818308
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Mem_$Capsule_Err_FreeMallocMemory
                        • String ID: unicodedata._ucnhash_CAPI
                        • API String ID: 3673501854-3989975041
                        • Opcode ID: 04962b3129ec8039d4574c2b15526bc82bf072c2335504b47079f601afa57e40
                        • Instruction ID: f34ee44884af9c74f2ce9aced05fbd04dc363518c8dea4b1c129870dbbc2b8c0
                        • Opcode Fuzzy Hash: 04962b3129ec8039d4574c2b15526bc82bf072c2335504b47079f601afa57e40
                        • Instruction Fuzzy Hash: 53F04F21E19F4795EB058B21E92427863A4BF09B83F481432CA4E0637EEF3CF144C348
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                        • Instruction ID: 1770cd55ac1beb024a4d0b1099aa99eea230b739e2cc4ce52add5c26bad3d860
                        • Opcode Fuzzy Hash: b239dd027a539e56a716c05e535b4da9cb8e2339e08a4dc57142401ef2416000
                        • Instruction Fuzzy Hash: 5DF04422E3D60681EA10AB24A45437B9762EF897E5F941339D56E851E4FF2CD444C720
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Module_$FromInternObjectStateStringUnicode_
                        • String ID: close$error
                        • API String ID: 4029360594-371397155
                        • Opcode ID: 0a630f88c3fb29b6303c131d10015d5f25b4110c9ff69da5c0eced729275bb56
                        • Instruction ID: 5a5c8490eae02023ed23b346299fd354d2a9bcfa568464483b5ffa0ce4f04df6
                        • Opcode Fuzzy Hash: 0a630f88c3fb29b6303c131d10015d5f25b4110c9ff69da5c0eced729275bb56
                        • Instruction Fuzzy Hash: F8F03A21A09F4791EA008B66F8840B9A360BF0ABA5B4441BAFA1D663B1DE3DD85D8300
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BuildDeallocErr_ObjectSizeValue_
                        • String ID: (is)$getaddrinfo failed
                        • API String ID: 3413694139-582941868
                        • Opcode ID: c34809af6fe48c3d98dc105baad316adadc833bdd741b3991c46394a393d3a53
                        • Instruction ID: c47b404452dc8df0da604ffe09783ecb7f9479d98c86410f8fd2a839539e95ec
                        • Opcode Fuzzy Hash: c34809af6fe48c3d98dc105baad316adadc833bdd741b3991c46394a393d3a53
                        • Instruction Fuzzy Hash: 37F0FE25A08E47CAFA058B62E9482A5A3A0EF68FA5F448071CA6D66674EF3CD494C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: BuildDeallocErr_ObjectSizeValue_
                        • String ID: (is)$host not found
                        • API String ID: 3413694139-3306034047
                        • Opcode ID: e90ec528a1d937703f33ea49ca5fade7d46b30f37fbc55b9918f483f3cce63c4
                        • Instruction ID: 06b694e0996952b7a1fecde6b1e7d4c6ba59bacb2aa8333d9499282f50ca61eb
                        • Opcode Fuzzy Hash: e90ec528a1d937703f33ea49ca5fade7d46b30f37fbc55b9918f483f3cce63c4
                        • Instruction Fuzzy Hash: F3F0FE25A08E4689FA154B63E8482A4E3A0EF68FA5F4480B1CA7D66674DE3CD4858308
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: NameName::$Name::operator+
                        • String ID:
                        • API String ID: 826178784-0
                        • Opcode ID: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                        • Instruction ID: c27719cab2395f36c17cfd406b8932f99f659b90677ac9e23bdfdc20e0fe4823
                        • Opcode Fuzzy Hash: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                        • Instruction Fuzzy Hash: 54414CA2B19F5298EB10EB22E8541B827B4BF15FA4F9444F3DA4D537A5DF38E865C300
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: List_$DeallocItem
                        • String ID:
                        • API String ID: 1559017468-0
                        • Opcode ID: a3b86cd28f5a00db1039b6b37618db01fe58124a87f1d68f694451c2dc2a1ca4
                        • Instruction ID: 797b4fc11bc49a3f34eb1eb327b8ea40920b88627532fb40d4adebaa683886d4
                        • Opcode Fuzzy Hash: a3b86cd28f5a00db1039b6b37618db01fe58124a87f1d68f694451c2dc2a1ca4
                        • Instruction Fuzzy Hash: E021B432A18F529AEB248F13E484369B3A0FB0AB90F444479DB4D53760DF3DE55AC340
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                        • Instruction ID: 213db936796fc3778afcba5c84b0d6d08a704705715f00606921d5d5fe13ce49
                        • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                        • Instruction Fuzzy Hash: 91114F23D7CA0201F6542155A89137B9062AFD93E8FE40736EBAE962DABE6C68414220
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3AF
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3CE
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B3F6
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B407
                        • FlsSetValue.KERNEL32(?,?,?,00007FF77D69A5A3,?,?,00000000,00007FF77D69A83E,?,?,?,?,?,00007FF77D69A7CA), ref: 00007FF77D69B418
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: 6f944022d23edc1c4acf36ee41aa723466f994e0e1af3fb98e05b0010e79b0d5
                        • Instruction ID: 83ca0808ae1361b3a0c94cd2bef51bd5ce1e9d53afcc9c135310723a2e4ed9a1
                        • Opcode Fuzzy Hash: 6f944022d23edc1c4acf36ee41aa723466f994e0e1af3fb98e05b0010e79b0d5
                        • Instruction Fuzzy Hash: BA116D26E3C60241FA58B329969113BA5835F447F0FD8937CE83DC66CAFE2CE4429220
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DeallocModule_State
                        • String ID:
