Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test.msi

Overview

General Information

Sample name:test.msi
Analysis ID:1394928
MD5:54c2f6b177e71ec4c262930566a282d1
SHA1:b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
SHA256:3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
Tags:85-195-115-20msi
Infos:

Detection

DarkGate, MailPassView
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DarkGate
Yara detected MailPassView
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Machine Learning detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
OS version to string mapping found (often used in BOTs)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries device information via Setup API
Queries information about the installed CPU (vendor, model number etc)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious MsiExec Embedding Parent
Tries to load missing DLLs
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • msiexec.exe (PID: 2844 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\test.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 236 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • msiexec.exe (PID: 3352 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9 MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
      • icacls.exe (PID: 3396 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGH MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
      • expand.exe (PID: 3424 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 659CED6D7BDA047BCC6048384231DB9F)
      • iTunesHelper.exe (PID: 3456 cmdline: "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe" MD5: ED6A1C72A75DEE15A6FA75873CD64975)
        • Autoit3.exe (PID: 3468 cmdline: "c:\temp\Autoit3.exe" c:\temp\script.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
      • cmd.exe (PID: 3828 cmdline: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files" MD5: AD7B9C14083B52BC532FBA5948342B98)
      • icacls.exe (PID: 3852 cmdline: "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)LOW MD5: 1542A92D5C6F7E1E80613F3466C9CE7F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkGateFirst documented in 2018, DarkGate is a commodity loader with features that include the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. DarkGate makes use of legitimate AutoIt files and typically runs multiple AutoIt scripts. New versions of DarkGate have been advertised on a Russian language eCrime forum since May 2023.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darkgate
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
      0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DarkGateYara detected DarkGateJoe Security
        Process Memory Space: Autoit3.exe PID: 3468JoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          Process Memory Space: Autoit3.exe PID: 3468JoeSecurity_DarkGateYara detected DarkGateJoe Security
            Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files", CommandLine: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 3352, ParentProcessName: msiexec.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files", ProcessId: 3828, ProcessName: cmd.exe
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\642bddc38bf301459161108c3729c2ed.tmpVirustotal: Detection: 19%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\CoreFoundation.dll (copy)Virustotal: Detection: 19%Perma Link
            Source: test.msiReversingLabs: Detection: 15%
            Source: C:\temp\Autoit3.exeJoe Sandbox ML: detected

            Compliance

            barindex
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeUnpacked PE file: 10.2.iTunesHelper.exe.2080000.0.unpack
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
            Source: Binary string: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\BuildResults\Production64\bin\iTunesHelper.pdb source: iTunesHelper.exe, 0000000A.00000000.411297227.000000013FBFE000.00000002.00000001.01000000.00000007.sdmp, iTunesHelper.exe, 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmp, test.msi, files.cab.5.dr
            Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: test.msi, MSI7956.tmp.2.dr
            Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_0208F2A0 FindFirstFileW,10_2_0208F2A0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE54DD0 FindFirstFileW,FindClose,10_2_6BE54DD0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE54650 FindFirstFileW,FindClose,lstrlenW,lstrlenW,10_2_6BE54650
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD4790 WideCharToMultiByte,WideCharToMultiByte,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindNextFileW,FindClose,10_2_000000013FBD4790
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF43C4 FindFirstFileExW,10_2_000000013FBF43C4
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00FE494A
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00FE4005
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00FEC2FF
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00FECD9F
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FECD14 FindFirstFileW,FindClose,11_2_00FECD14
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00FEF5D8
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00FEF735
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00FEFA36
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00FE3CE2
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C6A68C FindFirstFileW,FindNextFileW,FindClose,11_2_04C6A68C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C692A4 FindFirstFileW,lstrcmpW,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FindNextFileW,FindClose,11_2_04C692A4
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,11_2_00FF29BA
            Source: test.msi, files.cab.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
            Source: test.msi, files.cab.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
            Source: test.msi, files.cab.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
            Source: files.cab.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://ocsp.digicert.com0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://ocsp.digicert.com0A
            Source: test.msi, files.cab.5.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: test.msi, files.cab.5.drString found in binary or memory: http://ocsp.digicert.com0X
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: test.msi, files.cab.5.drString found in binary or memory: http://www.apple.com/
            Source: iTunesHelper.exe, 0000000A.00000002.510465990.000000000039F000.00000004.00000020.00020000.00000000.sdmp, iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000000.412214150.0000000001049000.00000002.00000001.01000000.00000009.sdmp, Autoit3.exe.10.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: test.msi, files.cab.5.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/u/0/#inbox
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: Autoit3.exe.10.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drString found in binary or memory: https://www.globalsign.com/repository/06
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_00FF4632
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_00FF4830
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_00FF4632
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C4B220 GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,11_2_04C4B220
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE0508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,11_2_00FE0508
            Source: C:\temp\Autoit3.exeCode function: 11_2_0100D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_0100D164
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62180 CreateDesktopA,SetThreadDesktop,CreateProcessA,11_2_04C62180
            Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\temp\Autoit3.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62CC4 NtDuplicateObject,NtClose,NtClose,NtClose,NtClose,NtClose,NtClose,NtClose,11_2_04C62CC4
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62C1C NtQueryObject,11_2_04C62C1C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62F68 Sleep,NtClose,NtClose,11_2_04C62F68
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62BE8 NtDuplicateObject,NtClose,11_2_04C62BE8
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C39934 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,11_2_04C39934
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD51D0: CreateFileW,DeviceIoControl,CloseHandle,10_2_000000013FBD51D0
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FD8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_00FD8F2E
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_00FE5778
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\78bc1f.msiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\78bc20.ipiJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_0208ED6010_2_0208ED60
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_02092AA010_2_02092AA0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE5489010_2_6BE54890
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE6F35010_2_6BE6F350
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD172010_2_000000013FBD1720
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF2F4C10_2_000000013FBF2F4C
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD367010_2_000000013FBD3670
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE9EC810_2_000000013FBE9EC8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE46C010_2_000000013FBE46C0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE6EAC10_2_000000013FBE6EAC
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE2E0C10_2_000000013FBE2E0C
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD2E0010_2_000000013FBD2E00
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE25EC10_2_000000013FBE25EC
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF0E3410_2_000000013FBF0E34
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF351C10_2_000000013FBF351C
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD551010_2_000000013FBD5510
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE8CE410_2_000000013FBE8CE4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF2CD010_2_000000013FBF2CD0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE2C0810_2_000000013FBE2C08
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF73F810_2_000000013FBF73F8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE23E810_2_000000013FBE23E8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBEA3D410_2_000000013FBEA3D4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD53D010_2_000000013FBD53D0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF43C410_2_000000013FBF43C4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBFC30810_2_000000013FBFC308
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBEC30010_2_000000013FBEC300
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF12C810_2_000000013FBF12C8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE42BC10_2_000000013FBE42BC
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD92B010_2_000000013FBD92B0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE29FC10_2_000000013FBE29FC
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD51D010_2_000000013FBD51D0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF194810_2_000000013FBF1948
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBEC94010_2_000000013FBEC940
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE392810_2_000000013FBE3928
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD40A010_2_000000013FBD40A0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBEF06810_2_000000013FBEF068
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBE27F810_2_000000013FBE27F8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD583010_2_000000013FBD5830
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA33B711_2_00FA33B7
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F894E011_2_00F894E0
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F8166311_2_00F81663
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F89C8011_2_00F89C80
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA23F511_2_00FA23F5
            Source: C:\temp\Autoit3.exeCode function: 11_2_0100840011_2_01008400
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB650211_2_00FB6502
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F8E6F011_2_00F8E6F0
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB265E11_2_00FB265E
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA282A11_2_00FA282A
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB89BF11_2_00FB89BF
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB6A7411_2_00FB6A74
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F90BE011_2_00F90BE0
            Source: C:\temp\Autoit3.exeCode function: 11_2_01000A3A11_2_01000A3A
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FDEDB211_2_00FDEDB2
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FACD5111_2_00FACD51
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE8E4411_2_00FE8E44
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB6FE611_2_00FB6FE6
            Source: C:\temp\Autoit3.exeCode function: 11_2_01000EB711_2_01000EB7
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F8B02011_2_00F8B020
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F9D45D11_2_00F9D45D
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FAF40911_2_00FAF409
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA16B411_2_00FA16B4
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F8F6A011_2_00F8F6A0
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F9F62811_2_00F9F628
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA78C311_2_00FA78C3
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA1BA811_2_00FA1BA8
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FADBA511_2_00FADBA5
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FB9CE511_2_00FB9CE5
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F9DD2811_2_00F9DD28
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FABFD611_2_00FABFD6
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA1FC011_2_00FA1FC0
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C4EC9811_2_04C4EC98
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C38E2C11_2_04C38E2C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3561011_2_04C35610
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C5B25011_2_04C5B250
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C59C6811_2_04C59C68
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\4cd6e0f52e7043469984c6056cd7318a.tmp 0D8878CCA08903777888B3681F90E4A07C7AEF7D9600A67DFA985844D4BF5EDA
            Source: C:\temp\Autoit3.exeCode function: String function: 04C444F8 appears 31 times
            Source: C:\temp\Autoit3.exeCode function: String function: 00FA8B30 appears 42 times
            Source: C:\temp\Autoit3.exeCode function: String function: 04C16A4C appears 111 times
            Source: C:\temp\Autoit3.exeCode function: String function: 00FA0D17 appears 70 times
            Source: C:\temp\Autoit3.exeCode function: String function: 00F91A36 appears 34 times
            Source: C:\temp\Autoit3.exeCode function: String function: 04C14724 appears 52 times
            Source: C:\temp\Autoit3.exeCode function: String function: 04C14450 appears 104 times
            Source: C:\temp\Autoit3.exeCode function: String function: 04C149C0 appears 86 times
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: String function: 000000013FBD5F60 appears 32 times
            Source: 642bddc38bf301459161108c3729c2ed.tmp.8.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: test.msiBinary or memory string: OriginalFilenameiTunesHelper.exe. vs test.msi
            Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: devrtl.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeSection loaded: dpx.dllJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeSection loaded: wdscore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeSection loaded: corefoundation.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: version.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\temp\Autoit3.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeSection loaded: wow64cpu.dllJump to behavior
            Source: metadata-2.2.drBinary string: highlight.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\66program files\windows sidebar\gadgets\rssfeeds.gadgeticon.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: wmplayer.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images**undocked_black_moon-new_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
            Source: metadata-2.2.drBinary string: buttonup_off.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: system.web.dynamicdata.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images33docked_black_moon-waxing-gibbous_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: system.addin.contract.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: btn-previous-static.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: keypad.xml22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\99program files\dvd maker\shared\dvdstyles\specialoccasion,,specialnavigationup_selectionsubpicture.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: scenes_intro_bg_pal.wmv22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: acxtrnal.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
            Source: metadata-2.2.drBinary string: sbdrop.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: classification engineClassification label: mal96.troj.spyw.evad.winMSI@16/23@0/0
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEA6AD GetLastError,FormatMessageW,11_2_00FEA6AD
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FD8DE9 AdjustTokenPrivileges,CloseHandle,11_2_00FD8DE9
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FD9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_00FD9399
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEB976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,11_2_00FEB976
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,11_2_00FE4148
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD1E80 CoCreateInstance,SysAllocString,SysFreeString,10_2_000000013FBD1E80
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,11_2_00FE443D
            Source: C:\temp\Autoit3.exeFile created: C:\Users\user\AppData\Roaming\cBDKKEcJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF9711021A423063A.TMPJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ......................$......... 4......(.P.....L.......T.......................................0...............................p. ....... .....Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ......................$......... 4......(.P.....L.......T...............%.......................0.......................v.................$.....Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................P.......................(.P..............................$......................................................N..s............Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................P...............:. .....(.P..............................$......................................x...............................Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 4#.....(.P..............................$..............................................X.......................Jump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeConsole Write: ................................ 4#.....(.P..............................$..............................................v.......................Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\temp\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\msiwrapper.iniJump to behavior
            Source: C:\Windows\SysWOW64\icacls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: test.msiReversingLabs: Detection: 15%
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\test.msi"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe"
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.a3x
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)LOW
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.a3xJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\msiwrapper.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: test.msiStatic file information: File size 4038656 > 1048576
            Source: Binary string: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\BuildResults\Production64\bin\iTunesHelper.pdb source: iTunesHelper.exe, 0000000A.00000000.411297227.000000013FBFE000.00000002.00000001.01000000.00000007.sdmp, iTunesHelper.exe, 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmp, test.msi, files.cab.5.dr
            Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: test.msi, MSI7956.tmp.2.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeUnpacked PE file: 10.2.iTunesHelper.exe.2080000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD9780 GetModuleFileNameW,PathRemoveFileSpecW,PathAppendW,LoadLibraryW,GetProcAddress,GetProcAddress,GetLastError,MultiByteToWideChar,FreeLibrary,10_2_000000013FBD9780
            Source: 642bddc38bf301459161108c3729c2ed.tmp.8.drStatic PE information: section name: .didata
            Source: 4cd6e0f52e7043469984c6056cd7318a.tmp.8.drStatic PE information: section name: _RDATA
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FC150E0 push rbx; retf 10_2_000000013FC150E1
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA8B75 push ecx; ret 11_2_00FA8B88
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381E7B9 push 0381E7E7h; ret 11_2_0381E7DF
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381E7C1 push 0381E7E7h; ret 11_2_0381E7DF
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381DFDD push 0381E009h; ret 11_2_0381E001
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381DF19 push 0381DF51h; ret 11_2_0381DF49
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381DF5D push 0381DF89h; ret 11_2_0381DF81
            Source: C:\temp\Autoit3.exeCode function: 11_2_0381DD75 push 0381DDAFh; ret 11_2_0381DDA7
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3C4D8 push 04C3C504h; ret 11_2_04C3C4FC
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3E4B8 push 04C3E504h; ret 11_2_04C3E4FC
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C20418 push 04C20444h; ret 11_2_04C2043C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C165D0 push 04C16621h; ret 11_2_04C16619
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C64588 push 04C645BBh; ret 11_2_04C645B3
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C68538 push 04C68564h; ret 11_2_04C6855C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C68690 push 04C686BCh; ret 11_2_04C686B4
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C64604 push 04C64630h; ret 11_2_04C64628
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C68620 push 04C6864Ch; ret 11_2_04C68644
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C38634 push 04C3869Ch; ret 11_2_04C38694
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C627D8 push 04C62804h; ret 11_2_04C627FC
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C267A8 push 04C26850h; ret 11_2_04C26848
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3C710 push 04C3C73Ch; ret 11_2_04C3C734
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C6C71C push 04C6C742h; ret 11_2_04C6C73A
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C26730 push 04C267A6h; ret 11_2_04C2679E
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C2E034 push 04C2E0A3h; ret 11_2_04C2E09B
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C2C034 push ecx; mov dword ptr [esp], 0000001Ch11_2_04C2C035
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C4215C push 04C42194h; ret 11_2_04C4218C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C68158 push 04C681AFh; ret 11_2_04C681A7
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C62114 push 04C6217Ch; ret 11_2_04C62174
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C683BC push 04C683FEh; ret 11_2_04C683F6
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C2A308 push ecx; mov dword ptr [esp], edx11_2_04C2A30A
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3CCC0 push 04C3CD02h; ret 11_2_04C3CCFA
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeFile created: C:\temp\Autoit3.exeJump to dropped file
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\CoreFoundation.dll (copy)Jump to dropped file
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\642bddc38bf301459161108c3729c2ed.tmpJump to dropped file
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\4cd6e0f52e7043469984c6056cd7318a.tmpJump to dropped file
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe (copy)Jump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7956.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7956.tmpJump to dropped file
            Source: metadata-2.2.drBinary or memory string: bcdedit.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: metadata-2.2.drBinary or memory string: bcdedit.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setupact.logJump to behavior
            Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Windows\Logs\DPX\setuperr.logJump to behavior
            Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior
            Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
            Source: C:\temp\Autoit3.exeCode function: 11_2_010059B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_010059B3
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F95EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_00F95EDA
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FA33B7 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_00FA33B7
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\temp\Autoit3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Autoit3.exe, Autoit3.exe, 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SUPERANTISPYWARE.EXE
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD5510 SetupDiGetClassDevsW,SetupDiEnumDeviceInterfaces,SetupDiGetDeviceInterfaceDetailW,SetupDiGetDeviceInterfaceDetailW,SetupDiGetDeviceRegistryPropertyW,SetupDiDestroyDeviceInfoList,10_2_000000013FBD5510
            Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\642bddc38bf301459161108c3729c2ed.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7956.tmpJump to dropped file
            Source: C:\temp\Autoit3.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_11-140071
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_10-30833
            Source: C:\temp\Autoit3.exeAPI coverage: 4.1 %
            Source: C:\Windows\System32\msiexec.exe TID: 2308Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\System32\msiexec.exe TID: 3896Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\System32\msiexec.exe TID: 1660Thread sleep time: -420000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 3372Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 3884Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_0208F2A0 FindFirstFileW,10_2_0208F2A0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE54DD0 FindFirstFileW,FindClose,10_2_6BE54DD0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_6BE54650 FindFirstFileW,FindClose,lstrlenW,lstrlenW,10_2_6BE54650
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD4790 WideCharToMultiByte,WideCharToMultiByte,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindNextFileW,FindClose,10_2_000000013FBD4790
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF43C4 FindFirstFileExW,10_2_000000013FBF43C4
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00FE494A
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00FE4005
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00FEC2FF
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00FECD9F
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FECD14 FindFirstFileW,FindClose,11_2_00FECD14
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00FEF5D8
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00FEF735
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FEFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00FEFA36
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00FE3CE2
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C6A68C FindFirstFileW,FindNextFileW,FindClose,11_2_04C6A68C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C692A4 FindFirstFileW,lstrcmpW,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FindNextFileW,FindClose,11_2_04C692A4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_02091BB0 GetSystemInfo,10_2_02091BB0
            Source: Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
            Source: Autoit3.exe, Autoit3.exe, 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft hyper-v video
            Source: metadata-2.2.drBinary or memory string: lsm.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests,,microsoft-hyper-v-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: metadata-2.2.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\##windows\system32\spp\tokens\ppdlic
            Source: metadata-2.2.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\syswow64\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\,,program files (x86)\internet explorer\en-us
            Source: metadata-2.2.drBinary or memory string: imscmig.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests44microsoft-hyper-v-drivers-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: C:\temp\Autoit3.exeAPI call chain: ExitProcess graph end nodegraph_11-138047
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF45D5 BlockInput,11_2_00FF45D5
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBDACA4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_000000013FBDACA4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD9A08 GetLastError,IsDebuggerPresent,OutputDebugStringW,10_2_000000013FBD9A08
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD9780 GetModuleFileNameW,PathRemoveFileSpecW,PathAppendW,LoadLibraryW,GetProcAddress,GetProcAddress,GetLastError,MultiByteToWideChar,FreeLibrary,10_2_000000013FBD9780
            Source: C:\temp\Autoit3.exeCode function: 11_2_0382618A mov eax, dword ptr fs:[00000030h]11_2_0382618A
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C38E2C mov eax, dword ptr fs:[00000030h]11_2_04C38E2C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C38E2C mov eax, dword ptr fs:[00000030h]11_2_04C38E2C
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C43184 mov eax, dword ptr fs:[00000030h]11_2_04C43184
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF5E3C GetProcessHeap,10_2_000000013FBF5E3C
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBDAE8C SetUnhandledExceptionFilter,10_2_000000013FBDAE8C
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBDACA4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_000000013FBDACA4
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBDA2F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_000000013FBDA2F0
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBED8B8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_000000013FBED8B8
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FAA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00FAA385
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FAA354 SetUnhandledExceptionFilter,11_2_00FAA354

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3C510 CreateProcessA,CreateProcessA,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,11_2_04C3C510
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C3C510 CreateProcessA,CreateProcessA,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,11_2_04C3C510
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FD9369 LogonUserW,11_2_00FD9369
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F95240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_00F95240
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE1AC6 SendInput,keybd_event,11_2_00FE1AC6
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE51E2 mouse_event,11_2_00FE51E2
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGHJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* filesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)LOWJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.a3xJump to behavior
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FD88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_00FD88CD
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FE4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,11_2_00FE4F1C
            Source: iTunesHelper.exe, 0000000A.00000002.510862324.000007FFFF725000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000000.412195529.0000000001036000.00000002.00000001.01000000.00000009.sdmp, Autoit3.exe.10.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Autoit3.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBFBE00 cpuid 10_2_000000013FBFBE00
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,10_2_6BE54F80
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_6BE54060
            Source: C:\temp\Autoit3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_04C15C08
            Source: C:\temp\Autoit3.exeCode function: GetLocaleInfoA,11_2_04C1655C
            Source: C:\temp\Autoit3.exeCode function: GetLocaleInfoA,11_2_04C1CC4C
            Source: C:\temp\Autoit3.exeCode function: GetLocaleInfoA,11_2_04C1B630
            Source: C:\temp\Autoit3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_04C15D12
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD5510 SetupDiGetClassDevsW,SetupDiEnumDeviceInterfaces,SetupDiGetDeviceInterfaceDetailW,SetupDiGetDeviceInterfaceDetailW,SetupDiGetDeviceRegistryPropertyW,SetupDiDestroyDeviceInfoList,10_2_000000013FBD5510
            Source: C:\temp\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\temp\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\temp\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\temp\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBDAEF8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,10_2_000000013FBDAEF8
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBD1310 GetUserNameA,CreateEventA,GetLastError,CloseHandle,CoInitialize,GetModuleHandleA,GetCommandLineA,CoUninitialize,CloseHandle,10_2_000000013FBD1310
            Source: C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exeCode function: 10_2_000000013FBF2F4C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,10_2_000000013FBF2F4C
            Source: C:\temp\Autoit3.exeCode function: 11_2_00F95D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00F95D13
            Source: Autoit3.exe, Autoit3.exe, 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: Autoit3.exe, Autoit3.exe, 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: superantispyware.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 3468, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 3468, type: MEMORYSTR
            Source: Autoit3.exeBinary or memory string: WIN_81
            Source: Autoit3.exeBinary or memory string: WIN_XP
            Source: Autoit3.exeBinary or memory string: WIN_XPe
            Source: Autoit3.exeBinary or memory string: WIN_VISTA
            Source: Autoit3.exeBinary or memory string: WIN_7
            Source: Autoit3.exeBinary or memory string: WIN_8
            Source: Autoit3.exe.10.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 3468, type: MEMORYSTR
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,11_2_00FF696E
            Source: C:\temp\Autoit3.exeCode function: 11_2_00FF6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_00FF6E32
            Source: C:\temp\Autoit3.exeCode function: 11_2_04C2BE98 bind,11_2_04C2BE98
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomains1
            Replication Through Removable Media
            1
            Command and Scripting Interpreter
            1
            Create Account
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory11
            Peripheral Device Discovery
            Remote Desktop Protocol1
            Screen Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager1
            Account Discovery
            SMB/Windows Admin Shares21
            Input Capture
            SteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron2
            Windows Service
            21
            Access Token Manipulation
            1
            Software Packing
            NTDS3
            File and Directory Discovery
            Distributed Component Object Model3
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchd1
            Bootkit
            2
            Windows Service
            1
            DLL Side-Loading
            LSA Secrets66
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
            Services File Permissions Weakness
            212
            Process Injection
            1
            File Deletion
            Cached Domain Credentials1
            Query Registry
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
            Services File Permissions Weakness
            21
            Masquerading
            DCSync241
            Security Software Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
            Valid Accounts
            Proc Filesystem1
            Virtualization/Sandbox Evasion
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Virtualization/Sandbox Evasion
            /etc/passwd and /etc/shadow3
            Process Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
            Access Token Manipulation
            Network Sniffing1
            Application Window Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd212
            Process Injection
            Input Capture1
            System Owner/User Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
            Bootkit
            KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
            Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
            Services File Permissions Weakness
            GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1394928 Sample: test.msi Startdate: 20/02/2024 Architecture: WINDOWS Score: 96 42 Multi AV Scanner detection for dropped file 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected DarkGate 2->46 48 2 other signatures 2->48 8 msiexec.exe 12 20 2->8         started        11 msiexec.exe 5 2->11         started        process3 file4 28 C:\Windows\Installer\MSI7956.tmp, PE32 8->28 dropped 13 msiexec.exe 5 8->13         started        process5 process6 15 iTunesHelper.exe 4 13->15         started        19 expand.exe 6 13->19         started        21 cmd.exe 13->21         started        23 2 other processes 13->23 file7 30 C:\temp\Autoit3.exe, PE32 15->30 dropped 40 Detected unpacking (creates a PE file in dynamic memory) 15->40 25 Autoit3.exe 3 15->25         started        32 C:\Users\user\...\iTunesHelper.exe (copy), PE32+ 19->32 dropped 34 C:\Users\user\...\CoreFoundation.dll (copy), PE32+ 19->34 dropped 36 C:\...\642bddc38bf301459161108c3729c2ed.tmp, PE32+ 19->36 dropped 38 C:\...\4cd6e0f52e7043469984c6056cd7318a.tmp, PE32+ 19->38 dropped signatures8 process9 signatures10 50 Machine Learning detection for dropped file 25->50 52 Contains functionality to inject threads in other processes 25->52 54 Contains functionality to inject code into remote processes 25->54

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            test.msi16%ReversingLabsWin64.Trojan.Generic
            SourceDetectionScannerLabelLink
            C:\temp\Autoit3.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\4cd6e0f52e7043469984c6056cd7318a.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\4cd6e0f52e7043469984c6056cd7318a.tmp0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\642bddc38bf301459161108c3729c2ed.tmp20%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\CoreFoundation.dll (copy)20%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe (copy)0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe (copy)0%VirustotalBrowse
            C:\Windows\Installer\MSI7956.tmp0%ReversingLabs
            C:\Windows\Installer\MSI7956.tmp1%VirustotalBrowse
            C:\temp\Autoit3.exe3%ReversingLabs
            C:\temp\Autoit3.exe4%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/JiTunesHelper.exe, 0000000A.00000002.510465990.000000000039F000.00000004.00000020.00020000.00000000.sdmp, iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000B.00000000.412214150.0000000001049000.00000002.00000001.01000000.00000009.sdmp, Autoit3.exe.10.drfalse
              high
              https://mail.google.com/mail/u/0/#inboxAutoit3.exe, 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.autoitscript.com/autoit3/iTunesHelper.exe, 0000000A.00000003.411992213.000007FFFE663000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.10.drfalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1394928
                  Start date and time:2024-02-20 03:24:11 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 20s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:19
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:test.msi
                  Detection:MAL
                  Classification:mal96.troj.spyw.evad.winMSI@16/23@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 92%
                  • Number of executed functions: 85
                  • Number of non-executed functions: 120
                  Cookbook Comments:
                  • Found application associated with file extension: .msi
                  • Close Viewer
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, VSSVC.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 104.208.16.93
                  • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtFsControlFile calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  TimeTypeDescription
                  03:25:06API Interceptor7047x Sleep call for process: msiexec.exe modified
                  03:25:30API Interceptor2x Sleep call for process: icacls.exe modified
                  No context
                  No context
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\$dpx$.tmp\4cd6e0f52e7043469984c6056cd7318a.tmpbuild-x64.msiGet hashmaliciousDarkGate, MailPassViewBrowse
                    build-x64.msiGet hashmaliciousDarkGate, MailPassViewBrowse
                      build-x64.msiGet hashmaliciousDarkGate, MailPassViewBrowse
                        build-x64.msiGet hashmaliciousDarkGate, MailPassViewBrowse
                          pullofmaster.msiGet hashmaliciousMailPassViewBrowse
                            reincarnation.msiGet hashmaliciousMailPassViewBrowse
                              reincarnation.msiGet hashmaliciousMailPassViewBrowse
                                http://5.181.159.23/Downloads/reincarnation.zipGet hashmaliciousMailPassViewBrowse
                                  prtyhguafelif.msiGet hashmaliciousMailPassViewBrowse
                                    prtyhguafelif.msiGet hashmaliciousMailPassViewBrowse
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3168
                                      Entropy (8bit):3.6846407675176867
                                      Encrypted:false
                                      SSDEEP:48:oGG0jT9N38RN3xp/7wP8c1SFjwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6Rey8H:pGQD4PUiF8fHzbOHXOHB9BpiV
                                      MD5:5CFA075FF4295278B4D69E15551B640F
                                      SHA1:71CFDF0BC80780F4DF273C3AFB1205D3D1A84255
                                      SHA-256:E12D5050DEF9E3C4F0788EDC3AE2A9E6944B41F62411E39EFAC570D50B20313B
                                      SHA-512:E75C6E9786E69EB94C9B537D89269D2A21866B9984A0AC48E633839E719D02B3278DB6EA3691442FE3D5828F1EC6DE09C4FA72E35E3BF8FA5FF590216FAD3FBD
                                      Malicious:false
                                      Reputation:low
                                      Preview:.D.....M..,....c.a..............8........yQ}bG0E..5.O...9..........$.c..........M..0.<fK...; ...............................$.......8...P.......P...I.n.s.t.a.l.l.e.d. .i.T.u.n.e.s. .-. .U.N.R.E.G.I.S.T.E.R.E.D. .-. .W.r.a.p.p.e.d. .u.s.i.n.g. .M.S.I. .W.r.a.p.p.e.r. .f.r.o.m. .w.w.w...e.x.e.m.s.i...c.o.m...............C.:.\.W.i.n.d.o.w.s.\...............6.1.0.9.3.0.................W.O.R.K.G.R.O.U.P.......DB.U...J.m...l....................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|...........%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:SysEx File - Twister
                                      Category:dropped
                                      Size (bytes):9068216
                                      Entropy (8bit):3.679389294170859
                                      Encrypted:false
                                      SSDEEP:12288:OF4TY0YEzT4G09wqLB9K43gd8caDtDIY8/mhjTLQSI5JnJYKnAOYlTL9VZYbEIIw:k6jq9g8caP7y0ljdAGmm/rmHp
                                      MD5:3CAD0E7A19023FE26028C7C7A7778471
                                      SHA1:626EA2D838E52DEA102D3E01607A7370D580A515
                                      SHA-256:78237D535C6E13FA99B5F2D2D722FDFD982E661A1649E46D696E49BC81F816CE
                                      SHA-512:43A0E8A48B2C6052D82A90CB709E3002937A8FEDA82D342B08999943A4DB641CEEB9FC19DC4CA0FAAB7E356578796F0AF4BF048554C6CB84E74F60270E356D2D
                                      Malicious:false
                                      Reputation:low
                                      Preview:.%..=..J.....>.(.l.h............^...................... ...Y.......Y...<.B.A.C.K.U.P._.C.O.M.P.O.N.E.N.T.S. .x.m.l.n.s.=.".x.-.s.c.h.e.m.a.:.#.V.s.s.C.o.m.p.o.n.e.n.t.M.e.t.a.d.a.t.a.". .v.e.r.s.i.o.n.=.".1...2.". .b.o.o.t.a.b.l.e.S.y.s.t.e.m.S.t.a.t.e.B.a.c.k.u.p.=.".y.e.s.". .s.e.l.e.c.t.C.o.m.p.o.n.e.n.t.s.=.".y.e.s.". .b.a.c.k.u.p.T.y.p.e.=.".f.u.l.l.". .p.a.r.t.i.a.l.F.i.l.e.S.u.p.p.o.r.t.=.".y.e.s.". .s.n.a.p.s.h.o.t.S.e.t.I.d.=.".7.d.5.1.7.9.c.7.-.4.7.6.2.-.4.5.3.0.-.a.c.c.6.-.3.5.e.4.4.f.9.1.e.3.1.3.".>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.n.s.t.a.n.c.e.I.d.=.".5.9.8.9.2.0.4.9.-.a.3.c.8.-.4.0.3.4.-.9.3.6.9.-.8.a.0.8.c.9.4.0.6.e.4.7.". .w.r.i.t.e.r.I.d.=.".e.8.1.3.2.9.7.5.-.6.f.9.3.-.4.4.6.4.-.a.5.3.e.-.1.0.5.0.2.5.3.a.e.2.2.0.". .b.a.c.k.u.p.S.c.h.e.m.a.=.".0.".>.<.C.O.M.P.O.N.E.N.T. .c.o.m.p.o.n.e.n.t.N.a.m.e.=.".S.y.s.t.e.m. .F.i.l.e.s.". .c.o.m.p.o.n.e.n.t.T.y.p.e.=.".f.i.l.e.g.r.o.u.p."./.>.<./.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S.>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3168
                                      Entropy (8bit):3.6846407675176867
                                      Encrypted:false
                                      SSDEEP:48:oGG0jT9N38RN3xp/7wP8c1SFjwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6Rey8H:pGQD4PUiF8fHzbOHXOHB9BpiV
                                      MD5:5CFA075FF4295278B4D69E15551B640F
                                      SHA1:71CFDF0BC80780F4DF273C3AFB1205D3D1A84255
                                      SHA-256:E12D5050DEF9E3C4F0788EDC3AE2A9E6944B41F62411E39EFAC570D50B20313B
                                      SHA-512:E75C6E9786E69EB94C9B537D89269D2A21866B9984A0AC48E633839E719D02B3278DB6EA3691442FE3D5828F1EC6DE09C4FA72E35E3BF8FA5FF590216FAD3FBD
                                      Malicious:false
                                      Reputation:low
                                      Preview:.D.....M..,....c.a..............8........yQ}bG0E..5.O...9..........$.c..........M..0.<fK...; ...............................$.......8...P.......P...I.n.s.t.a.l.l.e.d. .i.T.u.n.e.s. .-. .U.N.R.E.G.I.S.T.E.R.E.D. .-. .W.r.a.p.p.e.d. .u.s.i.n.g. .M.S.I. .W.r.a.p.p.e.r. .f.r.o.m. .w.w.w...e.x.e.m.s.i...c.o.m...............C.:.\.W.i.n.d.o.w.s.\...............6.1.0.9.3.0.................W.O.R.K.G.R.O.U.P.......DB.U...J.m...l....................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|...........%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.
                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                      File Type:Microsoft Cabinet archive data, many, 3787661 bytes, 3 files, at 0x2c +A "CoreFoundation.dll" +A "iTunesHelper.exe", ID 3031, number 1, 116 datablocks, 0 compression
                                      Category:dropped
                                      Size (bytes):3787661
                                      Entropy (8bit):7.088009022003999
                                      Encrypted:false
                                      SSDEEP:49152:bhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLilx:DqM9LDEKXVuAPMuWx
                                      MD5:C6DB776A99F2CF475C5E8F21AFC03E24
                                      SHA1:3AC870CACD414130E84CF91816762A6E19BE81E4
                                      SHA-256:A5CC24AD961584E5508235A15284ABD912B3FDE4A2A145D4DC11281C1F9C9EAB
                                      SHA-512:91A3D9AE6340E26EC177ADD69A2C9DF3D06F683EB7E71E4F0F183B691C12F4376FCD80D30CC6763F002B3F85C992BEA6492511A8E81D3C5EF6AF6CE391A8E919
                                      Malicious:false
                                      Reputation:low
                                      Preview:MSCF......9.....,.......................t....<........SX.i .CoreFoundation.dll.`....<....SX.i .iTunesHelper.exe.....`.....SX.i .sqlite3.dll..c......MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d...Y..e.........." ................PI........@..............................P............`.......................... ...................,........... ...........1...................................................................................................text...d........................... ..`.data...............................@....bss.....................................idata..............................@....didata.............................@....edata...,..........................@..@.rdata..E...........................@..@.reloc..............................@..B.pdata...1..
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):366944
                                      Entropy (8bit):6.80696281718998
                                      Encrypted:false
                                      SSDEEP:6144:TjZtNtzxEFQVLEhZbblN4W6ZDNFfEai23+FM2+zIv+98vS:ZRxMQLEhZXybF8Ut4o8a
                                      MD5:ED6A1C72A75DEE15A6FA75873CD64975
                                      SHA1:67A15CA72E3156F8BE6C46391E184087E47F4A0D
                                      SHA-256:0D8878CCA08903777888B3681F90E4A07C7AEF7D9600A67DFA985844D4BF5EDA
                                      SHA-512:256C2EBFEB42C2D3340D8BB423EF0AE48D5FB9FE5CA09C363595F51A03007482B67A777E4CAE7A8194F69BC3A3FBCDB9ABB5C9F92097925272431BB9D50F5C03
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: build-x64.msi, Detection: malicious, Browse
                                      • Filename: build-x64.msi, Detection: malicious, Browse
                                      • Filename: build-x64.msi, Detection: malicious, Browse
                                      • Filename: build-x64.msi, Detection: malicious, Browse
                                      • Filename: pullofmaster.msi, Detection: malicious, Browse
                                      • Filename: reincarnation.msi, Detection: malicious, Browse
                                      • Filename: reincarnation.msi, Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: prtyhguafelif.msi, Detection: malicious, Browse
                                      • Filename: prtyhguafelif.msi, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S7...V...V...V..\....V..X*...V..X*...V..\....V..\....V..\....V...?...V...V...V..X*..)V...*...V...*@..V...*...V..Rich.V..................PE..d...c.^d.........."...."............T..........@....................................o.....`..........................................................`...5... ...%...J..`O......x.......T.......................(.......@............................................text............................... ..`.rdata..............................@..@.data...$(..........................@....pdata...%... ...&..................@..@_RDATA..\....P......................@..@.rsrc....5...`...6..................@..@.reloc..x............B..............@..B................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):1719296
                                      Entropy (8bit):6.055171532365611
                                      Encrypted:false
                                      SSDEEP:24576:AQ/h+rgAzii/l7Zn3bUgxgH37CcALvMSdFLmEx239t:Ph4ZzJtMSdFLmEx23
                                      MD5:55AC845A22243538FCA3A1852858749F
                                      SHA1:A1973049289A3492355EC42FDA3C653A7A1F289C
                                      SHA-256:DD3B108D0BDB49D5AD268C65D01A39A4A832F4C49B07CFEC4FF74AD4E869A112
                                      SHA-512:E5DA92A1321C6A3D262A3B0E8F308E5DCA4CE8F5F8389F09882197C5245001269F612D2121A541E7B6C6BC3E819E5EB3F06C54C541CC1E44EAE57337A2DEA965
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Virustotal, Detection: 20%, Browse
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d...Y..e.........." ................PI........@..............................P............`.......................... ...................,........... ...........1...................................................................................................text...d........................... ..`.data...............................@....bss.....................................idata..............................@....didata.............................@....edata...,..........................@..@.rdata..E...........................@..@.reloc..............................@..B.pdata...1.......2..................@..@.rsrc........ ......................@..@.............P.......<..............@..@........................................
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1700353
                                      Entropy (8bit):7.442687329839771
                                      Encrypted:false
                                      SSDEEP:24576:ilz6vgGSKeJy5QuxYPFPRM/ATuM+Efe5DS4MX+SAo2iR/Z+MTXJTimJjz:ilzu/6FPRM/ATu1ge5Dlk+C9FvN
                                      MD5:B9134A3839483552F1804BF284318622
                                      SHA1:8F1DAAA235A1A113657638184C5DE9284F04AEBA
                                      SHA-256:E04B368D08D638A53290FD6DD19D301C4992113733759BD59799BFE0D7300AD9
                                      SHA-512:C83459D68239DAE17899B4601356E46665038A0A75C69E9F1BDBD38231D90BA88C67ABD8E4FA207C2564FFBC7D548E3B802E1B37D38B7C94908074A6FA1F30EE
                                      Malicious:false
                                      Preview:(....Deke...M-..DW.@e...AWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVEek.HAYI.l.D.@..e..10($v4...* :v)...x#2v6..E-/336E<.6wc[NA\eXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDek5.AW2.nk...2VDekeXAW.DGknZIWV.gke.AWVDek..CWVTekeX.WVDekeHAWVTekcXAWVDekcXAWVDeke.EWV@ekeXAWTD..eXQWVDeke.AWVDekeXQWVDekexAWVDekeXAWFDekehEW#DekeHEWTHeke.EWVPeke.EWnaekeXAWVDeke8EWfeekeXAWVDekeXAWVDekeXAWVDeke.EW~DekeXAWVDekeXAWVDek]KEW.FekexEW6FekeXAWVDekeXAWVDekK,$/"Deke.CWVTeke.CWVTekeXAWVDekeXAWvDe.K< #7Deke8AWVDfke8AWVDfkeXAWVDekeXAW.De.K:2$VDeke.AWV$fke.AWV$fkeXAWVDekeXAWVDe.K1%6"%ekeHAWVTakeHAWVTakeXAWVDekeXAW.De.K<(370.keHAWVdakeHAWVdakeXAWVDekeXAW.De.K=%6"%ekeHAWVtakeHAWVtakeXAWVDekeXAW.De+K,-$VDekeHAWV.akeHAWV.akeXAWVDekeXAWVDe.K*%6"%ekeHAWV.akeHAWV.akeXAWVDekeXAW.De+K*$;9'ekehAWV$akehAWV$akeXAWVDekeXAW.De)K(%6"%ekehAWV.akehAWV.akeXAWVDekeXAW.De+K*2%5DekexAWV.akexAWV.akeXAWVDekeXAW.De+eXAWVDekeXAWV.akeXAWV.fkeXAWVDekeXAW.De+
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):1719296
                                      Entropy (8bit):6.055171532365611
                                      Encrypted:false
                                      SSDEEP:24576:AQ/h+rgAzii/l7Zn3bUgxgH37CcALvMSdFLmEx239t:Ph4ZzJtMSdFLmEx23
                                      MD5:55AC845A22243538FCA3A1852858749F
                                      SHA1:A1973049289A3492355EC42FDA3C653A7A1F289C
                                      SHA-256:DD3B108D0BDB49D5AD268C65D01A39A4A832F4C49B07CFEC4FF74AD4E869A112
                                      SHA-512:E5DA92A1321C6A3D262A3B0E8F308E5DCA4CE8F5F8389F09882197C5245001269F612D2121A541E7B6C6BC3E819E5EB3F06C54C541CC1E44EAE57337A2DEA965
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Virustotal, Detection: 20%, Browse
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d...Y..e.........." ................PI........@..............................P............`.......................... ...................,........... ...........1...................................................................................................text...d........................... ..`.data...............................@....bss.....................................idata..............................@....didata.............................@....edata...,..........................@..@.rdata..E...........................@..@.reloc..............................@..B.pdata...1.......2..................@..@.rsrc........ ......................@..@.............P.......<..............@..@........................................