                        • API String ID: 1903735390-0
                        • Opcode ID: 2ce0c8c7188e7a3beb229335f2cd0a6251314470689c624f0e1d13b771884af1
                        • Instruction ID: a113cfe5e4d60c9f89b7c69d5035bc31d61f51281dddd0cd47147902aacdd5a5
                        • Opcode Fuzzy Hash: 2ce0c8c7188e7a3beb229335f2cd0a6251314470689c624f0e1d13b771884af1
                        • Instruction Fuzzy Hash: 9821FE31E0DE92C5FB595F7288843B8B2A4AB57B39F1440B4E60E623A1CF7EA54D8701
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: cf61fb6c00b1796c5bed08ecf7b6551a73a14dc995a044f45feadad5ae41d3ad
                        • Instruction ID: f538c7682a5980089d859b24db90e66a5ae9d22e0dc95da31c83f38e38dad85e
                        • Opcode Fuzzy Hash: cf61fb6c00b1796c5bed08ecf7b6551a73a14dc995a044f45feadad5ae41d3ad
                        • Instruction Fuzzy Hash: ED110626E3C20741F958B36945A117BA5838F467F0FA487BCE93ECA6C2FD2CB4404231
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Arg_DuplicateParseRestoreSaveSizeSocketTuple_
                        • String ID:
                        • API String ID: 3898289384-0
                        • Opcode ID: c8e2bad8f66a6fb79bb8ed3b2e5e97b1d887adf2b3fc17a41d9c2dd7865fadd9
                        • Instruction ID: eb1123acc7618ba9664ab84bda97e3a4b8b1aebe937c5afe0a5a8cd49b555294
                        • Opcode Fuzzy Hash: c8e2bad8f66a6fb79bb8ed3b2e5e97b1d887adf2b3fc17a41d9c2dd7865fadd9
                        • Instruction Fuzzy Hash: 39115661A09FC1CAEA209B62E4883B9A354FF64FB0F004171D96D137B4DF3CD0448604
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Err_Long_OccurredRestoreSaveshutdown
                        • String ID:
                        • API String ID: 24305128-0
                        • Opcode ID: 6516a418a14a859acfa3d73bcf82298d2a1ff85a94d003fe5974aec2db2ce4ef
                        • Instruction ID: 376f4ab411e07b0f9fbcd44fb5c4773155327edb43dd0ee8c002967cc054ebbc
                        • Opcode Fuzzy Hash: 6516a418a14a859acfa3d73bcf82298d2a1ff85a94d003fe5974aec2db2ce4ef
                        • Instruction Fuzzy Hash: 2B013621F1CF42CAEA505B63B584179A360AF68FB0B14C670EA6E53774DF3CE4859214
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_$DecodeDefaultErrnoFromLongLong_OccurredUnicode_Unsignedif_indextoname
                        • String ID:
                        • API String ID: 2382930745-0
                        • Opcode ID: 3cc25d69238de96e231579351c1bec566e97787018e5fdd4677d39b8f471e047
                        • Instruction ID: 41ae4ab59be4b0e7e16d9b554014689c8d9a5bee0180219d8f7338659dbb7378
                        • Opcode Fuzzy Hash: 3cc25d69238de96e231579351c1bec566e97787018e5fdd4677d39b8f471e047
                        • Instruction Fuzzy Hash: 7C01EC61A18E4189FA219B22E8943B5A390AFA8F75F408574D96E963B0DF2CA5448604
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: verbose
                        • API String ID: 3215553584-579935070
                        • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                        • Instruction ID: 49fc8158dee8d03463ff35406dbe0ecb005a87ac0c8d3ef9179d083adc5d5de7
                        • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                        • Instruction Fuzzy Hash: 2191AE23E3C74681EB60AFA8D55037FB693AB41BD4FC4427ADA59872D5EE3CE4058320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                        • Instruction ID: 00767ae982e21424efe52ce2e6c62e4e55cc184f1f67ef8eba1cd89e678e24d8
                        • Opcode Fuzzy Hash: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
                        • Instruction Fuzzy Hash: 8E81A473E3C202D5F764BE25811027BB6A3AB117C4FD68279CA09D7285EF2DE9499321
                        APIs
                          • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                        • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45488B
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort
                        • String ID: $csm$csm
                        • API String ID: 4206212132-1512788406
                        • Opcode ID: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                        • Instruction ID: 981da8115c9b48803b9ad4d14fb071730699ec5304509786106cb108d2509734
                        • Opcode Fuzzy Hash: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                        • Instruction Fuzzy Hash: 8D71D4B2B08AC186D7659F26D04037D7BA1FB41FA8F0481B2DA8D0B6AACB3CD461C741
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2395640692-1018135373
                        • Opcode ID: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                        • Instruction ID: 1745753b4f805a345d4c0616f5d3b058fc74155de081ad507d368850db67da1f
                        • Opcode Fuzzy Hash: 4bd751ab4a757734da5bac4c310991cbc8ef63d187f18c7a3c34a87046479a0f
                        • Instruction Fuzzy Hash: BD517023E3D602CEDB14AB15D444A7AA792EB44BD8F984231DB4E87744EF7CE841CB20
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                        • Instruction ID: 070cc0957e374de7d9a95a03585695e38ce21bbd50daed78c51e6b64d8680c66
                        • Opcode Fuzzy Hash: 1c81a5d02d7979dd4dad50f55436adaf5051385037e661534b2c2f58034018d3
                        • Instruction Fuzzy Hash: 7B616C3392CB85C5DB20AB15E4403AAB7A1FB957D8F444235EA9C43B96EF7CD190CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                        • Instruction ID: 67e3a653c59d2beac016d2c38ef232b8e60f1bc17d661ba938a5d04c8be8dfd0
                        • Opcode Fuzzy Hash: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
                        • Instruction Fuzzy Hash: 5A519F33E3C242C6EB64AA21914426AB7A2EB64BC4F944236DA4C83B96DF3CE450C751
                        APIs
                          • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                        • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A4545DB
                        • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FFE1A4545EB
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Frameabort$EmptyHandler3::StateUnwind
                        • String ID: csm$csm
                        • API String ID: 4108983575-3733052814
                        • Opcode ID: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                        • Instruction ID: de0bbe02d8b80d45672660b4dc0e76c3c97907b3f4d833729b3815f7139b15e7
                        • Opcode Fuzzy Hash: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                        • Instruction Fuzzy Hash: DC51A4B2B08A8586EB649B12914437976A1FB50FA4F1441F7DB4C4BBA6CF3CE571CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: NameName::
                        • String ID: %lf
                        • API String ID: 1333004437-2891890143
                        • Opcode ID: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                        • Instruction ID: d2b3330a5854bd68c2839003d70c3650593197a4c269079963081034022440b0
                        • Opcode Fuzzy Hash: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                        • Instruction Fuzzy Hash: B331B7A1B0CF4685EA11EB13A8501BA7361BF55FA0F5481F7EA5E53771EE2CE162C700
                        APIs
                        • CreateDirectoryW.KERNEL32(00000000,?,00007FF77D68352C,?,00000000,00007FF77D683F1B), ref: 00007FF77D687F32
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CreateDirectory
                        • String ID: %.*s$%s%c$\
                        • API String ID: 4241100979-1685191245
                        • Opcode ID: a1c59376f93c8b4c6db0aee125681cb96c2ab9e1787ffa8cf6eb7b68f1c1c36c
                        • Instruction ID: 3c798745d1f8650b8f62018f9636e3239a9f20de0f3146175b9d1dd341fbab97
                        • Opcode Fuzzy Hash: a1c59376f93c8b4c6db0aee125681cb96c2ab9e1787ffa8cf6eb7b68f1c1c36c
                        • Instruction Fuzzy Hash: 1C31BA62E3DAC185EA21A711E4507ABA356EB84BE0F844331EAAD877C5FF2CD6418750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: ERROR$Error$[PYI-%d:%ls]
                        • API String ID: 2030045667-255084403
                        • Opcode ID: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                        • Instruction ID: 31a32ef2c6f95a0c2a27cc5e00b15e28b4dc188d125b7932c4417faf45dc7aa1
                        • Opcode Fuzzy Hash: 035b7a672ed8def45fe49a9c290554376ffedfd07499b26c39d849b73b89d90e
                        • Instruction Fuzzy Hash: 1E219163B28B4182E710AB14B4447ABA7A6EB887C0F800236EA8D93659EF3CD255C750
                        APIs
                        • PyErr_SetString.PYTHON312(?,?,?,?,?,00007FFE00451EBC), ref: 00007FFE00453C1F
                          • Part of subcall function 00007FFE00451FB0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE00451FE8
                          • Part of subcall function 00007FFE00451FB0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE00452006
                        • PyErr_Format.PYTHON312 ref: 00007FFE00451F33
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_strncmp$FormatString
                        • String ID: name too long$undefined character name '%s'
                        • API String ID: 3882229318-4056717002
                        • Opcode ID: 1035d3c545dcad7f3fc1fcdb04c9696ab0948ab795443172b9eb40205ee2c5c7
                        • Instruction ID: 53e35b4b19dcbedcfb4c2b57ef1a9ec031c4717641aca3b0ed16b304cafff533
                        • Opcode Fuzzy Hash: 1035d3c545dcad7f3fc1fcdb04c9696ab0948ab795443172b9eb40205ee2c5c7
                        • Instruction Fuzzy Hash: 4B110076E18D47D1EB008B14E8946B86761FB8874AF840531DB0D477BADF7DE14AC744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorLast$Err_Eval_Thread$AuditCheckFormatFromLongLong_RestoreSaveSignalsSys_connect
                        • String ID: connect_ex$socket.connect
                        • API String ID: 3879675179-935070752
                        • Opcode ID: 414937b2a6d92fbc3da88fc1208311d46d9418bcea39934cf64ea2bb9134626d
                        • Instruction ID: 62691dd546c1f3406150417d1ad322bf580ab624ee9c7f40d36f0128aa7cac2f
                        • Opcode Fuzzy Hash: 414937b2a6d92fbc3da88fc1208311d46d9418bcea39934cf64ea2bb9134626d
                        • Instruction Fuzzy Hash: 34115221B08E82C5F7208B23F4107E6B3A0BF64BE4F508072DA5D67665EE3CD144C704
                        APIs
                          • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                        • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A452A8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abortterminate
                        • String ID: MOC$RCC$csm
                        • API String ID: 661698970-2671469338
                        • Opcode ID: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                        • Instruction ID: bf05f5ed05f654c924678f930fc850e68dc2489998943898e4d87e2a05e401aa