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):366944
                                      Entropy (8bit):6.80696281718998
                                      Encrypted:false
                                      SSDEEP:6144:TjZtNtzxEFQVLEhZbblN4W6ZDNFfEai23+FM2+zIv+98vS:ZRxMQLEhZXybF8Ut4o8a
                                      MD5:ED6A1C72A75DEE15A6FA75873CD64975
                                      SHA1:67A15CA72E3156F8BE6C46391E184087E47F4A0D
                                      SHA-256:0D8878CCA08903777888B3681F90E4A07C7AEF7D9600A67DFA985844D4BF5EDA
                                      SHA-512:256C2EBFEB42C2D3340D8BB423EF0AE48D5FB9FE5CA09C363595F51A03007482B67A777E4CAE7A8194F69BC3A3FBCDB9ABB5C9F92097925272431BB9D50F5C03
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S7...V...V...V..\....V..X*...V..X*...V..\....V..\....V..\....V...?...V...V...V..X*..)V...*...V...*@..V...*...V..Rich.V..................PE..d...c.^d.........."...."............T..........@....................................o.....`..........................................................`...5... ...%...J..`O......x.......T.......................(.......@............................................text............................... ..`.rdata..............................@..@.data...$(..........................@....pdata...%... ...&..................@..@_RDATA..\....P......................@..@.rsrc....5...`...6..................@..@.reloc..x............B..............@..B................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1700353
                                      Entropy (8bit):7.442687329839771
                                      Encrypted:false
                                      SSDEEP:24576:ilz6vgGSKeJy5QuxYPFPRM/ATuM+Efe5DS4MX+SAo2iR/Z+MTXJTimJjz:ilzu/6FPRM/ATu1ge5Dlk+C9FvN
                                      MD5:B9134A3839483552F1804BF284318622
                                      SHA1:8F1DAAA235A1A113657638184C5DE9284F04AEBA
                                      SHA-256:E04B368D08D638A53290FD6DD19D301C4992113733759BD59799BFE0D7300AD9
                                      SHA-512:C83459D68239DAE17899B4601356E46665038A0A75C69E9F1BDBD38231D90BA88C67ABD8E4FA207C2564FFBC7D548E3B802E1B37D38B7C94908074A6FA1F30EE
                                      Malicious:false
                                      Preview:(....Deke...M-..DW.@e...AWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVEek.HAYI.l.D.@..e..10($v4...* :v)...x#2v6..E-/336E<.6wc[NA\eXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDekeXAWVDek5.AW2.nk...2VDekeXAW.DGknZIWV.gke.AWVDek..CWVTekeX.WVDekeHAWVTekcXAWVDekcXAWVDeke.EWV@ekeXAWTD..eXQWVDeke.AWVDekeXQWVDekexAWVDekeXAWFDekehEW#DekeHEWTHeke.EWVPeke.EWnaekeXAWVDeke8EWfeekeXAWVDekeXAWVDekeXAWVDeke.EW~DekeXAWVDekeXAWVDek]KEW.FekexEW6FekeXAWVDekeXAWVDekK,$/"Deke.CWVTeke.CWVTekeXAWVDekeXAWvDe.K< #7Deke8AWVDfke8AWVDfkeXAWVDekeXAW.De.K:2$VDeke.AWV$fke.AWV$fkeXAWVDekeXAWVDe.K1%6"%ekeHAWVTakeHAWVTakeXAWVDekeXAW.De.K<(370.keHAWVdakeHAWVdakeXAWVDekeXAW.De.K=%6"%ekeHAWVtakeHAWVtakeXAWVDekeXAW.De+K,-$VDekeHAWV.akeHAWV.akeXAWVDekeXAWVDe.K*%6"%ekeHAWV.akeHAWV.akeXAWVDekeXAW.De+K*$;9'ekehAWV$akehAWV$akeXAWVDekeXAW.De)K(%6"%ekehAWV.akehAWV.akeXAWVDekeXAW.De+K*2%5DekexAWV.akexAWV.akeXAWVDekeXAW.De+eXAWVDekeXAWV.akeXAWV.fkeXAWVDekeXAW.De+
                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1506
                                      Entropy (8bit):3.670637874801362
                                      Encrypted:false
                                      SSDEEP:24:Fmw5dX8DW8XjsKgEblbeYcxdrFEqjCOqjCIyDqjCllzmjHGj+Y:nYgJEb1cxhFxjOj37jRjmjd
                                      MD5:41D842B9F3CF8CF47E872492D42CEAB5
                                      SHA1:3DD789CDC3162ACADC56F59ADF7C4840E77A6886
                                      SHA-256:937758D7C18F6F299887673933CB662A737F8A4A6F143FEC7681FF7D87D9B9FD
                                      SHA-512:3AF890F42019C5AECBF8531D1E41DB44D4A05EA13BEEB044C3520E5CBD9B8F8EC044EB20D084CF78D3678599BE59189793227C8C0834692805C21828B18A6525
                                      Malicious:false
                                      Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.{.2.C.B.A.8.8.3.F.-.5.1.A.6.-.3.D.7.D.-.D.B.B.9.-.0.5.2.7.D.3.9.4.3.3.C.B.}...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.H.i.d.d.e.n...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.n.e.v.e.r...B.a.s.e.N.a.m.e.=.i.T.u.n.e.s.H.e.l.p.e.r...e.x.e...C.a.b.H.a.s.h.=.a.5.c.c.2.4.a.d.9.6.1.5.8.4.e.5.5.0.8.2.3.5.a.1.5.2.8.4.a.b.d.9.1.2.b.3.f.d.e.4.a.2.a.1.4.5.d.4.d.c.1.1.2.8.1.c.1.f.9.c.9.e.a.b...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.F.I.L.E.S.D.I.R.*...U.I.L.e.v.e.l.=.5...F.o.c.u.s.=.y.e.s...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.c.4.0.7.3.f.3.e.-.f.9.c.7.-.4.3.7.a.-.a.2.9.1.-.d.d.b.9.5.c.0.9.9.0.6.8.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.c.4.0.7.3.f.3.e.-.f.9.c.7.-.4.3.7.a.-.a.2.9.1.-.d.d.b.9.5.c.0.9.9.0.6.8.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=...R.u.n.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):0.13073060199261402
                                      Encrypted:false
                                      SSDEEP:24:Bwq/jwY+0JfAebfddipV7sddipVlVIwGzlrkg9SXWp+Qt:1rfddSBsddSHsrfN
                                      MD5:62A0669A40F93ED77D9512C4B5ADF37D
                                      SHA1:78984CC9F35CC29423D8D32E21ED88C0027DF9C1
                                      SHA-256:1866DDDB3AE2CADD194A1BD21B2D6BBDCA38E8D426B51A9BB400E716A7672F4F
                                      SHA-512:541C72C459388936754F6975229A11548D346639E674B77ABA9DE2CF19F28EBBE938573C4A0A44D3B655F2F206E362867C418BBB9DC1DDC87E7FC13D73EA8BCF
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):0.06823305906313656
                                      Encrypted:false
                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOYXldHjSHZRqtoVky6l0t/:2F0i8n0itFzDHFYXvOHvqx01
                                      MD5:F0AF69413A92F1A1FCDD133FEC6B536E
                                      SHA1:5A41BF7A77035D56AB14732DFE40F93A7B273D3A
                                      SHA-256:17C43CD6EF4DD3E8CE62607B0A29A77BDE8B13B746FBD511C0AEED3A3E99C163
                                      SHA-512:FC440769D8541BC6127B3199F2D2E13F9DC0E135D4989BC7F0D793E55A12C8674FC57E101A1230AD722A84C75B217E92D20C7C628D795030329F12A06827B9DE
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\temp\Autoit3.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):32
                                      Entropy (8bit):3.709868358901741
                                      Encrypted:false
                                      SSDEEP:3:B1FhUFN:Ba
                                      MD5:19E5056E44B6E475D155AFEE59738FBD
                                      SHA1:8970489243D86DF4F2B3BC7BFF12A903E6E0BD19
                                      SHA-256:9DBD1F2B086ED062994024A821A3C901346A05C631E7E24CD07468EE62BC04EF
                                      SHA-512:2CAB1153DEDD30EC53432E37BA7EF43F70F9F79B0FA43107D46458EBB08FA3B15586E60FFA67D351158016CCB5D2EE369C60101C8F82FE9966067DDA3A3769C8
                                      Malicious:false
                                      Preview:HBEhccGdHFAfDFcDfEDFCbhCAHAGfBeh
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: iTunes - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 12.12.9.4, Subject: iTunes - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Apple Inc., Keywords: Installer, Template: Intel;1033, Revision Number: {990E7B22-F011-40C1-BDFC-45B6D5B32DED}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
                                      Category:dropped
                                      Size (bytes):4038656
                                      Entropy (8bit):7.067723557061814
                                      Encrypted:false
                                      SSDEEP:49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
                                      MD5:54C2F6B177E71EC4C262930566A282D1
                                      SHA1:B39E90C76E1FB6E4DC6F2D4ED034BA7B9C82BF23
                                      SHA-256:3ED9BC94879D6DB3F296F8B948645A6EA9F9D4201D0209A71FBC62BF73E2E848
                                      SHA-512:7B84D5784626707E808BC7A8E0B15FB23F7FAF3DC77E3AA720A18E89E494C98850B1B6DE52B25F43463E5A39AAC2DB1EDEBBD6C891976D89FACD1F775CF16E43
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.5515994104973243
                                      Encrypted:false
                                      SSDEEP:24:J+FC/llm6cpmUHCpfbuqKt+Q71TddipVlVIwGzlrkg9SCddipV7eJfAebgwY+5w6:c0pcDH2buVNlddSHsrbddSBer
                                      MD5:A7DF3BDAE35CC9751ED42C0AEAFF58D9
                                      SHA1:4A1095AA5EBFAA799B3E9C37E462DA2D28938BE2
                                      SHA-256:6F59FD9C8EF6D0864068D343E3815954C4C41EA4F0502D12A37A8ED0A07A4A35
                                      SHA-512:A76DB0DF0223846B20991B84682617F6A46AF2EA38B53B4E3C7B16226F51F49B3E5D1C750A249E87A3A06E20040D4F5CB022BBC878450100AB0CDCCBBA644166
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):212992
                                      Entropy (8bit):6.5134888693588575
                                      Encrypted:false
                                      SSDEEP:3072:3spAtOdmXwCGjtYNKbYO2gjpcm8rRuqpjCLf2loHUvULyGxr5lqM2a8:BtOdiRQYpgjpjew5GAyGxjqo8
                                      MD5:D82B3FB861129C5D71F0CD2874F97216
                                      SHA1:F3FE341D79224126E950D2691D574D147102B18D
                                      SHA-256:107B32C5B789BE9893F24D5BFE22633D25B7A3CAE80082EF37B30E056869CC5C
                                      SHA-512:244B7675E70AB12AA5776F26E30577268573B725D0F145BFC6B848D2BD8F014C9C6EAB0FC0E4F0A574ED9CA1D230B2094DD88A2146EF0A6DB70DBD815F9A5F5B
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p.......p.....p..../.p.......p...q.%.p.......p.....p.....p.Rich..p.........................PE..L......b...........!.....h..........K...............................................{*....@.........................P...]............P.......................`.....................................p...@...............t............................text....f.......h.................. ..`.rdata...............l..............@..@.data....5..........................@....rsrc........P......................@..@.reloc...)...`...*..................@..B........................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.159856500092105
                                      Encrypted:false
                                      SSDEEP:12:JSbX72FjoXiAGiLIlHVRpzh/7777777777777777777777777vDHFYXvOHvSQp0V:J2SQI53ySE8F
                                      MD5:D400106F217DEFF5C12BF68EFDA72891
                                      SHA1:9054D5983038723B0DB1E50C68E670D028767F97
                                      SHA-256:636F02CC601C8D1C387FF23351D91A60C9F0500DBCD2D1F7C6883D68F39E525F
                                      SHA-512:2364C8753161A42CE5AB85C7C6B1D520A6541A1CDAB544E249A3440FD7E8F295459B235D9901EC4A195D0559D863FE08595756839E891B440195ED05CC865E33
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\expand.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):969
                                      Entropy (8bit):4.270626702072148
                                      Encrypted:false
                                      SSDEEP:12:adMfdN6uFp76uF6dN6uFp76uFp6fdMfdN6uFp76uFp6r:Z76Kp76KY6Kp76Kp6676Kp76Kp6r
                                      MD5:E380909C816036155BCF24E83A3A6BC9
                                      SHA1:214DAC2CCCA2CD2D3A7A173A84CDCFAFC8A7BFFE
                                      SHA-256:0D951499669BD03EB95AF009911C28302FD55FAC5935AE100D54E4389B97EF0B
                                      SHA-512:046879D308130BFDA721D96B99FA35CBFA7BE06F5E093BE132E1A46B6BD8BF32CC6C4B30A5B58CEA8B67C428D43DFCDA5840B1A07507CAE1A9EF16EC7780CB43
                                      Malicious:false
                                      Preview:.2024-02-20 03:25:30, Info DPX Started DPX phase: Resume and Download Job..2024-02-20 03:25:30, Info DPX Started DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Ended DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Started DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Ended DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Ended DPX phase: Resume and Download Job..2024-02-20 03:25:30, Info DPX Started DPX phase: Resume and Download Job..2024-02-20 03:25:30, Info DPX Started DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Ended DPX phase: Apply Deltas Provided In File..2024-02-20 03:25:30, Info DPX Ended DPX phase: Resume and Download Job..
                                      Process:C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):893608
                                      Entropy (8bit):6.620131693023677
                                      Encrypted:false
                                      SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                      MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                      SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                      SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                      SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 3%
                                      • Antivirus: Virustotal, Detection: 4%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):485612
                                      Entropy (8bit):7.2783857027445995
                                      Encrypted:false
                                      SSDEEP:12288:LtlETFoVvMZo2iR/4gwYtV+MTGKJsG+qkurJjM:p+SAo2iR/Z+MTXJTimJjM
                                      MD5:8AB7038B4C8BB4045439C34877B3D987
                                      SHA1:8238100A487D9CCC7606109BD86F7B46A0FA3630
                                      SHA-256:F3DE47B6E1D07ECB4CB3CB047EDDEECFCE0ED692963D1AE7AD59FAD45794B995
                                      SHA-512:7894E8338A6D31F9EE0F43AAFACAE7E8C5845ED55C1B34B7D681820A5A2767F23BF693C225F0B001BB91A6149ECB9BBD5FDF86B4E46816CF585CD2116862E4D3
                                      Malicious:false
                                      Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M........+..M...F.f.q..R,..].>>.r.nw.i@.../9...w.6..;..$dr..yO.n....-.....qH..O....?@....L.9"...]g....z.}_.1N(...+..............wc....I.wc....I.kC.R......%x....}...q..U-...(....%....V..?p.h.....l)".N.#.R......v.k@3.Q..\...I.h...%D'7...Y.....6(..)w....+...........7.`....8.u....h..0p.R%. *....^Z.B..=H.{.X......(...F...o..wc..Co..wc....I.m.........8.5...x...(.U?j....$.1.#.~.\......<.iw..}.k.5-|...d..6c)*.&.....CZ'.....j.q..E.3X-......O..y......cW ..n..0....y.. N/....M.......9.iO..../.]...7"-.B)Y....i...cM.`...d.T.Ff..;..R.Z3..K..?...q5M"....Y....,@...=.'..H.GN..@6J;....eX..p....l...Gfy.;.....m@..1.,....!...q.5.\U)..C..X.m=.U..5....q.....vM9o.1.C....H..v.L..Q.J...|4.....).lD..D....$..L....s....seb.....,r<..Jp\.lQk(....Z..A...K..iVR..~....t.n[`<..y.D.m=...fC.A........o ......<.k.n......\...d...4*...........r..])SdT"...A..b.:.....9.s.,.Dl.....sS..
                                      Process:C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):76
                                      Entropy (8bit):6.247927513443591
                                      Encrypted:false
                                      SSDEEP:3:KvRcujLr4BWCh1WSjgHMjb8T:uRcef4B3cSxy
                                      MD5:768DE4581F6B36192556A9C8FEA206FC
                                      SHA1:F9B836DEC6B1C7C02A81F3203FB659653229EB0F
                                      SHA-256:611DECD13720D94BDB697F3B0D3831D80CBF5F564BDC7C81FAD2339205DFB17B
                                      SHA-512:3E5A3D947584DA521407C3EEC2816E5BB038EA09F1E7F942A742A31AB0BD0EDEBD237E0B36A9E6799AA5ADC60E1CDD247A1293B6C73908C4D4DC766C935EBD7B
                                      Malicious:false
                                      Preview:g]kz"BtRa2s9*FwVjvbNp7dEQ5G[y6,Hre0M4{iP TKL}1(.c3uI)&ZmxS=OACqU8DnJYfhX$Wlo
                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: iTunes - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 12.12.9.4, Subject: iTunes - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Apple Inc., Keywords: Installer, Template: Intel;1033, Revision Number: {990E7B22-F011-40C1-BDFC-45B6D5B32DED}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
                                      Entropy (8bit):7.067723557061814
                                      TrID:
                                      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                      File name:test.msi
                                      File size:4'038'656 bytes
                                      MD5:54c2f6b177e71ec4c262930566a282d1
                                      SHA1:b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23
                                      SHA256:3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848
                                      SHA512:7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43
                                      SSDEEP:49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW
                                      TLSH:5B16496B7640B069C159A13FC4FE6F03B1326061173584CBF5A81F65ADB64C39EFBA88
                                      File Content Preview:........................>......................................................................................................................................................................................................................................