                        • Opcode Fuzzy Hash: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                        • Instruction Fuzzy Hash: EBF03C72A18A0686E7A47B63E18107D7664EF48F61F1950F3EB4806262CF7CE8B0C701
                        APIs
                        Strings
                        • no printf formatter to display the socket descriptor in decimal, xrefs: 00007FFE133367CB
                        • <socket object, fd=%ld, family=%d, type=%d, proto=%d>, xrefs: 00007FFE133367A5
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_FormatFromStringUnicode_
                        • String ID: <socket object, fd=%ld, family=%d, type=%d, proto=%d>$no printf formatter to display the socket descriptor in decimal
                        • API String ID: 1884982852-285600062
                        • Opcode ID: adbad624c4c56f29da8e25935a1100d7f970daaacfccf8b58daafbc43e48176e
                        • Instruction ID: 7b8862da4e3d907d316ef7d85c3db3cd3cd88235dfd5c12a888bbeda281fad49
                        • Opcode Fuzzy Hash: adbad624c4c56f29da8e25935a1100d7f970daaacfccf8b58daafbc43e48176e
                        • Instruction Fuzzy Hash: 06F01D64A08902CDDA108B16D4801387360FB68FB8FA08771D93D572F0DE2CE416D704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 2718003287-0
                        • Opcode ID: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                        • Instruction ID: b620f536da00e8410c8aad0e1fdc1d57d60188c4c5e9e8a437d79d7f895de897
                        • Opcode Fuzzy Hash: 04e310725d937c0b27e7ac1e6c46040fced781be2c4963351fe3137ba04acc33
                        • Instruction Fuzzy Hash: 26D1EF73F2CA818AE710DF75D4402BD77A2FB547D8B81426ADE5E97B89EA38D006C710
                        APIs
                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77D69CF4B), ref: 00007FF77D69D07C
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77D69CF4B), ref: 00007FF77D69D107
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ConsoleErrorLastMode
                        • String ID:
                        • API String ID: 953036326-0
                        • Opcode ID: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                        • Instruction ID: 196cbd5a16054765cac47f1e13bde620b678d246ddfc815946f20d7abc784894
                        • Opcode Fuzzy Hash: a47a8d54e36ced6583969bea4ac316e5fdc1f02f5f342ddc714eca2f45cad1a1
                        • Instruction Fuzzy Hash: C691B423E3C65185F750AF65944427EABA3BB44BC8F98427DDF0E97694EE38D442CB20
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID:
                        • API String ID: 2943138195-0
                        • Opcode ID: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                        • Instruction ID: e2f86aca1f601f7042d61afb5962c07a50ea380ada2080909daca55c9a1d71c2
                        • Opcode Fuzzy Hash: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                        • Instruction Fuzzy Hash: FA914BA2F08F5289F7119B66D8443BC37B1BB04B68F5440F7DA4D176A5DF78A8A6C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: strncmp
                        • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                        • API String ID: 1114863663-87138338
                        • Opcode ID: 8c364d9f7697f15a55bc755bfe662b8d9c35c3fd34f27cade82d87210dead623
                        • Instruction ID: 38e19ae2f11be9cfbd1a8aa3efa97cc056c22d328b4dbf04491403bbea14a671
                        • Opcode Fuzzy Hash: 8c364d9f7697f15a55bc755bfe662b8d9c35c3fd34f27cade82d87210dead623
                        • Instruction Fuzzy Hash: EC613832B1865146E6608E15A90067E7252FB85BD2F448236EF5D477EEDFBCE501C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_isindst
                        • String ID:
                        • API String ID: 4170891091-0
                        • Opcode ID: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                        • Instruction ID: 47c386d92cb6092024ef8aaec72e1afa5e0f926da57bb014de277f08e1199991
                        • Opcode Fuzzy Hash: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
                        • Instruction Fuzzy Hash: D8510B73F3811186EB14EF6499516BDA7A3AF543E8F910339DE1D92AD9EF38A402C710
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                        • String ID:
                        • API String ID: 2780335769-0
                        • Opcode ID: 601044899bb77d1db34704472f686b9691880a3163deed0eb7e9945e8072c835
                        • Instruction ID: 8a28f5429d2e4c9e67125e252388ac25a87a77d90ee7c1001c010b0887ce1940
                        • Opcode Fuzzy Hash: 601044899bb77d1db34704472f686b9691880a3163deed0eb7e9945e8072c835
                        • Instruction Fuzzy Hash: EA518233E3865185FB10EF71D5503BEA7A3AB48798F944639DE4D87689EF38D4418360
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+$Replicator::operator[]
                        • String ID:
                        • API String ID: 3863519203-0
                        • Opcode ID: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                        • Instruction ID: 9e8a31f296105f5cfc6c94cd492f7fb90470b07ebc3ddefbf57ebb7c5ca3f9eb
                        • Opcode Fuzzy Hash: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                        • Instruction Fuzzy Hash: 104166B2B08B4189FB01DF66D8403BC37B0BB48B68F9484B6DA8D57769DF789495C350
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: LongWindow$DialogInvalidateRect
                        • String ID:
                        • API String ID: 1956198572-0
                        • Opcode ID: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                        • Instruction ID: 4db702e4260f0ae1114fb5573849cb1bf17f1f569369efbc96099a92f6ea5e0a
                        • Opcode Fuzzy Hash: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                        • Instruction Fuzzy Hash: 7611E922F3C142C2F654A769E54427B9693EB887C0FD44230DB8947B8DED3DD4D18220
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Err_RestoreSaveStringgetsocknamememset
                        • String ID:
                        • API String ID: 772546412-0
                        • Opcode ID: bb4860f722e20605b845678caae1940802489a0c30753b108cbd7cf2fc4f76aa
                        • Instruction ID: d2cbdc79b1d22ab5dd9fdb6a993b142de46caf432755f3f1aa766ca7581f88d1
                        • Opcode Fuzzy Hash: bb4860f722e20605b845678caae1940802489a0c30753b108cbd7cf2fc4f76aa
                        • Instruction Fuzzy Hash: E5113625A1CFC6C6EA309B52F4403AAE361FBA4B94F408172DA9D67A69DF3CD145C704
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$Err_RestoreSaveStringgetpeernamememset
                        • String ID:
                        • API String ID: 1387529023-0
                        • Opcode ID: 6217d1f52f68499da46158bc7b5de8f19134ea31d65d8230de025008c52050e8
                        • Instruction ID: 8036eca47b3fadf2a42ed609f68d265e6b1a0a5629fb20338c45b6ed31cfa141
                        • Opcode Fuzzy Hash: 6217d1f52f68499da46158bc7b5de8f19134ea31d65d8230de025008c52050e8
                        • Instruction Fuzzy Hash: 7F116625A0CFC2C6EA309B52F0403AAE361FB94B94F008072D69D27A69DF3CE045CB04
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: d9f98cd6e8095113ce688e9adc81d2d2b62b70132384823deca84349fed3ec32
                        • Instruction ID: 91636e9d6e0b14421da765e8c760570b423b5d27a6b690c8c95efc4d6af645bb
                        • Opcode Fuzzy Hash: d9f98cd6e8095113ce688e9adc81d2d2b62b70132384823deca84349fed3ec32
                        • Instruction Fuzzy Hash: 7F112A22B14F018AEB00CF62E8543B873A4FB69B68F440E31EA6D967A8DF7CD154C340
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 109ceed06940f0f17d4484f54d46a13cc3e2d9acbfc7514a401e54a12864ff88
                        • Instruction ID: a17b97d7ea5cd208c9c9e23f8f8818c8a3051a32cf0b20074aac15045b75e167
                        • Opcode Fuzzy Hash: 109ceed06940f0f17d4484f54d46a13cc3e2d9acbfc7514a401e54a12864ff88
                        • Instruction Fuzzy Hash: 59112E26B14F028AEB00CF60E8542B933A4FB19B59F441E31DB6D477A8DF78E1548380
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667804984.00007FFE148E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE148E0000, based on PE: true
                        • Associated: 00000001.00000002.2667789447.00007FFE148E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667822402.00007FFE148E3000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667838554.00007FFE148E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000001.00000002.2667854016.00007FFE148E6000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe148e0000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 7f6b854855521a5eeb54a69c346efd32b0b439a43f7217cfd0872cc224e201bb
                        • Instruction ID: 66a7702088a0ed98d5d21ce2edda39b65c9d63279ff5969b6908eefb5e73ecd6
                        • Opcode Fuzzy Hash: 7f6b854855521a5eeb54a69c346efd32b0b439a43f7217cfd0872cc224e201bb
                        • Instruction Fuzzy Hash: C8113026B14F018AEB00DF61E8942B873A4F71A768F440E71EA6D567B4DF7CD6588340
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666699426.00007FFDFB201000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFDFB200000, based on PE: true
                        • Associated: 00000001.00000002.2666683732.00007FFDFB200000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2666857105.00007FFDFB482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2666857105.00007FFDFB4A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2666857105.00007FFDFB4B1000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2666857105.00007FFDFB527000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2666857105.00007FFDFB5F2000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667086810.00007FFDFB6F6000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667130826.00007FFDFB763000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667147094.00007FFDFB765000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667163057.00007FFDFB766000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667178413.00007FFDFB767000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667195570.00007FFDFB769000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667242952.00007FFDFB7EF000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667261746.00007FFDFB7F1000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667278783.00007FFDFB7FB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667301806.00007FFDFB820000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667318780.00007FFDFB821000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667337353.00007FFDFB822000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667353749.00007FFDFB823000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667369059.00007FFDFB825000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667387162.00007FFDFB831000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667403441.00007FFDFB832000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667427607.00007FFDFB874000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2667446336.00007FFDFB891000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffdfb200000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: c3ed045bb38a667c100e22636b803ba1f380a34d6de05b6f2a16d532bdd1e237