                                      Icon Hash:2d2e3797b32b2b99
                                      No network behavior found

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:1
                                      Start time:03:25:04
                                      Start date:20/02/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\test.msi"
                                      Imagebase:0xff2f0000
                                      File size:128'512 bytes
                                      MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:2
                                      Start time:03:25:07
                                      Start date:20/02/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                      Imagebase:0xff2f0000
                                      File size:128'512 bytes
                                      MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:false

                                      Target ID:5
                                      Start time:03:25:28
                                      Start date:20/02/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 5F18B271DCB7565374F8A7B6F18643C9
                                      Imagebase:0x8d0000
                                      File size:73'216 bytes
                                      MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:6
                                      Start time:03:25:29
                                      Start date:20/02/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
                                      Imagebase:0xd00000
                                      File size:27'136 bytes
                                      MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:8
                                      Start time:03:25:30
                                      Start date:20/02/2024
                                      Path:C:\Windows\SysWOW64\expand.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
                                      Imagebase:0x3a0000
                                      File size:53'248 bytes
                                      MD5 hash:659CED6D7BDA047BCC6048384231DB9F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:10
                                      Start time:03:25:31
                                      Start date:20/02/2024
                                      Path:C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files\iTunesHelper.exe"
                                      Imagebase:0x13fbd0000
                                      File size:366'944 bytes
                                      MD5 hash:ED6A1C72A75DEE15A6FA75873CD64975
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:03:25:31
                                      Start date:20/02/2024
                                      Path:C:\temp\Autoit3.exe
                                      Wow64 process (32bit):true
                                      Commandline:"c:\temp\Autoit3.exe" c:\temp\script.a3x
                                      Imagebase:0xf80000
                                      File size:893'608 bytes
                                      MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Yara matches:
                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_DarkGate, Description: Yara detected DarkGate, Source: 0000000B.00000002.414032605.0000000003827000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 3%, ReversingLabs
                                      • Detection: 4%, Virustotal, Browse
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:14
                                      Start time:03:26:17
                                      Start date:20/02/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\files"
                                      Imagebase:0x4a7c0000
                                      File size:302'592 bytes
                                      MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:16
                                      Start time:03:26:18
                                      Start date:20/02/2024
                                      Path:C:\Windows\SysWOW64\icacls.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-c4073f3e-f9c7-437a-a291-ddb95c099068\." /SETINTEGRITYLEVEL (CI)(OI)LOW
                                      Imagebase:0xf90000
                                      File size:27'136 bytes
                                      MD5 hash:1542A92D5C6F7E1E80613F3466C9CE7F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:16.9%
                                        Dynamic/Decrypted Code Coverage:3.5%
                                        Signature Coverage:13.4%
                                        Total number of Nodes:433
                                        Total number of Limit Nodes:12
                                        execution_graph 30589 6be4e4a0 30590 6be4e58b 30589->30590 30594 6be4e4dd 30589->30594 30620 6be4ee10 30590->30620 30592 6be4e596 30624 6be4ee60 30592->30624 30594->30590 30602 6be4e480 30594->30602 30605 6be4e390 56 API calls 30594->30605 30606 6be4f5c0 30594->30606 30612 6be4e410 57 API calls 30594->30612 30613 6be4f570 8 API calls 30594->30613 30614 6be4f480 30594->30614 30628 6be57750 30602->30628 30605->30594 30607 6be4f5d7 30606->30607 30610 6be4f5f1 30606->30610 30607->30610 30922 6be4ed40 30607->30922 30608 6be4f647 30608->30594 30610->30608 30611 6be491d0 17 API calls 30610->30611 30611->30608 30612->30594 30613->30594 30615 6be4f497 30614->30615 30618 6be4f4a9 30614->30618 30617 6be4ece0 14 API calls 30615->30617 30615->30618 30616 6be4f4fd 30616->30594 30617->30618 30618->30616 30619 6be491d0 17 API calls 30618->30619 30619->30616 30621 6be4ee49 30620->30621 30622 6be4ee20 30620->30622 30621->30592 30622->30621 30623 6be491d0 17 API calls 30622->30623 30623->30621 30625 6be4e5a8 30624->30625 30626 6be4ee70 30624->30626 30626->30625 30627 6be491d0 17 API calls 30626->30627 30627->30625 30629 6be5777d 30628->30629 30633 6be4e490 30628->30633 30630 6be577d0 30629->30630 30631 6be5779f 30629->30631 30629->30633 30647 6be50210 30630->30647 30637 6be53af0 30631->30637 30633->30594 30635 6be577aa 30641 6be4f110 30635->30641 30638 6be53b1a 30637->30638 30639 6be53b00 30637->30639 30638->30635 30639->30638 30651 6be53a90 30639->30651 30642 6be4f12f 30641->30642 30645 6be4f136 30641->30645 30643 6be4ece0 14 API calls 30642->30643 30643->30645 30644 6be4ee10 17 API calls 30646 6be4f164 30644->30646 30645->30644 30646->30633 30648 6be50224 30647->30648 30649 6be4f110 20 API calls 30648->30649 30650 6be50232 30649->30650 30650->30633 30652 6be53ac4 30651->30652 30653 6be53aa6 GetModuleFileNameW 30651->30653 30652->30638 30655 6be552d0 GetModuleFileNameW 30653->30655 30666 6be50240 30655->30666 30658 6be50210 20 API calls 30659 6be5532f 30658->30659 30670 6be550a0 30659->30670 30663 6be4ee10 17 API calls 30665 6be5537c 30663->30665 30664 6be55340 30706 6be4eef0 30664->30706 30665->30652 30667 6be5024c 30666->30667 30668 6be4f110 20 API calls 30667->30668 30669 6be50276 30668->30669 30669->30658 30671 6be55106 30670->30671 30672 6be4ee10 17 API calls 30671->30672 30673 6be5511c 30672->30673 30674 6be551bd 30673->30674 30710 6be4f510 30673->30710 30676 6be4eef0 17 API calls 30674->30676 30677 6be5526d 30676->30677 30678 6be4eef0 17 API calls 30677->30678 30679 6be5527e 30678->30679 30679->30664 30680 6be5517b 30714 6be54cd0 30680->30714 30685 6be551c2 30724 6be54460 30685->30724 30686 6be5519c 30687 6be54e60 22 API calls 30686->30687 30688 6be551b0 30687->30688 30689 6be4f480 20 API calls 30688->30689 30689->30674 30694 6be4f480 20 API calls 30695 6be551f3 30694->30695 30696 6be55237 30695->30696 30697 6be55206 GetSystemDefaultUILanguage 30695->30697 30696->30674 30767 6be54f80 30696->30767 30698 6be54460 33 API calls 30697->30698 30700 6be55216 30698->30700 30702 6be54e60 22 API calls 30700->30702 30704 6be5522a 30702->30704 30703 6be4f480 20 API calls 30703->30674 30705 6be4f480 20 API calls 30704->30705 30705->30696 30708 6be4eefb 30706->30708 30707 6be4ef37 30707->30663 30708->30707 30709 6be491d0 17 API calls 30708->30709 30709->30708 30712 6be4f519 30710->30712 30711 6be4f55c 30711->30680 30788 6be50740 30711->30788 30712->30711 30792 6be491d0 30712->30792 30715 6be54cf3 30714->30715 30716 6be54d09 30714->30716 30820 6be54890 30715->30820 30718 6be50210 20 API calls 30716->30718 30720 6be54d19 30718->30720 30722 6be4ee10 17 API calls 30720->30722 30723 6be54d23 30722->30723 30723->30685 30723->30686 30725 6be54495 30724->30725 30726 6be544a3 30725->30726 30727 6be544ca 30725->30727 30728 6be50240 20 API calls 30726->30728 30731 6be4ee10 17 API calls 30727->30731 30729 6be544b9 LeaveCriticalSection 30728->30729 30730 6be545d3 30729->30730 30732 6be4eef0 17 API calls 30730->30732 30735 6be544df 30731->30735 30733 6be545e1 30732->30733 30753 6be54e60 30733->30753 30734 6be5458e EnterCriticalSection 30736 6be545b2 30734->30736 30735->30734 30737 6be54522 30735->30737 30738 6be54502 30735->30738 30744 6be545c6 LeaveCriticalSection 30736->30744 30878 6be54060 23 API calls 30737->30878 30877 6be54300 26 API calls 30738->30877 30741 6be54533 30745 6be4f480 20 API calls 30741->30745 30742 6be54513 30743 6be4f480 20 API calls 30742->30743 30746 6be54520 30743->30746 30744->30730 30747 6be54540 30745->30747 30746->30734 30747->30734 30748 6be5456d GetSystemDefaultUILanguage 30747->30748 30879 6be504b0 20 API calls 30747->30879 30880 6be54060 23 API calls 30748->30880 30751 6be54581 30881 6be504b0 20 API calls 30751->30881 30754 6be54e8a 30753->30754 30755 6be4ee10 17 API calls 30754->30755 30763 6be54e9d 30755->30763 30756 6be54f20 30757 6be4ee10 17 API calls 30756->30757 30758 6be54f29 30757->30758 30759 6be4ee10 17 API calls 30758->30759 30760 6be54f33 30759->30760 30762 6be4eef0 17 API calls 30760->30762 30761 6be50740 20 API calls 30761->30763 30764 6be54f41 30762->30764 30763->30756 30763->30758 30763->30761 30882 6be50580 30763->30882 30903 6be54dd0 30763->30903 30764->30694 30920 6be4efe0 30767->30920 30770 6be50240 20 API calls 30771 6be54fdd 30770->30771 30772 6be50580 20 API calls 30771->30772 30773 6be54fee 30772->30773 30774 6be54dd0 19 API calls 30773->30774 30775 6be54ffe 30774->30775 30777 6be50240 20 API calls 30775->30777 30787 6be55049 30775->30787 30776 6be4eef0 17 API calls 30778 6be55058 30776->30778 30779 6be5501b 30777->30779 30780 6be4ee10 17 API calls 30778->30780 30781 6be50580 20 API calls 30779->30781 30782 6be55061 30780->30782 30783 6be5502c 30781->30783 30782->30703 30784 6be54dd0 19 API calls 30783->30784 30785 6be5503c 30784->30785 30786 6be4ee10 17 API calls 30785->30786 30785->30787 30786->30787 30787->30776 30789 6be50752 30788->30789 30790 6be4f110 20 API calls 30789->30790 30791 6be50791 30790->30791 30791->30680 30793 6be491de 30792->30793 30794 6be491da 30792->30794 30798 6be47bc0 30793->30798 30794->30711 30795 6be491e4 30795->30794 30811 6be494c0 8 API calls 30795->30811 30799 6be47bdd 30798->30799 30800 6be47cab 30798->30800 30801 6be47be4 30799->30801 30806 6be47c72 Sleep 30799->30806 30800->30801 30802 6be47dbf 30800->30802 30803 6be47cc2 30801->30803 30808 6be47cc7 30801->30808 30810 6be47bee 30801->30810 30802->30810 30812 6be475a0 30802->30812 30819 6be47270 Sleep Sleep 30803->30819 30806->30801 30807 6be47c95 Sleep 30806->30807 30807->30799 30809 6be47d5c VirtualFree 30808->30809 30808->30810 30809->30810 30810->30795 30811->30794 30813 6be474c0 Sleep 30812->30813 30814 6be475bb 30813->30814 30815 6be475d5 VirtualFree 30814->30815 30817 6be475f2 30814->30817 30818 6be475e9 30815->30818 30816 6be475fe VirtualQuery VirtualFree 30816->30817 30816->30818 30817->30816 30817->30818 30818->30810 30819->30808 30821 6be548c1 30820->30821 30822 6be548cc GetModuleFileNameW 30821->30822 30823 6be548df 30821->30823 30822->30823 30824 6be54907 RegOpenKeyExW 30823->30824 30825 6be54b55 30823->30825 30826 6be54940 RegOpenKeyExW 30824->30826 30827 6be54a1e 30824->30827 30828 6be4ee10 17 API calls 30825->30828 30826->30827 30829 6be5496e RegOpenKeyExW 30826->30829 30851 6be54650 24 API calls 30827->30851 30831 6be54b5f 30828->30831 30829->30827 30832 6be5499c RegOpenKeyExW 30829->30832 30834 6be4ee10 17 API calls 30831->30834 30832->30827 30835 6be549c6 RegOpenKeyExW 30832->30835 30833 6be54a2f RegQueryValueExW 30836 6be54ab2 RegQueryValueExW 30833->30836 30837 6be54a5f 30833->30837 30838 6be54b6b 30834->30838 30835->30827 30840 6be549f0 RegOpenKeyExW 30835->30840 30839 6be54ae1 30836->30839 30849 6be54aad 30836->30849 30852 6be491a0 30837->30852 30850 6be54d50 12 API calls 30838->30850 30842 6be491a0 14 API calls 30839->30842 30840->30825 30840->30827 30845 6be54aea RegQueryValueExW 30842->30845 30843 6be54b49 RegCloseKey 30843->30825 30848 6be50210 20 API calls 30845->30848 30846 6be491d0 17 API calls 30846->30843 30847 6be50210 20 API calls 30847->30849 30848->30849 30849->30843 30849->30846 30850->30716 30851->30833 30853 6be491ae 30852->30853 30854 6be491aa RegQueryValueExW 30852->30854 30858 6be477f0 30853->30858 30854->30847 30855 6be491b4 30855->30854 30876 6be494c0 8 API calls 30855->30876 30859 6be47824 30858->30859 30860 6be47a59 30858->30860 30861 6be47833 30859->30861 30869 6be478e7 Sleep 30859->30869 30862 6be47a66 30860->30862 30863 6be47b9b 30860->30863 30867 6be47910 30861->30867 30871 6be47915 30861->30871 30875 6be4784a 30861->30875 30864 6be47a7a 30862->30864 30868 6be47a7f 30862->30868 30865 6be47510 Sleep 30863->30865 30863->30875 30866 6be47270 Sleep Sleep 30864->30866 30865->30875 30866->30868 30870 6be47270 Sleep Sleep 30867->30870 30873 6be47420 VirtualAlloc 30868->30873 30868->30875 30869->30861 30872 6be47900 Sleep 30869->30872 30870->30871 30874 6be47420 VirtualAlloc 30871->30874 30871->30875 30872->30859 30873->30875 30874->30875 30875->30855 30876->30854 30877->30742 30878->30741 30879->30748 30880->30751 30881->30734 30883 6be505b0 30882->30883 30884 6be5059e 30882->30884 30886 6be505b8 30883->30886 30887 6be505ca 30883->30887 30885 6be4f480 20 API calls 30884->30885 30896 6be505ab 30885->30896 30888 6be4f480 20 API calls 30886->30888 30889 6be505d7 30887->30889 30890 6be505e9 30887->30890 30888->30896 30910 6be504b0 20 API calls 30889->30910 30892 6be5067e 30890->30892 30894 6be505f2 30890->30894 30895 6be4f480 20 API calls 30892->30895 30893 6be50621 30912 6be4ece0 30893->30912 30894->30893 30911 6be4b380 8 API calls 30894->30911 30898 6be5068b 30895->30898 30896->30763 30918 6be504b0 20 API calls 30898->30918 30901 6be50628 30902 6be4ee10 17 API calls 30901->30902 30902->30896 30904 6be54dee 30903->30904 30905 6be54dfb FindFirstFileW 30904->30905 30906 6be54e22 30905->30906 30907 6be54e1a FindClose 30905->30907 30908 6be4ee10 17 API calls 30906->30908 30907->30906 30909 6be54e2f 30908->30909 30909->30763 30910->30896 30911->30893 30913 6be4eced 30912->30913 30914 6be4ed0c 30912->30914 30915 6be4ecfa 30913->30915 30919 6be4b380 8 API calls 30913->30919 30914->30901 30917 6be491a0 14 API calls 30915->30917 30917->30914 30918->30896 30919->30915 30921 6be4efe8 GetUserDefaultUILanguage GetLocaleInfoW 30920->30921 30921->30770 30923 6be4ed50 30922->30923 30924 6be4ed74 30922->30924 30925 6be4ed5d 30923->30925 30928 6be4b380 8 API calls 30923->30928 30924->30610 30927 6be491a0 14 API calls 30925->30927 30927->30924 30928->30925 30929 6bf84950 30930 6bf84970 30929->30930 30931 6bf849bb 30930->30931 30937 6be59420 30930->30937 30938 6be5943b 30937->30938 30971 6be4e240 30938->30971 30940 6be594b9 30941 6bf6c010 30940->30941 30942 6be5be60 30941->30942 30943 6bf6c055 5267 API calls 30942->30943 30979 6be49810 30943->30979 30953 6bf84789 31017 6be50280 30953->31017 30957 6bf847be 31028 6be4f1c0 30957->31028 30962 6be4f5c0 20 API calls 30963 6bf84815 30962->30963 31039 6be4f780 30963->31039 30965 6bf84851 30966 6be4ee60 17 API calls 30965->30966 30967 6bf84897 30966->30967 30968 6be4eef0 17 API calls 30967->30968 30969 6bf848a5 30968->30969 30970 6be4e970 8 API calls 30969->30970 30972 6be4e266 30971->30972 30973 6be4e26d GetCurrentThreadId 30971->30973 30972->30973 30974 6be4e2b9 30973->30974 30975 6be4e37d 30974->30975 30977 6be4e376 30974->30977 30978 6be4e970 8 API calls 30975->30978 30977->30940 30980 6be4ee10 17 API calls 30979->30980 30981 6be4982a 30980->30981 30982 6be4982e 30981->30982 30985 6be49850 30981->30985 30984 6be4f110 20 API calls 30982->30984 30986 6be4984e 30984->30986 30985->30986 31042 6be49720 20 API calls 30985->31042 30987 6be6e850 30986->30987 30988 6be6e86e 30987->30988 30989 6be50740 20 API calls 30988->30989 30990 6be6e8df 30989->30990 30991 6be79cd0 30990->30991 30992 6be4f480 20 API calls 30991->30992 30993 6be79ce0 30992->30993 30994 6be79d0a 30993->30994 31043 6be504b0 20 API calls 30993->31043 30996 6be4fd80 30994->30996 30997 6be4fd90 30996->30997 30998 6be4fd89 30996->30998 31044 6be4f3d0 20 API calls 30997->31044 30999 6be4ee60 17 API calls 30998->30999 31001 6be4fd8e 30999->31001 31002 6be4fab0 31001->31002 31003 6be4facf 31002->31003 31008 6be4fae9 31002->31008 31004 6be4fadc 31003->31004 31005 6be4faee 31003->31005 31006 6be4f5c0 20 API calls 31004->31006 31007 6be4fb18 31005->31007 31045 6be4b380 8 API calls 31005->31045 31006->31008 31010 6be4f780 20 API calls 31007->31010 31008->30953 31011 6be4fb22 31010->31011 31046 6be4fcc0 31011->31046 31013 6be4fb47 31014 6be4fb61 31013->31014 31015 6be4f780 20 API calls 31013->31015 31016 6be4f780 20 API calls 31014->31016 31015->31014 31016->31008 31018 6be50290 31017->31018 31019 6be50289 31017->31019 31058 6be4f210 20 API calls 31018->31058 31021 6be4ee10 17 API calls 31019->31021 31022 6be5028e 31021->31022 31023 6bf30490 31022->31023 31059 6bf2fe90 31023->31059 31025 6bf304bb 31063 6bf30440 31025->31063 31027 6bf304cd 31027->30957 31029 6be4ed40 14 API calls 31028->31029 31030 6be4f1dc 31029->31030 31031 6be4ee60 17 API calls 31030->31031 31032 6be4f1fa 31031->31032 31033 6bf6bf40 31032->31033 31034 6bf6bf5e 31033->31034 31035 6be4fcc0 20 API calls 31034->31035 31037 6bf6bf6f 31035->31037 31036 6bf6bff2 31036->30962 31037->31036 31038 6be4f780 20 API calls 31037->31038 31038->31037 31111 6be4f710 31039->31111 31042->30985 31043->30994 31044->31001 31045->31007 31047 6be4fcd6 31046->31047 31048 6be4fce3 31046->31048 31049 6be4ee60 17 API calls 31047->31049 31050 6be4fd2d 31048->31050 31051 6be4fcf1 31048->31051 31054 6be4fcde 31049->31054 31052 6be4ed40 14 API calls 31050->31052 31057 6be49200 8 API calls 31051->31057 31055 6be4fd37 31052->31055 31054->31013 31055->31054 31056 6be4ee60 17 API calls 31055->31056 31056->31054 31057->31054 31058->31022 31060 6bf2feb3 31059->31060 31067 6bf2ff40 31060->31067 31062 6bf2fee2 31062->31025 31064 6bf30459 31063->31064 31065 6bf30485 31064->31065 31103 6bf2ea30 31064->31103 31065->31027 31068 6bf2ffa1 31067->31068 31069 6bf2ffd6 31068->31069 31072 6bf300a4 31068->31072 31094 6be6e730 CreateFileW 31069->31094 31073 6bf3013a 31072->31073 31099 6be6e990 21 API calls 31072->31099 31076 6be4f480 20 API calls 31073->31076 31075 6bf30018 31075->31073 31095 6be6e990 21 API calls 31075->31095 31079 6bf30151 31076->31079 31077 6bf300e6 31100 6be756e0 22 API calls 31077->31100 31081 6be4eef0 17 API calls 31079->31081 31080 6bf3004b GetLastError 31096 6be756e0 22 API calls 31080->31096 31083 6bf30160 31081->31083 31083->31062 31085 6bf3006a 31097 6be77ef0 76 API calls 31085->31097 31086 6bf30105 31101 6be77ef0 76 API calls 31086->31101 31089 6bf30097 31098 6be4df70 8 API calls 31089->31098 31090 6bf30132 31102 6be4df70 8 API calls 31090->31102 31093 6bf3009f 31093->31073 31094->31075 31095->31080 31096->31085 31097->31089 31098->31093 31099->31077 31100->31086 31101->31090 31102->31073 31104 6bf2ea51 31103->31104 31107 6bf2ea61 31104->31107 31109 6bf2d200 56 API calls 31104->31109 31105 6bf2ea8d 31105->31065 31107->31105 31110 6bf2d200 56 API calls 31107->31110 31109->31107 31110->31107 31112 6be4f727 31111->31112 31116 6be4f758 31111->31116 31113 6be4ed40 14 API calls 31112->31113 31112->31116 31114 6be4f73e 31113->31114 31115 6be4ee60 17 API calls 31114->31115 31115->31116 31116->30965 31117 20ab9f0 31118 20aba55 31117->31118 31121 20ab2d0 31118->31121 31120 20abb0a 31122 20ab2e9 31121->31122 31125 20ab210 31122->31125 31124 20ab2f7 31124->31120 31126 20ab22d 31125->31126 31131 20ab0e0 31126->31131 31128 20ab248 31129 20ab282 31128->31129 31130 20ab278 VirtualFree 31128->31130 31129->31124 31130->31129 31133 20ab10d 31131->31133 31132 20ab1c8 31132->31128 31133->31132 31134 20ab1be CloseHandle 31133->31134 31134->31132

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Open$QueryValue$CloseFileModuleName
                                        • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                                        • API String ID: 2701450724-3496071916
                                        • Opcode ID: a39e68c356ca0a0198371222888fedf7f107c6aec0af0a3aa8cb3a070aa24a0a
                                        • Instruction ID: a2cc885a684b8ac50ec2a9e99074a21af9d2a17821cfddf4f86380ad625c20e3
                                        • Opcode Fuzzy Hash: a39e68c356ca0a0198371222888fedf7f107c6aec0af0a3aa8cb3a070aa24a0a
                                        • Instruction Fuzzy Hash: 7661C872204B8599EB70CF71E8983DA23B5F78578CF60111A9A8D8BB1DEF79C265C340
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                                        • API String ID: 0-3496071916
                                        • Opcode ID: eb4080e26a6a0e409f81f20ba43894b999a40403412c9c1359f7bf0479805ccb
                                        • Instruction ID: 001e1a73b9fc9491a34b59f9c713be732532720d7d502fe0017c4993c8fe54c5
                                        • Opcode Fuzzy Hash: eb4080e26a6a0e409f81f20ba43894b999a40403412c9c1359f7bf0479805ccb
                                        • Instruction Fuzzy Hash: 14610C32204B8589EB70EF71E8983DB23A5F79978CF901125DA8D8BB29EF74C245D740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetUserDefaultUILanguage.KERNEL32 ref: 6BE54FAE
                                        • GetLocaleInfoW.KERNEL32 ref: 6BE54FC5
                                          • Part of subcall function 6BE54DD0: FindFirstFileW.KERNEL32 ref: 6BE54E02
                                          • Part of subcall function 6BE54DD0: FindClose.KERNEL32 ref: 6BE54E1D
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                                        • String ID:
                                        • API String ID: 3216391948-0
                                        • Opcode ID: f8ce65893ade70136e6809773108f5bdb7b857f027b8e6df90e5e9f62af2927b
                                        • Instruction ID: de319095d585a0041700780cd4cdbe2c354a4d78fba060b0c8fdd2aabd598e8c
                                        • Opcode Fuzzy Hash: f8ce65893ade70136e6809773108f5bdb7b857f027b8e6df90e5e9f62af2927b
                                        • Instruction Fuzzy Hash: 5521EF76220A5089DB10DF76D8913D927A1EB88BDCF60610AFA4E47B18CF39C5A68381
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: 77909ad07fd8af244572eb0eba36558c16ec36278e2941940a98ef0bf065085b
                                        • Instruction ID: 6111ab7688b71f78df259beccf795f1e648680e82369d5f2f2a780121b687781
                                        • Opcode Fuzzy Hash: 77909ad07fd8af244572eb0eba36558c16ec36278e2941940a98ef0bf065085b
                                        • Instruction Fuzzy Hash: F5F05E122129C089CBB1DE30E8953E92311DB867ACF281755966D0BBE8DE19C2A58700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88213be1bcc6b02baa0199bba448e96ec685791caf600502c9c5e95722e0617e
                                        • Instruction ID: 7a874f54928a288591c77a9318c1dd7ff09441794071e6f2d6d063a87aa06ee7
                                        • Opcode Fuzzy Hash: 88213be1bcc6b02baa0199bba448e96ec685791caf600502c9c5e95722e0617e
                                        • Instruction Fuzzy Hash: FFF05416201AC089CBB1BF30D8A43EA2351DB8676CF181311D6AD0BBE4DE15C155AB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56eeaecd384b77ed4a74c9ff714367a801a5bab5f1d4253a6534ed734200c150
                                        • Instruction ID: a9d79db428ec28b894fdb50921926b435af939adfe96438a2072844ddbe30efe
                                        • Opcode Fuzzy Hash: 56eeaecd384b77ed4a74c9ff714367a801a5bab5f1d4253a6534ed734200c150
                                        • Instruction Fuzzy Hash: EDB09222A148C0938611FB04D88204A7232F7D0B08FD00050E28942614CE18CA268E40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID: eXAWVDek$sqlite3.dll
                                        • API String ID: 134000473-1838081297
                                        • Opcode ID: a099714d48622af70f3a1d44238d0f3e7f57dd0d9f8efb68de67f3dc1db09ec3
                                        • Instruction ID: a8d95cd9b85fbfd9e5cd002bfb476a1c9fabda238d14d4928a65c4f6e730ef5e
                                        • Opcode Fuzzy Hash: a099714d48622af70f3a1d44238d0f3e7f57dd0d9f8efb68de67f3dc1db09ec3
                                        • Instruction Fuzzy Hash: 69A402A1612ADEA8EB01DF64FC9139433BFAB50388FA49066D50D87175AF7AC5BDC310
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 139 6be475a0-6be475d3 call 6be474c0 142 6be475d5-6be475e7 VirtualFree 139->142 143 6be475f2-6be475fc 139->143 144 6be475ed-6be475f0 142->144 145 6be475e9-6be475eb 142->145 146 6be475fe-6be47622 VirtualQuery VirtualFree 143->146 147 6be4763b-6be4763d 144->147 145->147 148 6be47624-6be47627 146->148 149 6be47629-6be47630 146->149 152 6be47646-6be4765b 147->152 153 6be4763f-6be47642 147->153 151 6be4763a 148->151 150 6be47632-6be47638 149->150 149->151 150->146 151->147 153->152
                                        APIs
                                        • VirtualFree.KERNEL32(?,?,?,?,04000001FF000200,?,?,?,?,?,6BE47DCE,00000000,?,?,6BE54D6F), ref: 6BE475E0
                                        • VirtualQuery.KERNEL32(?,?,?,?,04000001FF000200,?,?,?,?,?,6BE47DCE,00000000,?,?,6BE54D6F), ref: 6BE4760B
                                        • VirtualFree.KERNEL32(?,?,?,?,04000001FF000200,?,?,?,?,?,6BE47DCE,00000000,?,?,6BE54D6F), ref: 6BE4761B
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Virtual$Free$Query
                                        • String ID:
                                        • API String ID: 778034434-0
                                        • Opcode ID: cb14e02b5b1262c4c80436262aa9a827977ef83d82f69b3c54b78fbfa432d047
                                        • Instruction ID: 5ace4a8378a4853ebe867ca4645b801c1e9ea21412b6ca32c4149fc0e38bd371
                                        • Opcode Fuzzy Hash: cb14e02b5b1262c4c80436262aa9a827977ef83d82f69b3c54b78fbfa432d047
                                        • Instruction Fuzzy Hash: 40110E22715A4488EB158EBFAD807462A56A749FFCF248275EE6D077D0EE3CC096C3C1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 154 6be47bc0-6be47bd7 155 6be47bdd-6be47be2 154->155 156 6be47cab-6be47cae 154->156 157 6be47be4-6be47bec 155->157 158 6be47c59-6be47c62 155->158 159 6be47cb4-6be47cc0 156->159 160 6be47dbf-6be47dc7 156->160 161 6be47c26-6be47c29 157->161 162 6be47bee-6be47bfd 157->162 158->157 165 6be47c64-6be47c70 158->165 166 6be47cc7-6be47cd4 159->166 167 6be47cc2 call 6be47270 159->167 163 6be47dce-6be47dd5 160->163 164 6be47dc9 call 6be475a0 160->164 173 6be47c44 161->173 174 6be47c2b-6be47c42 161->174 171 6be47bff-6be47c03 162->171 172 6be47c08-6be47c21 162->172 164->163 165->158 176 6be47c72-6be47c8f Sleep 165->176 169 6be47cd6-6be47cda 166->169 170 6be47d12-6be47d24 166->170 167->166 177 6be47cdf-6be47ce3 169->177 170->177 179 6be47d26-6be47d2e call 6be472c0 170->179 171->163 172->163 178 6be47c48-6be47c57 173->178 174->173 174->178 176->157 180 6be47c95-6be47ca9 Sleep 176->180 181 6be47ce5-6be47ceb 177->181 182 6be47d30-6be47d40 177->182 178->159 179->177 180->158 184 6be47d4c-6be47d5a 181->184 185 6be47ced-6be47d0d call 6be47310 181->185 182->181 187 6be47d42-6be47d4a call 6be472c0 182->187 188 6be47d5c-6be47d8b VirtualFree 184->188 189 6be47d8d-6be47dbd call 6be47380 184->189 185->163 187->181 188->163 189->163
                                        APIs
                                        • Sleep.KERNEL32(00000000,?,?,6BE54D6F), ref: 6BE47C7A
                                        • Sleep.KERNEL32(00000000,?,?,6BE54D6F), ref: 6BE47C9D
                                        • VirtualFree.KERNEL32(00000000,?,?,6BE54D6F), ref: 6BE47D81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Sleep$FreeVirtual
                                        • String ID:
                                        • API String ID: 3067263416-0
                                        • Opcode ID: ba0596d1ca3feefe854a59417e374075e2396f26a19a312980241e517d486a34
                                        • Instruction ID: 9a5032c41a38199bce404ecc2c07b86cd697154ef3fe0ca0a4a25c21abcb62cc
                                        • Opcode Fuzzy Hash: ba0596d1ca3feefe854a59417e374075e2396f26a19a312980241e517d486a34
                                        • Instruction Fuzzy Hash: D5510362715B8489DB05CF35F84035A73A5F70AB98F648A69CB9D83394DF3DC4A1C390
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 229 6be477f0-6be4781e 230 6be47824-6be47831 229->230 231 6be47a59-6be47a60 229->231 232 6be478a1-6be478aa 230->232 233 6be47833-6be47848 230->233 234 6be47a66-6be47a78 231->234 235 6be47b9b-6be47ba1 231->235 232->233 236 6be478ac-6be478b9 232->236 239 6be47864-6be47873 233->239 240 6be4784a-6be4785a 233->240 241 6be47a7f-6be47aa0 234->241 242 6be47a7a call 6be47270 234->242 237 6be47ba3 call 6be47510 235->237 238 6be47ba8-6be47bb0 235->238 236->233 245 6be478bf-6be478cc 236->245 237->238 249 6be4790c-6be4790e 239->249 250 6be47879-6be47888 239->250 247 6be4785c-6be4785f 240->247 248 6be4788d-6be4789c 240->248 243 6be47aa2-6be47aaa 241->243 244 6be47aac-6be47abb 241->244 242->241 252 6be47b0f-6be47b30 243->252 253 6be47ad0-6be47ad8 244->253 254 6be47abd-6be47ace 244->254 245->233 255 6be478d2-6be478e5 245->255 247->238 248->238 256 6be47915-6be4791f 249->256 257 6be47910 call 6be47270 249->257 250->238 262 6be47b32-6be47b44 252->262 263 6be47b4d-6be47b5f 252->263 258 6be47ada-6be47af9 253->258 259 6be47afb-6be47afd call 6be47420 253->259 254->252 255->232 260 6be478e7-6be478fa Sleep 255->260 264 6be479b4-6be479c0 256->264 265 6be47925-6be47968 256->265 257->256 268 6be47b02-6be47b0a 258->268 259->268 260->233 269 6be47900-6be4790a Sleep 260->269 262->263 271 6be47b46 262->271 274 6be47b81 263->274 275 6be47b61-6be47b78 263->275 266 6be479c2-6be479d6 264->266 267 6be479ec-6be479f2 call 6be47420 264->267 272 6be4797e-6be47992 265->272 273 6be4796a-6be47975 265->273 277 6be479d8 266->277 278 6be479da-6be479ea 266->278 286 6be479f7-6be479fd 267->286 268->238 269->232 271->263 282 6be47994-6be479b2 call 6be47310 272->282 283 6be47a0c 272->283 273->272 280 6be47977 273->280 276 6be47b86-6be47b99 274->276 275->276 281 6be47b7a-6be47b7f call 6be47310 275->281 276->238 277->278 285 6be47a11-6be47a54 278->285 280->272 281->276 282->285 283->285 285->238 286->285 290 6be479ff-6be47a07 286->290 290->238
                                        APIs
                                        • Sleep.KERNEL32(00000000,-00000001,?,?,6BE54D92), ref: 6BE478EC
                                        • Sleep.KERNEL32(00000000,-00000001,?,?,6BE54D92), ref: 6BE47905
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: a7940c8d2bcb379a833bc8a05a627e19325e3d50e0ea9088011264fddc1aa2d4
                                        • Instruction ID: 35c5be128bf17c3b7da47d7fe516fbada29811a484a6f31c3f630a59c1f54072
                                        • Opcode Fuzzy Hash: a7940c8d2bcb379a833bc8a05a627e19325e3d50e0ea9088011264fddc1aa2d4
                                        • Instruction Fuzzy Hash: E8B124B3601B94C6D7098F28F95035977A2F344B68F648669C7AD877E8DB7CC4A5C380
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetSystemDefaultUILanguage.KERNEL32 ref: 6BE55206
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: DefaultLanguageSystem
                                        • String ID:
                                        • API String ID: 4166810957-0
                                        • Opcode ID: ba58b57206b961e2ede13d1ad3d9845d373a64c1f4a0d5312e55fa51b502b159
                                        • Instruction ID: 21991e4c8622bc98bbad1c447e97e5e5996e2ee39d0f3a9f64ab90e37ab35cce
                                        • Opcode Fuzzy Hash: ba58b57206b961e2ede13d1ad3d9845d373a64c1f4a0d5312e55fa51b502b159
                                        • Instruction Fuzzy Hash: D951E136210B8489DB20DF75D8913D927B2F785B9CF60545AEA0D8BB5CDF7AC5A4C380
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 343 6be4e240-6be4e264 344 6be4e266 343->344 345 6be4e26d-6be4e2b7 GetCurrentThreadId 343->345 344->345 346 6be4e2c5 345->346 347 6be4e2b9-6be4e2c3 345->347 348 6be4e2cd-6be4e30e 346->348 347->348 349 6be4e310-6be4e317 348->349 350 6be4e319 348->350 349->350 351 6be4e322-6be4e32a 349->351 350->351 352 6be4e32c-6be4e332 351->352 353 6be4e33f-6be4e346 351->353 352->353 354 6be4e351-6be4e359 353->354 355 6be4e348 353->355 356 6be4e36d-6be4e374 354->356 357 6be4e35b-6be4e367 call 6be49aa0 354->357 355->354 359 6be4e376 call 6be4e1a0 356->359 360 6be4e37d call 6be4e970 356->360 357->356 365 6be4e37b 359->365 364 6be4e382-6be4e38f 360->364 365->364
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 6BE4E2A7
                                          • Part of subcall function 6BE4E970: GetCurrentThreadId.KERNEL32 ref: 6BE4E9A0
                                          • Part of subcall function 6BE4E970: FreeLibrary.KERNEL32 ref: 6BE4EA79
                                          • Part of subcall function 6BE4E970: ExitProcess.KERNEL32 ref: 6BE4EACD
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CurrentThread$ExitFreeLibraryProcess
                                        • String ID:
                                        • API String ID: 274535261-0
                                        • Opcode ID: 36baff47e50286e30d3a3b4b7f003f29b19bf662a8361128b7cd608225014bfb
                                        • Instruction ID: c4aca540193fee8b3b5ada60c415d8e200a6461943663505acf2253c04877aec
                                        • Opcode Fuzzy Hash: 36baff47e50286e30d3a3b4b7f003f29b19bf662a8361128b7cd608225014bfb
                                        • Instruction Fuzzy Hash: C2312132514B88DAD766DF30EC487CA37BAF708748F900569CA4D5B764CB39869AC300
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameW.KERNEL32 ref: 6BE5530A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileModuleName
                                        • String ID:
                                        • API String ID: 514040917-0
                                        • Opcode ID: 46fb0f7c4070b9b99976c0860fe073ee63c1241d33055de5d8568f91400fe819
                                        • Instruction ID: 28aa76233de8b45be41787bbbfb170d2f4e5e5bbe597e768f942f77c95b6e564
                                        • Opcode Fuzzy Hash: 46fb0f7c4070b9b99976c0860fe073ee63c1241d33055de5d8568f91400fe819
                                        • Instruction Fuzzy Hash: 03112733220A5498DB14DF75D8913DE37A6EB4478CF61101AFA4E47B98DF3AC199C391
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 383 6be53a90-6be53aa4 384 6be53ad7-6be53ae4 383->384 385 6be53aa6-6be53abf GetModuleFileNameW call 6be552d0 383->385 387 6be53ac4-6be53acd 385->387 387->384 388 6be53acf-6be53ad3 387->388 388->384
                                        APIs
                                        • GetModuleFileNameW.KERNEL32 ref: 6BE53AB4
                                          • Part of subcall function 6BE552D0: GetModuleFileNameW.KERNEL32 ref: 6BE5530A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileModuleName
                                        • String ID:
                                        • API String ID: 514040917-0
                                        • Opcode ID: edf2d650bc4e554e2b0285e89424bff7a73989e8a2ac95c98a52a611111222a2
                                        • Instruction ID: 941983dae522f8b1f6beb3c9b2f9a83a0508df30fe56c27f5ccdccd64b900558
                                        • Opcode Fuzzy Hash: edf2d650bc4e554e2b0285e89424bff7a73989e8a2ac95c98a52a611111222a2
                                        • Instruction Fuzzy Hash: 9AF01573611A4888CB20EF71E44478823B4F308B9CFA602159F8C4B708DF39C1A9C751
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32 ref: 6BF30057
                                          • Part of subcall function 6BE756E0: FormatMessageW.KERNEL32 ref: 6BE7573D
                                          • Part of subcall function 6BE756E0: LocalFree.KERNEL32(?,?,?,?,?,?,6BF30105), ref: 6BE75786
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ErrorFormatFreeLastLocalMessage
                                        • String ID:
                                        • API String ID: 1365068426-0
                                        • Opcode ID: f9b2c7e2fa627628687a79c1cc929e69810122754fabbd751b442b2068f9ce5f
                                        • Instruction ID: 3514e7b02147ad7b4a0f89de5ee724d2bacf6d6665345e2f4c68dcf721f00ac0
                                        • Opcode Fuzzy Hash: f9b2c7e2fa627628687a79c1cc929e69810122754fabbd751b442b2068f9ce5f
                                        • Instruction Fuzzy Hash: A8511322214BC089D760EF75DC803D937A2F7457ACF50421ADA5D4BBA9DF78C285C381
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: h
                                        • API String ID: 0-2439710439
                                        • Opcode ID: 442c6f943ac74300e4206b99736ae9c0906ad149fadfac253a815631173d7754
                                        • Instruction ID: cee0e6261492dfb32f9d8171de9fac70ab6116525a4f5a531ba6a6b5da01dec5
                                        • Opcode Fuzzy Hash: 442c6f943ac74300e4206b99736ae9c0906ad149fadfac253a815631173d7754
                                        • Instruction Fuzzy Hash: F841F672210BC489DB20EF64D8503DA3366F79879CF504126EB8D4BB59DF39C659DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,000000A6,6BE47B02,00000000,-00000001,?,?,6BE54D92), ref: 6BE4743F
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: de32b4ce74140b0b0cdb301210abc82cb23a06824cf6700066aaa7589803317f
                                        • Instruction ID: b5e1fcb1fd531f00e12809e3f1b1e62b03fd8d48f90827dab2e15ca4876f19e0
                                        • Opcode Fuzzy Hash: de32b4ce74140b0b0cdb301210abc82cb23a06824cf6700066aaa7589803317f
                                        • Instruction Fuzzy Hash: A90162F170174882E7198FA5FE9531536D5B7087C4F20483D994CC77A9DB3D84E58390
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7132d283c06bc50ce9c3c8e1b5a28c95314462bb8e22dae744d50f314d62f8e5
                                        • Instruction ID: b4acd3e5b605d79eea01d287dd74f0226724f21ccfb9d26b30d853c051709c0a
                                        • Opcode Fuzzy Hash: 7132d283c06bc50ce9c3c8e1b5a28c95314462bb8e22dae744d50f314d62f8e5
                                        • Instruction Fuzzy Hash: 7711CE12311B5584EB52ABA7888079B2A85B7C8FF8F048275DEEE077D0EF78C0869701
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7eabe2a85996a0ae572f73cb1f3c17a934dad9572fbe308bc41528f79607734a
                                        • Instruction ID: 1cfe21677ebc00804e94291b02b60b3d2cf562f86d3a272f5ebd71c28bfbf2f8
                                        • Opcode Fuzzy Hash: 7eabe2a85996a0ae572f73cb1f3c17a934dad9572fbe308bc41528f79607734a
                                        • Instruction Fuzzy Hash: 9511023270430642EE619B64A47CB9B50A267857BCF140318EDBB8BBD0D7BEC1467B80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 38353b98ae9a1d6985d56118dd9ad0aae3614e4aada85c4b5d40afc17fa07205
                                        • Instruction ID: 02d00760c2ce81a278ca2f33eba390503f96bf0ff1c4282acb0e30ef89b0e514
                                        • Opcode Fuzzy Hash: 38353b98ae9a1d6985d56118dd9ad0aae3614e4aada85c4b5d40afc17fa07205
                                        • Instruction Fuzzy Hash: 7C21F932200B8489DB60EF31D8507DE3761F785B9CF504255EA9D8BB98CF39D545DB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8fe3b72e9833a4b4593f3f47fd918ccb52ebb3cadc8e5792c7c5bc990570bf1c
                                        • Instruction ID: c06cf3fc55c8f32abe94668172ffcd3f5e48ed66175737cfc032298bb827b4e1
                                        • Opcode Fuzzy Hash: 8fe3b72e9833a4b4593f3f47fd918ccb52ebb3cadc8e5792c7c5bc990570bf1c
                                        • Instruction Fuzzy Hash: 8711AC32214680CECB64EF75D8503DA3BA1F7447ACF540225EA9D87B88DF39C104DB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8bdeb87a8631300c3fef7b7405dd7071bdecebcfa691e024f7b4587126d749b
                                        • Instruction ID: 22706eef09bfebeda5548a6a20bf35e56aa8b7bce3f229d2c12789bf346e0b9a
                                        • Opcode Fuzzy Hash: d8bdeb87a8631300c3fef7b7405dd7071bdecebcfa691e024f7b4587126d749b
                                        • Instruction Fuzzy Hash: 8D01AFB1701B4086EF269FA9A9A875632FCB748B84F10403DDE8C87B55DF3D84E58340
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 25425ccb6c87b66e7923e28144418a009784fd44be6d15fa51691ad4df885e27
                                        • Instruction ID: 2c840654cc10a2ec703ed5d1e3942a5c5ddfe01b8b5a2e50ae1716583c4383b7
                                        • Opcode Fuzzy Hash: 25425ccb6c87b66e7923e28144418a009784fd44be6d15fa51691ad4df885e27
                                        • Instruction Fuzzy Hash: 5D01A832210A9489CB44EFB2D850AEE37A6F794B9CF446016BA4E47B18CF74C595DB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f21b2ad953f11bd3813ea5922c5b1a76f1f3dbb64f2cc659bd3c0852c9c44d59
                                        • Instruction ID: 2903cc861fcd1c3dbeec7b1d0fac90be18eb976c1bfa54ae95979ee57ca9ff15
                                        • Opcode Fuzzy Hash: f21b2ad953f11bd3813ea5922c5b1a76f1f3dbb64f2cc659bd3c0852c9c44d59
                                        • Instruction Fuzzy Hash: E6F0C832701BA851FB569B15BD5474B369CB758FE5F004266DED81BBC8DF3884528344
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7e85fe103782232840bb8e4297862addda2d3ef7a8cab38930b298ccddd7ccd1
                                        • Instruction ID: 7615e9bbaaa413265fdbd238e84abbd387824418a5a7c190dbe2d7b91755ee45
                                        • Opcode Fuzzy Hash: 7e85fe103782232840bb8e4297862addda2d3ef7a8cab38930b298ccddd7ccd1
                                        • Instruction Fuzzy Hash: 8CF06862304B40CECB18FFB9C8501EE3762EB547C8B645425EA4D87B19DE2AC5519740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab45715fd224079492e3c8adb59841c3543c788a526f069b6961e297cf81663b
                                        • Instruction ID: a37124da089df02eee8ca7fc1553aca02ab4965467a40c0b8061990dcfaf820f
                                        • Opcode Fuzzy Hash: ab45715fd224079492e3c8adb59841c3543c788a526f069b6961e297cf81663b
                                        • Instruction Fuzzy Hash: F9B01214F03300825E0C73730C9315B00472BC4310F95C0608A06D1310FC2D80A23F81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AllocatorDefault$Process$CurrentSession
                                        • String ID: /iTunes_Control/iTunes/iTunesPrefs$AFCConnectionCreate failed$AFCFileRefOpen failed (0x%08X)$AFCFileRefRead failed (0x%08X)$AMDeviceConnect failed (0x%08X)$AMDeviceDisconnect failed (0x%08X)$AMDevicePair failed (0x%08X)$AMDeviceStartService failed (0x%08X)$AMDeviceStartSession failed (0x%08X)$AMDeviceStopSession failed (0x%08X)$CMobileDeviceListener::ShouldLaunchITunes()$DeviceClass$IDAMConfig$ReadIPodPrefsFile failed (0x%08X)$ReadIPodPrefsFile()$StartAFCService failed (0x%08X)$StartAFCService()$com.apple.afc$frpd$iPad$iPhone$iPod
                                        • API String ID: 4290606924-2229242306
                                        • Opcode ID: ffb21d7c695aebd7964d1d867e65381e4fb1564960902828b67369dd3a48e189