                        • Instruction ID: 38b55490ada88983391d663e2f1a6acea32a42993edf941b552531a9a92f2aaf
                        • Opcode Fuzzy Hash: c3ed045bb38a667c100e22636b803ba1f380a34d6de05b6f2a16d532bdd1e237
                        • Instruction Fuzzy Hash: 6F113C26B15F068AEB00DF60EC646B833A4FB19758F441E31EA6D86BA8EF7CD154C340
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                        • Instruction ID: 14a8499e14123beba902dd89f1c22f41f4dd9097b921d8cf51a00b565be52fc5
                        • Opcode Fuzzy Hash: 884c9866f0db1ea4ea3e8c559fd458021c8c8106c035f87ab540984eb8a2d97e
                        • Instruction Fuzzy Hash: 09111F26B28B0589EB00DF64E8542BA73B4F759798F440E31DA6D86764EF78D1548350
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                        • Instruction ID: 33dffdaf724ecdefb08a3f1d2a2de64897ed55664a948e8fbf907ee1024d40a7
                        • Opcode Fuzzy Hash: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                        • Instruction Fuzzy Hash: 7E113022B18F418AEB00CF61E8542B833B4F759B68F440E72DA6D477A8DF7CE1688340
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Eval_Thread$RestoreSave_errnoclosesocket
                        • String ID:
                        • API String ID: 1624953543-0
                        • Opcode ID: 469834960f5fb333051253006ecc6c4dbb46e8df025279c03e012d890aa341a8
                        • Instruction ID: b5c4f0274551ca12e17240d305ccf627bf02a8eec55b346948946d46e4334420
                        • Opcode Fuzzy Hash: 469834960f5fb333051253006ecc6c4dbb46e8df025279c03e012d890aa341a8
                        • Instruction Fuzzy Hash: EDF03C62A08F41C6EA549B57B448268B364FF68FB1B188370EA7E137F0CF7CD8858204
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritableUnwind
                        • String ID: csm
                        • API String ID: 451473138-1018135373
                        • Opcode ID: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                        • Instruction ID: 3e254eb058274db80f329d4f6bdb0b1a4564a01dbbbef0ed088735ea23cff000
                        • Opcode Fuzzy Hash: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                        • Instruction Fuzzy Hash: 7A51D572B19A028ADB18EB17E444A7C73A1EB44FA4F1081F6DA5D437A8DF3DE861C701
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: _get_daylight$_invalid_parameter_noinfo
                        • String ID: ?
                        • API String ID: 1286766494-1684325040
                        • Opcode ID: 34aa9ba053483d92f686c00bb3d23c2ed0895a5cb55bf09a4ef316522e0c30cf
                        • Instruction ID: ff92f2518d4ab9e194f3fd5ebea0e4a1a50341733b802b621a1c783827fed23c
                        • Opcode Fuzzy Hash: 34aa9ba053483d92f686c00bb3d23c2ed0895a5cb55bf09a4ef316522e0c30cf
                        • Instruction Fuzzy Hash: 5041F523E3C28241E724E725945137BA692EBD0BE4F944339EE9D86ADDEF3CD4418710
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abort$CreateFrameInfo
                        • String ID: csm
                        • API String ID: 2697087660-1018135373
                        • Opcode ID: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                        • Instruction ID: 6c548b89e410d91d6acf8a4d69b70324756b5b1b9ef40ebb5ab467b027ff0735
                        • Opcode Fuzzy Hash: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                        • Instruction Fuzzy Hash: 1F511C73719B4186D660AB26E44027E77A4FB89FA1F1401B6EB8D47B65CF3CE461CB01
                        APIs
                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF77D699046
                          • Part of subcall function 00007FF77D69A948: HeapFree.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A95E
                          • Part of subcall function 00007FF77D69A948: GetLastError.KERNEL32(?,?,?,00007FF77D6A2D22,?,?,?,00007FF77D6A2D5F,?,?,00000000,00007FF77D6A3225,?,?,?,00007FF77D6A3157), ref: 00007FF77D69A968
                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF77D68CBA5), ref: 00007FF77D699064
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                        • String ID: C:\Users\user\Desktop\ITC590-Script 3 V2-P-2024.exe
                        • API String ID: 3580290477-818140841
                        • Opcode ID: 652ac8178d02f9bf502bb0dac840cc2c27021cfa98e1c84195502d2d1921a3a9
                        • Instruction ID: 55a836dad8fb8ed1c6f3f5e98ecb12e168b273073b0afe6edf662220781ca243
                        • Opcode Fuzzy Hash: 652ac8178d02f9bf502bb0dac840cc2c27021cfa98e1c84195502d2d1921a3a9
                        • Instruction Fuzzy Hash: BA416E37E3C71285E714AF2595800BAB7A7FB487D0B95527AE94D83B85FE3CE4818320
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: U
                        • API String ID: 442123175-4171548499