                                        • Instruction ID: cb445fc82b2b701ffdb94643f96404fa4fb1028dbf4d7b8306fce7aaa92de773
                                        • Opcode Fuzzy Hash: ffb21d7c695aebd7964d1d867e65381e4fb1564960902828b67369dd3a48e189
                                        • Instruction Fuzzy Hash: F3A17EF1A14B4181FA50AF25E9517EAE391AB85BC4F80103DE94A476EDEF2DC74B8703
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: memcpy_s$_invalid_parameter_noinfo
                                        • String ID: $ $%u.%u.%u.%u
                                        • API String ID: 2880407647-333474860
                                        • Opcode ID: 37302c880c3373059cb8d03f5e94873b4cdb5fc3cfa3a9e2d99862e06c4b6e40
                                        • Instruction ID: ea657f15b5f5f5f54e3fda3bb5936a3a809fb38113518552e7a3e5fe0007f701
                                        • Opcode Fuzzy Hash: 37302c880c3373059cb8d03f5e94873b4cdb5fc3cfa3a9e2d99862e06c4b6e40
                                        • Instruction Fuzzy Hash: 1103C3B2A112C08FE7758F25E9507EEB7A5F764788F009129EA0A57B9CD735DB02CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileFind$ByteCharCloseCriticalEnterFirstMultiNextSectionWide$CreateCurrentPointerThread
                                        • String ID: %s\*$%s\DCIM\%s$%s\DCIM\*$1394\apple$CQueryCancelAutoPlay::AllowAutoPlay() - Device hardware ID is %s$CQueryCancelAutoPlay::AllowAutoPlay() - GetDeviceHardwareIDForDiskDrive() failed$CQueryCancelAutoPlay::AllowAutoPlay() - allowing autoplay$CQueryCancelAutoPlay::AllowAutoPlay() - allowing autoplay due to photos/video$CQueryCancelAutoPlay::AllowAutoPlay() - disabling autoplay$CQueryCancelAutoPlay::AllowAutoPlay() - path = %s$CQueryCancelAutoPlay::DirectoryHasPhotos() - found photo file "%S"$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\QueryCancelAutoPlay.cpp$JPG$MOV$MP4$pszVolumePath != NULL$sbp2\apple$usbstor\diskapple
                                        • API String ID: 856764332-2576380498
                                        • Opcode ID: 8dca3533f24add9705210e7ef3250922d93146d7b336a4a8a7e9003adce5ce03
                                        • Instruction ID: dcbcf1c8e671bea43089fd0a83be04c924815de51c96283040397ba6293c0688
                                        • Opcode Fuzzy Hash: 8dca3533f24add9705210e7ef3250922d93146d7b336a4a8a7e9003adce5ce03
                                        • Instruction Fuzzy Hash: A7C180B5A11A80C5EB20DF25E8407D9F3A5F7547A8F84433AEA29476DDDB39C70AC302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CreateFile$CriticalEnterEventHandleModuleSection$MessageThread$CloseCurrentName$ByteCharClassDispatchMultiObjectObjectsOpenPointerQueryResumeSingleTranslateValueWaitWide
                                        • String ID: ./iTunesHelperLog.txt$12.12.9.4$CItunesHelperModule::Run() - Registered for AutoPlay Cancelling successfully!$CItunesHelperModule::Run() - Registered with IPodService successfully!$CItunesHelperModule::Run() - SHUTTING DOWN!$CItunesHelperModule::Run() - Started the MobileDevice listener successfully!$CItunesHelperModule::Run() - Started the helper listener successfully!$MonitorExtShutdownRequest$RegisterIQueryCancelAutoplay failed!!$iTunesHelper version: %s
                                        • API String ID: 3227733304-831640750
                                        • Opcode ID: a841b3e6b0e8f9473a6691708c9d0c3eeb4914b4072dfb395cf6a9eb80851c73
                                        • Instruction ID: f8eed4d85ec76a2f5facd21e44a62c67e7069eab98a66ff9e7c79373bcb6f044
                                        • Opcode Fuzzy Hash: a841b3e6b0e8f9473a6691708c9d0c3eeb4914b4072dfb395cf6a9eb80851c73
                                        • Instruction Fuzzy Hash: AE816FB1E00B4582FB50AF65E8517E9A392EB84B44F48443DE949436EEEE39C74BC313
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: String$Free$ByteCharMultiWide$BstrCloseHandleLibrary$AddressAllocCreateErrorExceptionFileHeaderLastLoadProcProcessRaise
                                        • String ID: LaunchApp()$Launching iTunes FAILED! Last error = %d
                                        • API String ID: 1820409946-2021163453
                                        • Opcode ID: dd8e8bd76365ef0acc3ad98bb9ebcd124b38134f4b31957367bb96cc906e41b2
                                        • Instruction ID: d21ebd8ad3bbd83f764120e52980b8de6d5d7a527ab24638461a2d780e26091a
                                        • Opcode Fuzzy Hash: dd8e8bd76365ef0acc3ad98bb9ebcd124b38134f4b31957367bb96cc906e41b2
                                        • Instruction Fuzzy Hash: C9A152B6A00B8186F7149F21D8403E9B3A5F794798F04563EEA5A47BDCDF39C65AC302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: File$AddressCriticalEnterLibraryPathProcSection$AppendByteCharCreateCurrentErrorFreeLastLoadModuleMultiNameRemoveSpecThreadWide
                                        • String ID: !iTunes$ITUWP_LaunchITunesApp$ITUWP_LaunchWindowsStoreApp$LaunchApp()$LaunchStoreApp()$Launching %s$Launching iTunes (Store)$iTunesUWP.dll
                                        • API String ID: 471342995-1849230143
                                        • Opcode ID: 6676378a911c4ab0c17924663ccb58b133300766b24a30abb92e964e73fdd41f
                                        • Instruction ID: d4a078e53d5f87ac7611e5080c5990971012646e013add9b5c04c53d988e1a2a
                                        • Opcode Fuzzy Hash: 6676378a911c4ab0c17924663ccb58b133300766b24a30abb92e964e73fdd41f
                                        • Instruction Fuzzy Hash: 5B417DB1A05B8585FA609F21E8407EAA351FB45B94F44103DAA4E477A8EF3CC34BC701
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $ $D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\DeviceUtilitiesW32.cpp$deviceInfoSet != INVALID_HANDLE_VALUE$deviceInfoSet != NULL$drivePath != NULL$hardwareID != NULL$status$status && dwBytes != 0 && dwBytes < sizeof(spdiddBuffer)
                                        • API String ID: 0-1910626470
                                        • Opcode ID: a1d823287b879730fa888e56055def56d5764e75485ddf83e1af861f1919742d
                                        • Instruction ID: 45cdd3589d622890728d1bd12ea3ab522a27893ed2b7d34be2cb63393431a941
                                        • Opcode Fuzzy Hash: a1d823287b879730fa888e56055def56d5764e75485ddf83e1af861f1919742d
                                        • Instruction Fuzzy Hash: 9D8183B6B14B8185F720CF20E8407DAA764F795798F901239EA4947ADDDF79C34ACB01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 808467561-2761157908
                                        • Opcode ID: 6ae264541e756970514cfb8374d4aed9e44816f913b83c599fbcc441da964d90
                                        • Instruction ID: e4085ec2091034669c0a863042098819959a8c28d7e5ee0f01c4d24296333363
                                        • Opcode Fuzzy Hash: 6ae264541e756970514cfb8374d4aed9e44816f913b83c599fbcc441da964d90
                                        • Instruction Fuzzy Hash: 4AB2EFB2E103818BE7658F68D540BEDB7A1F354788F605239DA0A57E8CD735DB0ACB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalEnterFileSection$ClassCreateCurrentErrorHandleInitializeLastModulePointerRegisterThread
                                        • String ID: CItunesHelperMsgListener::DoMsgPump()$CItunesHelperMsgListener::DoMsgPump() - Thread EXIT$Failed to initialize COM!
                                        • API String ID: 30167652-1099895065
                                        • Opcode ID: 281426bffe93f4021ecd7fac14e311f3bcfb85454697e50211b08bbec54f0d9f
                                        • Instruction ID: 63d5a3d0589965066b786c800218e4ad2c66985fd5fc157eef2f50237401aee2
                                        • Opcode Fuzzy Hash: 281426bffe93f4021ecd7fac14e311f3bcfb85454697e50211b08bbec54f0d9f
                                        • Instruction Fuzzy Hash: C84142B2A14BC581F7309F24F8517EAB3A5F798740F444139E58943A99DF7DC28AC741
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\DeviceUtilitiesW32.cpp$deviceInfoData != NULL$deviceInfoSet != NULL$pid_$productID != NULL$success$usb\$vendorID != NULL$vid_
                                        • API String ID: 0-2922642032
                                        • Opcode ID: 13e7816a43c8fcb64b4dd7a58fb29dd1463b4c2195ee8bca53f1dfa0632dc1f0
                                        • Instruction ID: b1aa30e0deedf1a13eb86c28adb8298f0928460d186237da5d57697344962314
                                        • Opcode Fuzzy Hash: 13e7816a43c8fcb64b4dd7a58fb29dd1463b4c2195ee8bca53f1dfa0632dc1f0
                                        • Instruction Fuzzy Hash: D5417CB6B14B4191FB609F20E8817D9E360FB95754F84413AA90947BEDEF79C70AC702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Handle$CloseErrorInitializeLast$CommandCreateCriticalCurrentEventLineModuleNameSectionThreadUninitializeUser
                                        • String ID: Mscoree.dll
                                        • API String ID: 1789185286-4150509846
                                        • Opcode ID: 82f0d0863addba462c51383d29244683d30cbdb968aeaae6b9861de5197e7c29
                                        • Instruction ID: 8dc8f3e9bd9616dd3b418fd7ae40a14222728cde15db95544a84827b7ef25904
                                        • Opcode Fuzzy Hash: 82f0d0863addba462c51383d29244683d30cbdb968aeaae6b9861de5197e7c29
                                        • Instruction Fuzzy Hash: 46419EB1A04B8482FB619F61E8013E9A3A1F789B54F44413DE649437D9DF3DC20BCB12
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\DeviceUtilitiesW32.cpp$enumerationProc != NULL$enumerator != NULL$success || (GetLastError() == ERROR_NO_MORE_ITEMS)
                                        • API String ID: 0-2046212529
                                        • Opcode ID: 60e2ac8267961a4f1a645438f9f36b85014625ce7cf50f0e481083618a58c81e
                                        • Instruction ID: 966382c4368efc4294b3eeb9bca40df487538ed0d436d41ec5102e0a13f00e4b
                                        • Opcode Fuzzy Hash: 60e2ac8267961a4f1a645438f9f36b85014625ce7cf50f0e481083618a58c81e
                                        • Instruction Fuzzy Hash: 1F318FB2F0474082FA209B24F4517EAA361F795B94F845229EA5D46ADDDF2DC3878B02
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\DeviceUtilitiesW32.cpp$deviceNumber != NULL$drivePath != NULL$hVolume != INVALID_HANDLE_VALUE$success
                                        • API String ID: 0-1709165609
                                        • Opcode ID: 282b79c589075b2d3a4d4d66b65f61de22bea39a0fa44490ac5fc2bfb5f6234a
                                        • Instruction ID: 8b771c24171302968288be045c740f8156b47f44d49b97e4c417ba1646b430d3
                                        • Opcode Fuzzy Hash: 282b79c589075b2d3a4d4d66b65f61de22bea39a0fa44490ac5fc2bfb5f6234a
                                        • Instruction Fuzzy Hash: AC51A6B6A1474086E760DF21F8507DAF360F7957A0F404239EA9943BDCDB38C64ACB02
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: 0$f$f$p$p$f
                                        • API String ID: 3215553584-303101543
                                        • Opcode ID: de791896a9bdf1ac1a8c9b884b9349600cbad056898ab333e94f32d9097e201c
                                        • Instruction ID: e90eb28df3320ad23ec3bba0073527e5834b02ad8182d7e5ded2b5d486a86cc3
                                        • Opcode Fuzzy Hash: de791896a9bdf1ac1a8c9b884b9349600cbad056898ab333e94f32d9097e201c
                                        • Instruction Fuzzy Hash: 6D42ADB2E0464182FB749E15F1443E9B3A5F3A0B50F94453AE6ED47ACCDB38CA9AC750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                        • String ID: !App$nzyj5cx40ttqa
                                        • API String ID: 3936042273-459544931
                                        • Opcode ID: fd29b9d5983ebf8339565e5fd4bca1a13b84b592da347803a8e946e19208cc19
                                        • Instruction ID: c9db48c18c83016a67c7b6367a6a2b08fd0de3d68d3105aae30cbed76e485a41
                                        • Opcode Fuzzy Hash: fd29b9d5983ebf8339565e5fd4bca1a13b84b592da347803a8e946e19208cc19
                                        • Instruction Fuzzy Hash: 17B1A672A14B8481FB10DF65E4403DEA761E7857E4F505329FAAD17BEADB78C282C702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • CItunesHelperModule::ConnectToService() - FAILED to create instance of the service!, xrefs: 000000013FBD1F0A
                                        • CItunesHelperModule::ConnectToService() - FAILED to log onto the service!, xrefs: 000000013FBD203A
                                        • CItunesHelperModule::ConnectToService() - FAILED to connect to the service!, xrefs: 000000013FBD1FAF
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: String$AllocCreateFreeInstance
                                        • String ID: CItunesHelperModule::ConnectToService() - FAILED to connect to the service!$CItunesHelperModule::ConnectToService() - FAILED to create instance of the service!$CItunesHelperModule::ConnectToService() - FAILED to log onto the service!
                                        • API String ID: 391255401-963199552
                                        • Opcode ID: 23cce98a9dc05818c2ed7a1637814fcb20c9e876ea27763ce566468d7959161c
                                        • Instruction ID: 308418bfa980eba19d56560b48fccf6ac7b640f0417c7e7045f9a6db22bc3ad5
                                        • Opcode Fuzzy Hash: 23cce98a9dc05818c2ed7a1637814fcb20c9e876ea27763ce566468d7959161c
                                        • Instruction Fuzzy Hash: 89616EB6A00B4582FB159F69D4503D9A3A1F784B94F54803AEB4E877A8DF3DC64AC302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Findlstrlen$CloseFileFirst
                                        • String ID: GetLongPathNameW$kernel32.dll
                                        • API String ID: 895237040-568771998
                                        • Opcode ID: f3af13454452512150709e4749a4765079f448c9bd14dbbcd07e410b59d875df
                                        • Instruction ID: 5eefd7333b7201abc1b9facb0035c1d22e367a176d82e67650c9763bfa7dc34b
                                        • Opcode Fuzzy Hash: f3af13454452512150709e4749a4765079f448c9bd14dbbcd07e410b59d875df
                                        • Instruction Fuzzy Hash: 97518F23700A8495CB11DF35E8503DA27B1F745BDCF69922A9E1E4BB5CEB7DC4A58340
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 3140674995-0
                                        • Opcode ID: 12475bb690deb7294557565fbedf595a6b859d4afcbed29b979c01c53c1f48c3
                                        • Instruction ID: 066a08838cdcce18be2f7417c74e5023138997492531fcb8c27fd1707efc6191
                                        • Opcode Fuzzy Hash: 12475bb690deb7294557565fbedf595a6b859d4afcbed29b979c01c53c1f48c3
                                        • Instruction Fuzzy Hash: CA314BB2605B80CAEB609F64E8443EEB365F784754F44442EEA4E47B99EF38C649C711
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _get_daylight.LIBCMT ref: 000000013FBF2D15
                                          • Part of subcall function 000000013FBF260C: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF2620
                                          • Part of subcall function 000000013FBEF990: HeapFree.KERNEL32 ref: 000000013FBEF9A6
                                          • Part of subcall function 000000013FBEF990: GetLastError.KERNEL32(?,?,000000013FBEF11F,000000013FBF6AA2,?,?,?,000000013FBF6ADF,?,?,00000000,000000013FBF6FA5,?,?,?,000000013FBF6ED7), ref: 000000013FBEF9B0
                                          • Part of subcall function 000000013FBEDBD4: IsProcessorFeaturePresent.KERNEL32 ref: 000000013FBEDBDD
                                          • Part of subcall function 000000013FBEDBD4: GetCurrentProcess.KERNEL32(?,?,?,?,000000013FBEDB83,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBEDC02
                                          • Part of subcall function 000000013FBF8C04: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF8B4F
                                        • _get_daylight.LIBCMT ref: 000000013FBF2D04
                                          • Part of subcall function 000000013FBF266C: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF2680
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F7A
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F8B
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F9C
                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,000000013FBF31DC), ref: 000000013FBF2FC3
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                        • String ID:
                                        • API String ID: 4070488512-0
                                        • Opcode ID: 82b9ba2e1b88c1f3a2399e510979319977c3b60afc73acfeb687eb6c53c08a29
                                        • Instruction ID: 5c1f1ce70596b76b8b44b05f288ba19435a0ba3e8214ebf3025431dd7ae4a2e0
                                        • Opcode Fuzzy Hash: 82b9ba2e1b88c1f3a2399e510979319977c3b60afc73acfeb687eb6c53c08a29
                                        • Instruction Fuzzy Hash: A3D1E1B6F1034086EB24EF35D8517E9A765F784B84F44803EEE8947A9ADB3AC657C700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 1405656091-0
                                        • Opcode ID: 8410a52a456c6869b3aee147b9b0b53b82a61bd195df82e7f6573e6a503da9da
                                        • Instruction ID: 6a88b9678e4682c8f9c644bc4631790f0c2955dfa046563b38742dc14551ca2d
                                        • Opcode Fuzzy Hash: 8410a52a456c6869b3aee147b9b0b53b82a61bd195df82e7f6573e6a503da9da
                                        • Instruction Fuzzy Hash: D581C6F2F003458BEB588F39C9517E8B7A1E754B88F08913DDA098A78DEB39D646C750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                        • String ID:
                                        • API String ID: 1239891234-0
                                        • Opcode ID: 50be9513a6108a2b2545f041795edc1a2c842a50c6573b064a2f1a46a5c336c7
                                        • Instruction ID: 4c6a6cae791aa1cc275ce3040fa05fc23b061f6f5f5a7e9435d2a182628264dc
                                        • Opcode Fuzzy Hash: 50be9513a6108a2b2545f041795edc1a2c842a50c6573b064a2f1a46a5c336c7
                                        • Instruction Fuzzy Hash: 45316476614F8086EB60CF25E8443EEB3A4F789794F54012AEA9D43B9DDF39C656CB00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Locale$Info$Valid
                                        • String ID: -;k
                                        • API String ID: 1826331170-387235514
                                        • Opcode ID: f77ff24fd46e7cd3c1bd0865a42a23233e8a74bd96ce10285b0f872ff9c8adfa
                                        • Instruction ID: 44c9fa927896a14fcb9a84af76a6237921b7fbdd7d4a3154f0a3a6afc8d839ac
                                        • Opcode Fuzzy Hash: f77ff24fd46e7cd3c1bd0865a42a23233e8a74bd96ce10285b0f872ff9c8adfa
                                        • Instruction Fuzzy Hash: 4941A976200A8489DB14CFB4D8517E93772F744B9DFA0001BEA5D87BA8DB3AC5A5C351
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 000000013FBD9A8B
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: DebugDebuggerErrorLastOutputPresentString
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 389471666-631824599
                                        • Opcode ID: e3e9938227c5c3d6e1ae55f664b7d3a284c29ecf403f2d98628c055ce3444f01
                                        • Instruction ID: 2dba34b652c73fd9b83e56e6c18f8bd6ab9fef9ebd2176b7ab1da423eeb19752
                                        • Opcode Fuzzy Hash: e3e9938227c5c3d6e1ae55f664b7d3a284c29ecf403f2d98628c055ce3444f01
                                        • Instruction Fuzzy Hash: 9511C272B10B81A7F7449F22E6503E973A4FB08344F40813CD64983AA8EF38D67AC702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F7A
                                          • Part of subcall function 000000013FBF266C: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF2680
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F8B
                                          • Part of subcall function 000000013FBF260C: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF2620
                                        • _get_daylight.LIBCMT ref: 000000013FBF2F9C
                                          • Part of subcall function 000000013FBF263C: _invalid_parameter_noinfo.LIBCMT ref: 000000013FBF2650
                                          • Part of subcall function 000000013FBEF990: HeapFree.KERNEL32 ref: 000000013FBEF9A6
                                          • Part of subcall function 000000013FBEF990: GetLastError.KERNEL32(?,?,000000013FBEF11F,000000013FBF6AA2,?,?,?,000000013FBF6ADF,?,?,00000000,000000013FBF6FA5,?,?,?,000000013FBF6ED7), ref: 000000013FBEF9B0
                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,000000013FBF31DC), ref: 000000013FBF2FC3
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                        • String ID:
                                        • API String ID: 3458911817-0
                                        • Opcode ID: 59062b4e37cc9b53793044b4a1b077f89ea97d06a1955940054fc5849b73f1b2
                                        • Instruction ID: 1359aceb7edb3627dbc49608245e26ff08ae762bb73fa322e7d5a2f1ba4a89ab
                                        • Opcode Fuzzy Hash: 59062b4e37cc9b53793044b4a1b077f89ea97d06a1955940054fc5849b73f1b2
                                        • Instruction Fuzzy Hash: 1F519EB2E1074486E720EF36E8807D9B764F788B84F44513EEA4983B9ADB39C657C750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: memcpy_s
                                        • String ID:
                                        • API String ID: 1502251526-0
                                        • Opcode ID: fe19abcd7e1bf5b9e82a49bcafccde751bd931cd582c908edc37772ec6748bf4
                                        • Instruction ID: c77a02f9fed45a6daddb5de5f9d1486e73f6270f16891aca559cb231e8c1057c
                                        • Opcode Fuzzy Hash: fe19abcd7e1bf5b9e82a49bcafccde751bd931cd582c908edc37772ec6748bf4
                                        • Instruction Fuzzy Hash: B1C1D4F2B1468487EB258F19F0447AAF7A1F3A4B84F449139DB4E47748DB39DA02CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CurrentFeatureInformationPresentProcessProcessorTimeZone_get_daylight_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 341842238-0
                                        • Opcode ID: cf755bdbfef4c21fdeb246fa0357748b2cb5194f19ddbb773c5a0f943c67c445
                                        • Instruction ID: 34e32a620fb3683578568e7c676bff72cc4fba20e06a944ab60e48d3fecd7300
                                        • Opcode Fuzzy Hash: cf755bdbfef4c21fdeb246fa0357748b2cb5194f19ddbb773c5a0f943c67c445
                                        • Instruction Fuzzy Hash: E541E8B2A2478883E724CF65F4417D9F261F7A8380F509039EA5D87B99DB38C652CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise_clrfp
                                        • String ID:
                                        • API String ID: 15204871-0
                                        • Opcode ID: b1055f2cce8ae84ca75c8e1745ea063b0329257c0d4b4aa355951fd6155e3742
                                        • Instruction ID: 295d86d4da59e948fb99022785cea9136ef37e84fb65c401f40787f8853aa664
                                        • Opcode Fuzzy Hash: b1055f2cce8ae84ca75c8e1745ea063b0329257c0d4b4aa355951fd6155e3742
                                        • Instruction Fuzzy Hash: 65B1FEB7610B848BEB55CF29C44639CBBE0F384B98F158925DB5D877A8CB3AC596C700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-227171996
                                        • Opcode ID: af9557c00983384184fd98ee11ee014316785f63be58c8b93da245438e1a4d05
                                        • Instruction ID: 4594df3a8f7cb7ad9bd677b7c6c044386e4e769210ceb0841e6b689aaaf68c7b
                                        • Opcode Fuzzy Hash: af9557c00983384184fd98ee11ee014316785f63be58c8b93da245438e1a4d05
                                        • Instruction Fuzzy Hash: 99E1D6BAA00644C5EB68CE29E050BADB3A0F765B98F24523DDE4E0779CCB35CA53D740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: e+000$gfff
                                        • API String ID: 0-3030954782
                                        • Opcode ID: 425215baa9b04c8d2d7de8fcbfe02f5eb5271786d3b8914f7b34ff6cbdf8d195
                                        • Instruction ID: d8f620a8b16edfc2a807c5273f9d3c2fb0a9fce788822c574364c1fbe6c90246
                                        • Opcode Fuzzy Hash: 425215baa9b04c8d2d7de8fcbfe02f5eb5271786d3b8914f7b34ff6cbdf8d195
                                        • Instruction Fuzzy Hash: FB516BB2B147D446E725CF35E800799F791F384B94F48D639CBA44BAC9CB3AC64A8B01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: MZER
                                        • API String ID: 0-2424380061
                                        • Opcode ID: 11903d68c46551233222a239cc1d18bb6d955aba6b47dd20026dba22df9cae2f
                                        • Instruction ID: b169f8bb87bcac2498d991a43519538074303be761067f020c670123e1b2f717
                                        • Opcode Fuzzy Hash: 11903d68c46551233222a239cc1d18bb6d955aba6b47dd20026dba22df9cae2f
                                        • Instruction Fuzzy Hash: 3B02EF33A19BC496DB02CF25C4147AC7BA5F35A798F8A9312DEAA57342DB34D589E300
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8fd4c3b3c60a78ba12478ee89a3277b408eadafa19b0e5bcd66cee5dafdac5e
                                        • Instruction ID: 0fe25c1570e6ed46c679d68c8165d55f0a8f5583a2ac3b8bb53d2e529be3185c
                                        • Opcode Fuzzy Hash: f8fd4c3b3c60a78ba12478ee89a3277b408eadafa19b0e5bcd66cee5dafdac5e
                                        • Instruction Fuzzy Hash: E351D372B0479085FB109F76E8407DABBA5F7447D8F144228AE5867B9DCB39C646C700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: gfffffff
                                        • API String ID: 0-1523873471
                                        • Opcode ID: 3b2d617dece93885bed796e50f75cca4452f93044819b7efed569ac6f0124d8d
                                        • Instruction ID: 2e87ba9a63dfc7f214551ab105a449164477eb4bc9fa43053c9512ca99494de6
                                        • Opcode Fuzzy Hash: 3b2d617dece93885bed796e50f75cca4452f93044819b7efed569ac6f0124d8d
                                        • Instruction Fuzzy Hash: 67A144B2F097C486EB21CF29E4507DABBA1E754BD4F048139DE8947799DA3EC60AC701
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: b85aad14a30d38087b4c1c541ffffebabe0fb3e021c07450f80c32cae8d59637
                                        • Instruction ID: d25a3147876d35b7c56508cb4d4b1c02ec8a9867545073472300c659d1f95732
                                        • Opcode Fuzzy Hash: b85aad14a30d38087b4c1c541ffffebabe0fb3e021c07450f80c32cae8d59637
                                        • Instruction Fuzzy Hash: 26B09230E03B45C2EB482B11AC8274423E8BB88B10F99203CC00C80320EA2C02FA5700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cadb9a25bdad7f8ad675ccd0a6728a0d9943c25a205c963af29415434ac258d9
                                        • Instruction ID: 46006fee19b4287f4746e606e2c34a271cffec746ca9e48edcc5dd91e7d09962
                                        • Opcode Fuzzy Hash: cadb9a25bdad7f8ad675ccd0a6728a0d9943c25a205c963af29415434ac258d9
                                        • Instruction Fuzzy Hash: EB923732654AC48ACB30DF39C8503DA3761F745BDCF20416ADA5D8BB99EB3AD951C780
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20e3e8f8bd9ce02589b53e78a26befe79145d09a21f9a2de836bef605702294b
                                        • Instruction ID: a5ab83ca72273ce091287d09fcb2db94270c417b209ddcb89b872616ccec6b1d
                                        • Opcode Fuzzy Hash: 20e3e8f8bd9ce02589b53e78a26befe79145d09a21f9a2de836bef605702294b
                                        • Instruction Fuzzy Hash: 8ED1CFBAA00644C6EB68CE29E550BADB7A0F765B48F24423DCE0E476DDCB35CA57C740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 451b66544a734845406f178eca876b0f837a8b694a25782287d6be948b125704
                                        • Instruction ID: be835e525abbe7624e2678f1a9c4d5c6c6a5c30c5f2a5ac53b4032dafc5c3e03
                                        • Opcode Fuzzy Hash: 451b66544a734845406f178eca876b0f837a8b694a25782287d6be948b125704
                                        • Instruction Fuzzy Hash: 549137B6B1428586FE284E25F4107F9969CBB72798F04013D9E6E477CADA38CB0B9701
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8688c0a2105936b2d26bca3483672b5af4039eda03cb02284d6d97dcf697a26
                                        • Instruction ID: 83a6f3c6396082920e77f4dbfe36200ea711c146571b0d110a64a5974e7d5bb7
                                        • Opcode Fuzzy Hash: e8688c0a2105936b2d26bca3483672b5af4039eda03cb02284d6d97dcf697a26
                                        • Instruction Fuzzy Hash: B3B181B6A0478485E7648F39E4543ACBFA5E365F48F2C6139CB8E47399CB36C642C760
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 490781c5b2d53e8886da94cb151c7f2d74b14f5f64342994769c56955948a435
                                        • Instruction ID: 326247da6313950667077f0682c8fdd98304cf48b18be0c5d9d19a8763515675
                                        • Opcode Fuzzy Hash: 490781c5b2d53e8886da94cb151c7f2d74b14f5f64342994769c56955948a435
                                        • Instruction Fuzzy Hash: EA81D6B2A0478086E774CF1AD4403AAF691F3467D4F54863DDA9947B9DDB3EC64A8B00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d14e1479904656f2dc463e089184b3eab9b6b0fbe432195a0a353565b7517f1
                                        • Instruction ID: 2b1cb44b090b355ce10731c2b0a0b850d2cfb18ead38e6272628295a0bad88da
                                        • Opcode Fuzzy Hash: 0d14e1479904656f2dc463e089184b3eab9b6b0fbe432195a0a353565b7517f1
                                        • Instruction Fuzzy Hash: 8D5172B6E10A6086E7248F29E050398B7A0E769B68F284129DECD177D8C736DE43C780
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1c95aa000ad309a6844e625ce236abce253ecac2a8144127c847e48f7425a749
                                        • Instruction ID: ae636577350660ab9741ad1a0eb818274c19389d9f31c3eb50811f3cce72324b
                                        • Opcode Fuzzy Hash: 1c95aa000ad309a6844e625ce236abce253ecac2a8144127c847e48f7425a749
                                        • Instruction Fuzzy Hash: F45195B6E1065086E7248F29E45079CB7A0E365F68F245229CECD177ACD736DE53C740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18a2d878bb1d74cd29265bf6b911c0be47c6fff7617a8a21d6fdeb7896ff60f1
                                        • Instruction ID: 9dbf6bbd68de3a7613cbb39b80e56c6f1addf9bc14fb0c92c826fb0941131684
                                        • Opcode Fuzzy Hash: 18a2d878bb1d74cd29265bf6b911c0be47c6fff7617a8a21d6fdeb7896ff60f1
                                        • Instruction Fuzzy Hash: 495194B6F10A5086E7348F29E0503A8B7A0E764F68F249229DE8D577ADC736DE43C740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4867b7e076116c38dbbc844cfa205fcff6898b475413c6d8616e12d5beac6ff7
                                        • Instruction ID: 1c43a54593bf41f4b78e7dd705854d97fcd7af57d91fb5ba71613b8c2a2b3180
                                        • Opcode Fuzzy Hash: 4867b7e076116c38dbbc844cfa205fcff6898b475413c6d8616e12d5beac6ff7
                                        • Instruction Fuzzy Hash: 015170B6E2065086E7248F29E15039DB7B0E768F58F245129CF8D177A8D736DA47C780
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fbcabbd989d1571db375c3d331aa933e063059400eede78d49dd596729ccc97a
                                        • Instruction ID: f784bbbd02b66dd9dd006d049c01c2f808c27c0d8750b19153fecd2bb24e554f
                                        • Opcode Fuzzy Hash: fbcabbd989d1571db375c3d331aa933e063059400eede78d49dd596729ccc97a
                                        • Instruction Fuzzy Hash: 4D51A4B6E1065086EB248F29E440398B7A0E768F58F285139CECD577ACD736DE53C780
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3218e4cdb86e5d9cf733c388ad54f5882477934b112a1d460d025d42eeb202bd
                                        • Instruction ID: 1111c7cd14a2b8610f6f2cc3a5960c31833a0fc2b12a6990c6b6b1818ea04134
                                        • Opcode Fuzzy Hash: 3218e4cdb86e5d9cf733c388ad54f5882477934b112a1d460d025d42eeb202bd
                                        • Instruction Fuzzy Hash: 475182B6F1065086E7258F29E040398B7A0E364F58F249129CF8D57BA8C736DE53C780
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 485612231-0
                                        • Opcode ID: a82362e14e8f2afc2adb26396007c59266723cea2ede52880bf84144d3cec933
                                        • Instruction ID: 41113e88ae7daa4a42fe1f28002f890425f25c19db95210f26ad9ab48c134015
                                        • Opcode Fuzzy Hash: a82362e14e8f2afc2adb26396007c59266723cea2ede52880bf84144d3cec933
                                        • Instruction Fuzzy Hash: C841C072710A5882EF04CF2AE914799A3A1F759FD4F49A03ADE0D87B58DB3DC6838300
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a518d5da21608cb97e35cf1ff8a4e21db4925d473fcd560f62d7b0e1e9313c1e
                                        • Instruction ID: d55e5bcbb36374eecad5a8244ffc8b812703515a9dadd5baf94f76cd4405c04e
                                        • Opcode Fuzzy Hash: a518d5da21608cb97e35cf1ff8a4e21db4925d473fcd560f62d7b0e1e9313c1e
                                        • Instruction Fuzzy Hash: BA3188F6F4414086FABADE2DF5157FDD242A7B2340E24E039850E02ACDD9328B47DA05
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7641a39fc344002821f6cbb68519c9d40a52b2246b9ee317d9faeaf8a0d8ac3a
                                        • Instruction ID: 6a4aa57bf2663c05f04a30712f537c560ff36eaccf59f41fdaf661f88e15f780
                                        • Opcode Fuzzy Hash: 7641a39fc344002821f6cbb68519c9d40a52b2246b9ee317d9faeaf8a0d8ac3a
                                        • Instruction Fuzzy Hash: 93F096B1B242988FEBA4CF2CA842B5977D4F3083C0F90D02DD68983B14D23CC1A58F04
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a2bef048be4368f2bf434bc2a64eaacddf25c1e4a4c8753777b4c9b7fa3d335
                                        • Instruction ID: 22a8ca0fc00c3789d6646d3e78be6935b6325b146e4de2001f8311aa332766e5
                                        • Opcode Fuzzy Hash: 6a2bef048be4368f2bf434bc2a64eaacddf25c1e4a4c8753777b4c9b7fa3d335
                                        • Instruction Fuzzy Hash: 35A002B1914F00D6F706AF49E8947A0B374E390700F505039D00D410A99B7DD746D302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalFileSection$EnterLeave$BuffersCloseCreateCurrentDebugFlushHandleOutputPointerStringThreadWrite
                                        • String ID: - $ASSERT$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\Common\Windows\WinUtils.cpp$ERROR$INFO$TRACE$[%s: 0x%X,%s %s] $[%s: 0x%X,%s %s] %s%s$heapSetInfoResult
                                        • API String ID: 3861094109-4140787627
                                        • Opcode ID: 651c027d74c65a6263f94b30e7d1a5bf29b675d3d7d8ae4fe32cc4dadeda3832
                                        • Instruction ID: 3388e8c6e632e2617820d5cc8708422dd0a0660564d58f4bac63a0edf8bc3d5e
                                        • Opcode Fuzzy Hash: 651c027d74c65a6263f94b30e7d1a5bf29b675d3d7d8ae4fe32cc4dadeda3832
                                        • Instruction Fuzzy Hash: 2781B1B2A04B8495F764DF24E8443D9B7A1F785754F84413AEA8D43AE8DF38C74AC702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • CItunesHelperMsgListener::Launch_iTunes() - disable auto-sync pref is set., xrefs: 000000013FBD35F7
                                        • CItunesHelperMsgListener::Launch_iTunes() - iTunes is disabled., xrefs: 000000013FBD3529
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Close$OpenQueryValue$HandleNextObjectProcess32SingleWait_mbsupr
                                        • String ID: CItunesHelperMsgListener::Launch_iTunes() - disable auto-sync pref is set.$CItunesHelperMsgListener::Launch_iTunes() - iTunes is disabled.
                                        • API String ID: 1732688491-1434908751
                                        • Opcode ID: 88133a470000aa627b36eab0d58adf8d3e7a6985b0c3c93d42897e15bce4ab70
                                        • Instruction ID: 04abd51b5656504280c0080a5465da9bff813f00a866c9cc9931b16e135bfdee
                                        • Opcode Fuzzy Hash: 88133a470000aa627b36eab0d58adf8d3e7a6985b0c3c93d42897e15bce4ab70
                                        • Instruction Fuzzy Hash: 0F8170B2614B8086FB508F25E8407DAF3A4F785794F481239FA5947BE9DB3CC646CB02
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: String$ByteCharFreeMultiWide$CriticalEnterSection$AllocCreateCurrentFileThread_mbsupr
                                        • String ID: CItunesHelperMsgListener::OnExtendedFunction()$CItunesHelperMsgListener::OnExtendedFunction() - Preparing to launch iTunes$CItunesHelperMsgListener::OnExtendedFunction() - data = '%s'$Launch_iTunes$itunes
                                        • API String ID: 4203419553-3816678462
                                        • Opcode ID: 6603e43dbdbccae5bb97ff5f574226b50ca0722a13fd68f04a6a5da27b8198d7
                                        • Instruction ID: 61e57c8830b4f7afcbbf1983f6990a6b3085e5a859f8b4c309c3276be7e683f5
                                        • Opcode Fuzzy Hash: 6603e43dbdbccae5bb97ff5f574226b50ca0722a13fd68f04a6a5da27b8198d7
                                        • Instruction Fuzzy Hash: 796182B1A00B4486E714DF25E8403D8B3A5F744BA4F48863DEA6A437EDDF39C65AC352
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue$AddressLibraryLoadProc
                                        • String ID: %u.%u.%u.%u$MobileDeviceDLL$Software\Apple Inc.\Apple Mobile Device Support$Software\Apple Inc.\Apple Mobile Device Support\Shared$Version$iTunesMobileDeviceDLL
                                        • API String ID: 2856088927-4137113213
                                        • Opcode ID: c9710c51cc260f4ee756a6e3364fe724c798afddd0a31a04343ddc03ef3ef026
                                        • Instruction ID: 3cdcd4932c841a10f45733f31eed643dffa37ae580df6247b2a691b80f8ad755
                                        • Opcode Fuzzy Hash: c9710c51cc260f4ee756a6e3364fe724c798afddd0a31a04343ddc03ef3ef026
                                        • Instruction Fuzzy Hash: 88516371A04B8586EB60CF65E4847DAB7A4F785754F50012AE68D03BACDF7CC24ACB05
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$File$EnterLeave_invalid_parameter_noinfo$BuffersCloseCreateCurrentDebugFlushHandleInitializeOutputPointerStringThreadWrite
                                        • String ID: INFO$[%s: 0x%X,%s %s]
                                        • API String ID: 2962677655-4160259991
                                        • Opcode ID: a1615ec9b57dfa6a22961f30f6e983a334291a51d72d94be4403d2074437145f
                                        • Instruction ID: a30f80591e8c8cf7fab3e290774c47e5c09af33c142647df01ecb36bd686fb42
                                        • Opcode Fuzzy Hash: a1615ec9b57dfa6a22961f30f6e983a334291a51d72d94be4403d2074437145f
                                        • Instruction Fuzzy Hash: 8A712072908BC185E730DF25E4403EAB7A5F795794F44422AEACD07AADDF38C64ACB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$File$EnterLeave_invalid_parameter_noinfo$BuffersCloseCreateCurrentDebugFlushHandleInitializeOutputPointerStringThreadWrite
                                        • String ID: INFO$[%s: 0x%X,%s %s]
                                        • API String ID: 2962677655-4160259991
                                        • Opcode ID: 1d852b3241893626fec8d0eaa7edd929a76c73f73bbdbd357384ef9149a24c25
                                        • Instruction ID: 1a73b8f5b7e0d030b9087f4413f835b5a144fb90a0cd87a1630603b15629f328
                                        • Opcode Fuzzy Hash: 1d852b3241893626fec8d0eaa7edd929a76c73f73bbdbd357384ef9149a24c25
                                        • Instruction Fuzzy Hash: F6713D72A08BC585E720DF21E4403EAB7A5F795794F444229EACD07AADDF38C74ACB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$File$EnterLeave_invalid_parameter_noinfo$BuffersCloseCreateCurrentDebugFlushHandleInitializeOutputPointerStringThreadWrite
                                        • String ID: ASSERT$[%s: 0x%X,%s %s]
                                        • API String ID: 2962677655-1579289482
                                        • Opcode ID: 79247e0e9bdd33d7744d59c28bcda40c9adeceb919d28564542434fe61ca4915
                                        • Instruction ID: b559f43743f23898e3014454ac69f6e561b870ecfa1f6e0474cfbb63ed4f3f38
                                        • Opcode Fuzzy Hash: 79247e0e9bdd33d7744d59c28bcda40c9adeceb919d28564542434fe61ca4915
                                        • Instruction Fuzzy Hash: 05713E72A08BC185E720DF21E4403DAB7A5F795794F44422AEACD07AADDF38C74ACB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$File$EnterLeave_invalid_parameter_noinfo$BuffersCloseCreateCurrentDebugFlushHandleInitializeOutputPointerStringThreadWrite
                                        • String ID: ERROR$[%s: 0x%X,%s %s]
                                        • API String ID: 2962677655-979556517
                                        • Opcode ID: 72351b7b738f35f619d7d8b77e340b29f5f0f0ea12358d9f842d04191ca863bf
                                        • Instruction ID: 37273084b0f7fb84e19bc793955189f87726ce576e2921ff9a28d3b11bb35b92
                                        • Opcode Fuzzy Hash: 72351b7b738f35f619d7d8b77e340b29f5f0f0ea12358d9f842d04191ca863bf
                                        • Instruction Fuzzy Hash: 7B711E72A08BC185E730EF21E4403DAB7A5F795794F444229EACD43AADDF78C64ACB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                        • API String ID: 2565136772-3242537097
                                        • Opcode ID: fe3415c8bf738a4e4c9ac778db4eabba7e3f37f2aa2cc5fe04fbc3e409b7b6fd
                                        • Instruction ID: 720d179b952d8eda01e9b245da9bf8da0c842a8bd0418aaaa3d4608aeb2994b7
                                        • Opcode Fuzzy Hash: fe3415c8bf738a4e4c9ac778db4eabba7e3f37f2aa2cc5fe04fbc3e409b7b6fd
                                        • Instruction Fuzzy Hash: 632130B0E92B05C1FE549F25EC54BE8A3A5BB44B40F44143CD90E026EAEF2DD75B8302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: File$HandleModule_invalid_parameter_noinfo$ByteCharCloseCopyCreateCriticalInitializeMultiNameOpenQuerySectionValueWide
                                        • String ID: .txt$Backup$SOFTWARE\Apple Computer, Inc.\iPod
                                        • API String ID: 3198330762-1913832090
                                        • Opcode ID: 63294a708f22918f9d9b27457cf3edf7a8df5472a22562dbbab116eb8406367b
                                        • Instruction ID: 5f6e31d0e78c00109c5f94e2bcd537e375bf7a3c75fa25c0e35bc990c1168864
                                        • Opcode Fuzzy Hash: 63294a708f22918f9d9b27457cf3edf7a8df5472a22562dbbab116eb8406367b
                                        • Instruction Fuzzy Hash: 497194B5A0478482FB60AF20E5513EAA362E7857A4F804239EA9907BDDDF7CC647C741
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: File$AllocErrorLastMessageModuleNamePathPostRemoveSpecString
                                        • String ID: CMobileDeviceListener::PostLaunchITunesEvent()$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\MobileDeviceListener.cpp$GetLastError() == ERROR_SUCCESS && pathLen > 0$PathRemoveFileSpecW(launchPath)$Using iTunes path '%S'$\iTunes.exe
                                        • API String ID: 2983141929-1673131733