                        • Opcode ID: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                        • Instruction ID: cbeb1b35439bb3f0d7e1996fb4b1a01f507193706e99a2bb16ecf329025b6c6d
                        • Opcode Fuzzy Hash: 4f5d94246872f2193e537bc66f33c90add5f7e97f4787e66017fcfb3b1ebd6d4
                        • Instruction Fuzzy Hash: E4419163A3CA4181DB20AF25E4443BAA7A2FB887C4F814235EA4DC7798EF3CD405CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Name::operator+
                        • String ID: void$void
                        • API String ID: 2943138195-3746155364
                        • Opcode ID: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                        • Instruction ID: 6a3847a797ea34b0243600d97617f3cdeba82360af4f26f101c998dbfe1bd0e4
                        • Opcode Fuzzy Hash: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                        • Instruction Fuzzy Hash: 373105A2F18B559DFB01DBA5E8400FC37B0BB48B58F4405B6EA4E53A69DF3C9164C750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID: :
                        • API String ID: 1611563598-336475711
                        • Opcode ID: e8d367c4ea258391d160676196091cc4497c978f166048fd005a5cb1bdaac227
                        • Instruction ID: 964337a21861e369412d896d3835c6b074c981b240ba78b7c6488159310ffc96
                        • Opcode Fuzzy Hash: e8d367c4ea258391d160676196091cc4497c978f166048fd005a5cb1bdaac227
                        • Instruction Fuzzy Hash: 6E21A073E3C34181EB20AB15904427EA3A3EB94BC4F864239D68D83695EF7CE5458761
                        APIs
                          • Part of subcall function 00007FFE13338654: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFE13338698
                        • PyErr_SetString.PYTHON312(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFE13333FC0), ref: 00007FFE13334C47
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_String__stdio_common_vsscanf
                        • String ID: %X:%X:%X:%X:%X:%X%c$bad bluetooth address
                        • API String ID: 3283897942-3956635471
                        • Opcode ID: 82460378f9390543d5d03a976a5082cfe22b1e135c935a62461cff4db5ddd525
                        • Instruction ID: ccad937845cde5c8bb7df8308a8eeb5db2a80719b2c0d40099472df190f87b88
                        • Opcode Fuzzy Hash: 82460378f9390543d5d03a976a5082cfe22b1e135c935a62461cff4db5ddd525
                        • Instruction Fuzzy Hash: AF21CFB1718E859ADB50CB02E8880ACB3A2F754BE0F418136EABC57B64DF3DD858C710
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: FileHeader$ExceptionRaise
                        • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                        • API String ID: 3685223789-3176238549
                        • Opcode ID: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                        • Instruction ID: 17a2e61351ae8dc12e7991a8cfa1d336490933007049f6bf365d772dc3632de2
                        • Opcode Fuzzy Hash: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                        • Instruction Fuzzy Hash: 690175A1B19D46A1EE40EB16F450178A360FF80F64F4854F3E51E07679EF6CE568C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaise
                        • String ID: csm
                        • API String ID: 2573137834-1018135373
                        • Opcode ID: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                        • Instruction ID: ba8f854b799dacf9db38a70c412af82643bc7bf57596a335849349486092c63c
                        • Opcode Fuzzy Hash: b596af9f6a60738c50b353da5cbad86497326ffe12a5eabfdc94c01c9dae4a3e
                        • Instruction Fuzzy Hash: 86114C33A2CB8182EB219F15E40026ABBE5FB88B84F984631DBCD47759EF3CC5558700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaise
                        • String ID: csm
                        • API String ID: 2573137834-1018135373
                        • Opcode ID: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                        • Instruction ID: cbebe9d87d3f32192772af2eaa90a002eec98cf13a5b03ff9fcc6ff7f3e1d358
                        • Opcode Fuzzy Hash: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                        • Instruction Fuzzy Hash: 86112E72618F8182EB618B16F840269B7E5FB88F99F5842B1DF8C07768DF3DD5618700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2666583150.00007FF77D681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77D680000, based on PE: true
                        • Associated: 00000001.00000002.2666564889.00007FF77D680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666607457.00007FF77D6AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666629980.00007FF77D6C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2666662431.00007FF77D6C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ff77d680000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: DriveType_invalid_parameter_noinfo
                        • String ID: :
                        • API String ID: 2595371189-336475711
                        • Opcode ID: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                        • Instruction ID: ec74fa260558e8435e2ed8b85590191b1fb7eb131c19f089dfce8499952ac3d5
                        • Opcode Fuzzy Hash: 68237dfdc7112287ec82a3b365f776b5c9f6f856de5878160eaa1a8f91e0357f
                        • Instruction Fuzzy Hash: 6A017163D3C20285E720BF60946127FA3A2EF847C4FD00235D58DD2685FE3CE5048B24
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: String$Err_FromUnicode_
                        • String ID: no such name
                        • API String ID: 3678473424-4211486178
                        • Opcode ID: 3005c2e76ccdbfdbb1504f9de79cdf15a2dc4c168f6a8fbb72cf26d2d18b7585
                        • Instruction ID: 96cceaa9ae5b413b3fd2aea7a524f45295509af4aaab05d7c19fd320677e6266
                        • Opcode Fuzzy Hash: 3005c2e76ccdbfdbb1504f9de79cdf15a2dc4c168f6a8fbb72cf26d2d18b7585
                        • Instruction Fuzzy Hash: 28012C31A19E4291FB618B25E8543B923A0BFD8B4AF410031DB4E4A37AEE2CE0458B08
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667720462.00007FFE13331000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE13330000, based on PE: true
                        • Associated: 00000001.00000002.2667704348.00007FFE13330000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667736797.00007FFE13339000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667756494.00007FFE13341000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000001.00000002.2667772363.00007FFE13343000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe13330000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Err_String
                        • String ID: getsockaddrlen: bad family$getsockaddrlen: unknown BT protocol
                        • API String ID: 1450464846-3381576205
                        • Opcode ID: 68c5e8985835ae6d1ad6a3eb8734c9d41b7279e8c40dd2ee74cade83e5c1d99f
                        • Instruction ID: 3f854c0d9fe083b14bc9a0792ed4fb52ff3f1f9a0590a297cb17ff692d9c7d74
                        • Opcode Fuzzy Hash: 68c5e8985835ae6d1ad6a3eb8734c9d41b7279e8c40dd2ee74cade83e5c1d99f
                        • Instruction Fuzzy Hash: DB011DB990C902CDF7648F0BD484278A2A1AB65F20F61C4B1C52DF66B0CF7CA4D59709
                        APIs
                          • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                        • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45F45A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: abortterminate
                        • String ID: csm$f
                        • API String ID: 661698970-629598281
                        • Opcode ID: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                        • Instruction ID: 466f39f7d2c6ad8747c7229578763f3ef958adfb448de98c0d7c4ff533c0d341
                        • Opcode Fuzzy Hash: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                        • Instruction Fuzzy Hash: 70E06C71E08B5141DB507B23B14017D6664AF56F75F1480F6DB4807666CF3CD4B08702
                        APIs
                        • _PyObject_GC_New.PYTHON312(?,?,00000000,00007FFE00452513), ref: 00007FFE004525A6
                        • PyObject_GC_Track.PYTHON312(?,?,00000000,00007FFE00452513), ref: 00007FFE004525D8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667485466.00007FFE00451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE00450000, based on PE: true
                        • Associated: 00000001.00000002.2667467986.00007FFE00450000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00455000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE004FE000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00502000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE00507000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667502786.00007FFE0055F000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667671456.00007FFE00562000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000001.00000002.2667686800.00007FFE00564000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe00450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: Object_$Track
                        • String ID: 3.2.0
                        • API String ID: 16854473-1786766648
                        • Opcode ID: 05fdb2ae452a8d6f4b3be3f11c3efdbfda8cc49ab31c9f152460280c20d50ee3
                        • Instruction ID: ccbb104c83f3db08d03c83c5503cd6530072bed03bcd89f24aab938ec7c1446b
                        • Opcode Fuzzy Hash: 05fdb2ae452a8d6f4b3be3f11c3efdbfda8cc49ab31c9f152460280c20d50ee3
                        • Instruction Fuzzy Hash: EAE0E524E09F06A1EA158F21A86407823A8BF09B46B540136CE4C0233AEF7CE5A8C248
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00007FFE1A456CE9,?,?,?,?,00007FFE1A460582,?,?,?,?,?), ref: 00007FFE1A456E83
                        • SetLastError.KERNEL32(?,?,?,00007FFE1A456CE9,?,?,?,?,00007FFE1A460582,?,?,?,?,?), ref: 00007FFE1A456F0C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2667891014.00007FFE1A451000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE1A450000, based on PE: true
                        • Associated: 00000001.00000002.2667872888.00007FFE1A450000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667912458.00007FFE1A463000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667929860.00007FFE1A468000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000001.00000002.2667946511.00007FFE1A469000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_7ffe1a450000_ITC590-Script 3 V2-P-2024.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                        • Instruction ID: 33c700dcbbda43727ad60f5bfec39fe087911570393653a7a61029dbca3fc842
                        • Opcode Fuzzy Hash: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                        • Instruction Fuzzy Hash: 181136A1F0DE4282FA55AB67A84417462A1AF44FB4F084AF6E93E077F5DF2CB4618710