                                        • Opcode ID: 0fd1d6136e30f57a45bf008f46a353fb61c9ff9db1bf0ec83d184ab939c14de3
                                        • Instruction ID: 50f4d5c352fb08df0c88c164437f4d3b2e3b6f675281d4e53e72e45885cc239c
                                        • Opcode Fuzzy Hash: 0fd1d6136e30f57a45bf008f46a353fb61c9ff9db1bf0ec83d184ab939c14de3
                                        • Instruction Fuzzy Hash: 39214FF1A1064182FA209F65E8557E99360BB48748F80003DA94D466E9EF3DC74FC742
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • CItunesHelperModule::MonitorExtShutdownRequest() - External client has signaled us to quit, shutting down!, xrefs: 000000013FBD2BF7
                                        • D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\iTunesHelperModule.cpp, xrefs: 000000013FBD2B89
                                        • hWaitObjects[dwNumObjects] != NULL, xrefs: 000000013FBD2B96
                                        • d, xrefs: 000000013FBD2B40
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Sleep$CreateEventMessageMultipleObjectsPostThreadWait
                                        • String ID: CItunesHelperModule::MonitorExtShutdownRequest() - External client has signaled us to quit, shutting down!$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\iTunesHelperModule.cpp$d$hWaitObjects[dwNumObjects] != NULL
                                        • API String ID: 2819705748-1895936456
                                        • Opcode ID: 2731c80e4cf147a7ede594f27b32c5e2ea5dddcdb9fc44dd579e8ef546c3a4de
                                        • Instruction ID: 7ad680ee537f6e713c13e5520abda916f780daa9259fe69a7294b9e7a3d7ad69
                                        • Opcode Fuzzy Hash: 2731c80e4cf147a7ede594f27b32c5e2ea5dddcdb9fc44dd579e8ef546c3a4de
                                        • Instruction Fuzzy Hash: 2131AFB9B01B8082FB249F24E4407A9B3A1FB48754F844539EB8847BD8EF7DCA478701
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Process$CurrentErrorLastLibraryLoadSession
                                        • String ID: CMobileDeviceListener::IsActiveConsoleSession()$CMobileDeviceListener::IsActiveConsoleSession() - %s$ProcessIdToSessionId failed (0x%08X)$WTSGetActiveConsoleSessionId() returned invalid ID$false$true
                                        • API String ID: 1564432939-462315266
                                        • Opcode ID: e019a0ddd608988e170e2baa2deb3ab99dbe2ef970688b6875ea16ecb7a65f33
                                        • Instruction ID: fee388bf597c588b6bed7f7d424d251a0b093caeeea9868f62955b82daf8d3c3
                                        • Opcode Fuzzy Hash: e019a0ddd608988e170e2baa2deb3ab99dbe2ef970688b6875ea16ecb7a65f33
                                        • Instruction Fuzzy Hash: AF1127F1A2060192EA509F64E8807E9B761A740351F84123AB45A4A5FDEF29C74FCB12
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: String$ByteCharFreeMultiWide$Alloc
                                        • String ID:
                                        • API String ID: 287317156-0
                                        • Opcode ID: da66a9582c990832fba3a9be41e58170a365c233234b9e359a76352001b55baa
                                        • Instruction ID: 58734e1cc8ac3300ee0474faa6d32d4cb6ad1794b5e2289e11393091c71ae2f9
                                        • Opcode Fuzzy Hash: da66a9582c990832fba3a9be41e58170a365c233234b9e359a76352001b55baa
                                        • Instruction Fuzzy Hash: A931BEB6A01B0182F7158F25F8003ADE7E5BB847D4F18453DAE8A427A8DF3DC69BC601
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: f$f$p$p$f
                                        • API String ID: 3215553584-1325933183
                                        • Opcode ID: 03605473cc651601549c3882160930f91464921065ef28aed4bf3c5cec386613
                                        • Instruction ID: 919c739b4bf681e05533c82907dbeb7a32b6578d6c3764242467d0d4e8838015
                                        • Opcode Fuzzy Hash: 03605473cc651601549c3882160930f91464921065ef28aed4bf3c5cec386613
                                        • Instruction Fuzzy Hash: 3F1272B2E0818186FB24AF14F0547EAF791F3B0750F984529E6DA47ACDDB78C682DB11
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise$AddressAllocErrorLastLibraryLoadLocalProc
                                        • String ID: MZP
                                        • API String ID: 451163980-2889622443
                                        • Opcode ID: a4bc3d63512a7a069c767635dfcd7438a545cca15c9b33667003ba3d3265c9d9
                                        • Instruction ID: 47d137a4d5fe82dbe01b7a759bef821b41b88066e63e7c3dcb5e983f39303c40
                                        • Opcode Fuzzy Hash: a4bc3d63512a7a069c767635dfcd7438a545cca15c9b33667003ba3d3265c9d9
                                        • Instruction Fuzzy Hash: 8B71CEB7B11B208AEB05CFA1D84039D37B5BB48B88F64852ACE0D57B19DF7AC565C310
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\PackageRepository\Packages, xrefs: 000000013FBD9109
                                        • Path, xrefs: 000000013FBD9210
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AttributesCloseEnumFileInfoOpenQueryValue
                                        • String ID: Path$SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\PackageRepository\Packages
                                        • API String ID: 1903503675-1185977912
                                        • Opcode ID: c9608affb8bdac41f99f3a7f904c54c88693c617547d6688b92a7652dfb6a566
                                        • Instruction ID: a7a761b85ef32f6ecbdc596cfc26058aa5a11e39eed55554ecf71818088e4ae6
                                        • Opcode Fuzzy Hash: c9608affb8bdac41f99f3a7f904c54c88693c617547d6688b92a7652dfb6a566
                                        • Instruction Fuzzy Hash: 73410A72608B8186E7609F25F4847DAB7A5F789784F540229EBC943B6CDF3CC646CB01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CloseHeapInformationOpenQueryValue
                                        • String ID: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\Common\Windows\WinUtils.cpp$DisableTerminationOnHeapCorruption$SOFTWARE\Apple Computer, Inc.\iTunes\$heapSetInfoResult
                                        • API String ID: 2403383521-945231717
                                        • Opcode ID: 2641917932a5cc5d5fe2681169cae9d71adc60fc5d2d33be31cfcc89e031012d
                                        • Instruction ID: 11b335f1c37a8a64737d2856e97658890013177ce0a0d8ebccf5505abff5ae87
                                        • Opcode Fuzzy Hash: 2641917932a5cc5d5fe2681169cae9d71adc60fc5d2d33be31cfcc89e031012d
                                        • Instruction Fuzzy Hash: 7011A176B54B4182F7608F21F891F9AB364F785744F806138EA4A43EA8DF3DC20ACB00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510525766.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_2080000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AU3_Script-- $c:\debugg$c:\temp$c:\temp\$c:\temp\Autoit3.exe$c:\temp\script.a3x$c:\temp\test.txt$debugg-- $delimitador$eXAWVDek$sqlite3.dll
                                        • API String ID: 0-638518046
                                        • Opcode ID: 7fea2951cacfc32edf2d9fc53fe9c9ced2974819eb42b78929d81a8fd0d9395e
                                        • Instruction ID: e3d0d1512deed106f8a11531ebb69d3b3cac9e9cf08ea9cdf84d80cb8f31d985
                                        • Opcode Fuzzy Hash: 7fea2951cacfc32edf2d9fc53fe9c9ced2974819eb42b78929d81a8fd0d9395e
                                        • Instruction Fuzzy Hash: A3711971210B44D5EB00EFA4D8A83EA3766FB6478CFD05113DA4E43A6AEF78C58AD750
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                        • String ID: csm$csm$csm
                                        • API String ID: 849930591-393685449
                                        • Opcode ID: 8608fd567cae9e318018347791d12238181e8cf192c5249051c0c15c3896cf62
                                        • Instruction ID: 88d5fbd87cea18665d9b6cac03b162a9d287f3eb127f5937ccebb007b69ed450
                                        • Opcode Fuzzy Hash: 8608fd567cae9e318018347791d12238181e8cf192c5249051c0c15c3896cf62
                                        • Instruction Fuzzy Hash: 5AE18EB2A00B408AEB209F65D4413DDBBA4F759B98F104129FE8957BDDCB38D682C703
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AddressFreeLibraryProc
                                        • String ID: api-ms-$ext-ms-
                                        • API String ID: 3013587201-537541572
                                        • Opcode ID: fa38cd8ad30813f5c93d02acb4ded0bda3e1c2d291c454aa6f6bd1f5d7635f98
                                        • Instruction ID: 0a4aee73ceb465c4429e545263dde037e7b0315dcf8fba181f5c0fbf21331902
                                        • Opcode Fuzzy Hash: fa38cd8ad30813f5c93d02acb4ded0bda3e1c2d291c454aa6f6bd1f5d7635f98
                                        • Instruction Fuzzy Hash: 9B41A0B6B11A0081FA168F26E8247E5B391F759BE0F49553D9E0D9B79CEA39C64B8300
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$ByteCharFileLeaveLoadModuleMultiNameTypeWide
                                        • String ID:
                                        • API String ID: 1805655140-0
                                        • Opcode ID: 1201a0330a6309db4daf305e43ff131e78b39ca2755361be195bcb0cb46f826c
                                        • Instruction ID: 6f9b3156b8dc01bfc729808ceaa529bf404fa73969a21749b37644faf8d2b76b
                                        • Opcode Fuzzy Hash: 1201a0330a6309db4daf305e43ff131e78b39ca2755361be195bcb0cb46f826c
                                        • Instruction Fuzzy Hash: 3FE193B2B01B8586EF24CF25D8507E8A3A0FB54B98F444539EA9D477E8DF38C646C302
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,000000013FBD3D99), ref: 000000013FBD8AC4
                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,000000013FBD3D99), ref: 000000013FBD8AFC
                                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,000000013FBD3D99), ref: 000000013FBD8B0E
                                          • Part of subcall function 000000013FBD5FF0: GetCurrentThreadId.KERNEL32(000000013FBD1165), ref: 000000013FBD60E1
                                          • Part of subcall function 000000013FBD5FF0: EnterCriticalSection.KERNEL32 ref: 000000013FBD6193
                                          • Part of subcall function 000000013FBD5FF0: EnterCriticalSection.KERNEL32 ref: 000000013FBD61AA
                                          • Part of subcall function 000000013FBD5FF0: CreateFileW.KERNEL32 ref: 000000013FBD61D4
                                          • Part of subcall function 000000013FBD5FF0: SetFilePointer.KERNEL32 ref: 000000013FBD61F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalEnterFileLibrarySection$AddressCreateCurrentFreeLoadPointerProcThread
                                        • String ID: CWinUtils::GetCurrentSession()$Kernel32.dll$WTSGetActiveConsoleSessionId$can't load Kernel32.dll
                                        • API String ID: 1624891417-2724044075
                                        • Opcode ID: 92a1e71d7fce590ec13e0af4c1435eac245061dd79d7d07349551f107abff737
                                        • Instruction ID: 0daa842ca4fffa05c132fae8fec6cde2181c497ec7a6d671660086650da5ab48
                                        • Opcode Fuzzy Hash: 92a1e71d7fce590ec13e0af4c1435eac245061dd79d7d07349551f107abff737
                                        • Instruction Fuzzy Hash: AFF062B1B9270581FF849F15F9807E56360E748781F496439A91E427A9EE3CC78BC700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: f$p$p
                                        • API String ID: 3215553584-1995029353
                                        • Opcode ID: b6993eaef3af951837f3a108ed116dd4344ee2e449f7cb590c01326803456ce0
                                        • Instruction ID: da77f543de4909acf21702430dfeea1eec2ce62dedd705668c3667724f77a96c
                                        • Opcode Fuzzy Hash: b6993eaef3af951837f3a108ed116dd4344ee2e449f7cb590c01326803456ce0
                                        • Instruction Fuzzy Hash: 5C12E5B2E1414186FB60AF14F0547FAF7A2F370750F94403AEA8A87ACDD739C6828B50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: f$p$p
                                        • API String ID: 3215553584-1995029353
                                        • Opcode ID: c45c858df3806a22df62cf2325c7e9732651af64dfa0adf6bc79cc351efb8333
                                        • Instruction ID: 4b6d0778989e84830bf44e7d5832a5e1c4ed774f921ff50daec13214888441b6
                                        • Opcode Fuzzy Hash: c45c858df3806a22df62cf2325c7e9732651af64dfa0adf6bc79cc351efb8333
                                        • Instruction Fuzzy Hash: 2212B2B5F2424186FB249F15F0543EAF6A3F364760F84813EEA99476CCD778C6928B04
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 6BE4D020: GetCurrentThreadId.KERNEL32(?,?,00000000,6BE4C9F6,?,?,00000000,00000000,?,?,?,?,6BE56859), ref: 6BE4D028
                                        • GetTickCount.KERNEL32(?,?,00000000,00000000,?,?,?,?,6BE56859,?,?,?,?,6BE56E27), ref: 6BE4CA16
                                        • GetTickCount.KERNEL32 ref: 6BE4CA2F
                                        • GetCurrentThreadId.KERNEL32 ref: 6BE4CA68
                                        • GetTickCount.KERNEL32 ref: 6BE4CA9B
                                        • GetTickCount.KERNEL32 ref: 6BE4CAD4
                                        • GetTickCount.KERNEL32(?,?,00000000,00000000,?,?,?,?,6BE56859,?,?,?,?,6BE56E27), ref: 6BE4CB02
                                        • GetCurrentThreadId.KERNEL32(?,?,00000000,00000000,?,?,?,?,6BE56859,?,?,?,?,6BE56E27), ref: 6BE4CB72
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CountTick$CurrentThread
                                        • String ID:
                                        • API String ID: 3968769311-0
                                        • Opcode ID: 406a3f0cad7c77eff160662fcebbf7d82e92bd9465691234c52cc9ec7e4eab2e
                                        • Instruction ID: c55c7553b3bd0a7877a53414a9f3dd590f3738c4bc6250c63b5b328cadaaf30e
                                        • Opcode Fuzzy Hash: 406a3f0cad7c77eff160662fcebbf7d82e92bd9465691234c52cc9ec7e4eab2e
                                        • Instruction Fuzzy Hash: 4C41D3327016018ED7148E7AE98038A3B61E748BECB35562DDE0DC7758DB79C4DE8790
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Device_Get_
                                        • String ID: ::CM_Get_Device_IDW(deviceInfoData->DevInst, deviceInstanceID, sizeof(deviceInstanceID) / sizeof(WCHAR), 0) == CR_SUCCESS$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\DFUDeviceListener.cpp$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\Utilities\LinkListUtilities.h$dfuDevice != nil$element->*PNEXT == nil
                                        • API String ID: 3602455593-670496623
                                        • Opcode ID: 70ce0db422083a5583b78fc57538e17964396d24a4217040ad0e98011282e03d
                                        • Instruction ID: 556542387c78ab4863f4a45f132723554d0622393fc1ee5dc36ee6e17df89b96
                                        • Opcode Fuzzy Hash: 70ce0db422083a5583b78fc57538e17964396d24a4217040ad0e98011282e03d
                                        • Instruction Fuzzy Hash: BF5198B2B1464581EB649F11E4507EAA7A0F785B88F88503ABA8D076EDDF38C746C702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNEL32(?,?,?,000000013FBE093E,?,?,?,000000013FBE0630,?,?,00000001,000000013FBDD2E9), ref: 000000013FBE0711
                                        • GetLastError.KERNEL32(?,?,?,000000013FBE093E,?,?,?,000000013FBE0630,?,?,00000001,000000013FBDD2E9), ref: 000000013FBE071F
                                        • LoadLibraryExW.KERNEL32(?,?,?,000000013FBE093E,?,?,?,000000013FBE0630,?,?,00000001,000000013FBDD2E9), ref: 000000013FBE0749
                                        • FreeLibrary.KERNEL32(?,?,?,000000013FBE093E,?,?,?,000000013FBE0630,?,?,00000001,000000013FBDD2E9), ref: 000000013FBE078F
                                        • GetProcAddress.KERNEL32(?,?,?,000000013FBE093E,?,?,?,000000013FBE0630,?,?,00000001,000000013FBDD2E9), ref: 000000013FBE079B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                        • String ID: api-ms-
                                        • API String ID: 2559590344-2084034818
                                        • Opcode ID: 90b869b0b52888882f07dc4bd89423715679e2e458fa04fec9e3662d3ff01ced
                                        • Instruction ID: 52f9a7f12f78dae4650a87915474502cf33bffc53a2604955d24deb98c5e56e2
                                        • Opcode Fuzzy Hash: 90b869b0b52888882f07dc4bd89423715679e2e458fa04fec9e3662d3ff01ced
                                        • Instruction Fuzzy Hash: 5F31AFB1B12B4091EE529F06F8007E9A394B758BE0F59463DDE1D0B3A8EF38C6568B00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Value$ErrorLast
                                        • String ID:
                                        • API String ID: 2506987500-0
                                        • Opcode ID: 28fedf999cba9b3dd09498284d5df06bb2c7a8c29bfe3e1d76c56de08d264fe7
                                        • Instruction ID: 3946367e49cfc6091dc2e1225052bc46188382641629b147e63e398215c37093
                                        • Opcode Fuzzy Hash: 28fedf999cba9b3dd09498284d5df06bb2c7a8c29bfe3e1d76c56de08d264fe7
                                        • Instruction Fuzzy Hash: CB21C3B0F0134441FA586735E5553EDD2429B847F0F14973C997A07AFEEE29C64B8280
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • CMobileDeviceListener::Stop() - not running XP SP2 or later, xrefs: 000000013FBD45D9
                                        • CMobileDeviceListener::UnsubscribeToMobileDeviceNotification(), xrefs: 000000013FBD45BE
                                        • AMDeviceNotificationUnsubscribe failed (0x%08X), xrefs: 000000013FBD45B7
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterKillLeaveTimer
                                        • String ID: AMDeviceNotificationUnsubscribe failed (0x%08X)$CMobileDeviceListener::Stop() - not running XP SP2 or later$CMobileDeviceListener::UnsubscribeToMobileDeviceNotification()
                                        • API String ID: 610966039-3597675763
                                        • Opcode ID: 09e0c924af41a0c9a48808c4a640370dc31621526d6d22467774291af0b35e1c
                                        • Instruction ID: 009b98479e3694620eadef63cd157974783766492e5cf404f3959f8f634542e3
                                        • Opcode Fuzzy Hash: 09e0c924af41a0c9a48808c4a640370dc31621526d6d22467774291af0b35e1c
                                        • Instruction Fuzzy Hash: 9F1190B1E0468481FB10AF25E5453EAE7A0EB50B88F484539FA49476DEDF29CB4BC353
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                        • String ID: CONOUT$
                                        • API String ID: 3230265001-3130406586
                                        • Opcode ID: aa910486bda6f7c32d477a22c8fb7a8c421507c476b2302b26e2714e07971deb
                                        • Instruction ID: 9d2b1ece1b873a4c74b26a74c904587d0f13d83f04696a0d9cafc16e8b227b2b
                                        • Opcode Fuzzy Hash: aa910486bda6f7c32d477a22c8fb7a8c421507c476b2302b26e2714e07971deb
                                        • Instruction Fuzzy Hash: A111B271B10B4082F7508B56F858799B3A0F389FE4F000238EA5987BA8CF3DC64AC740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileHandleWrite
                                        • String ID: Error$Runtime error at 0000000000000000
                                        • API String ID: 3320372497-326393251
                                        • Opcode ID: 0f6f3ec3fdda10c397622d5c083ba61a9c9d3e98c2ffc35716c4027b71c72137
                                        • Instruction ID: c06258a914caf60d308739364970fb72828e7ffa345fe9e1ae1b368035b8aae3
                                        • Opcode Fuzzy Hash: 0f6f3ec3fdda10c397622d5c083ba61a9c9d3e98c2ffc35716c4027b71c72137
                                        • Instruction Fuzzy Hash: 861122A1A28A48D4FB18D730FC003963362A744758F6006AED96E827F5DF7D81E8C341
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • CMobileDeviceListener::MobileDeviceDFUModeDeviceConnectedCallback(), xrefs: 000000013FBD3DC0
                                        • D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\MobileDeviceListener.cpp, xrefs: 000000013FBD406D
                                        • PathRemoveFileSpecW(launchPath), xrefs: 000000013FBD3FEB
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: File$CriticalEnterSection$AllocCreateCurrentErrorLastMessageModuleNamePathPostRemoveSpecStringThread
                                        • String ID: CMobileDeviceListener::MobileDeviceDFUModeDeviceConnectedCallback()$D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\MobileDeviceListener.cpp$PathRemoveFileSpecW(launchPath)
                                        • API String ID: 212662739-1618578574
                                        • Opcode ID: 907af12e01ea5475187f25a54ff9265925a5df60f3a6fdb7f613083a229ad9a9
                                        • Instruction ID: 9fdeb106b0795e6cc6ebb9ee020d2f017cb522ccf926c29b43cc555963744835
                                        • Opcode Fuzzy Hash: 907af12e01ea5475187f25a54ff9265925a5df60f3a6fdb7f613083a229ad9a9
                                        • Instruction Fuzzy Hash: D5014CF1F1078492FA20AF25E8957E5A261EB59748F80003EA90D462E9EF2DC34FC702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                        • String ID:
                                        • API String ID: 351091851-0
                                        • Opcode ID: fedbb2d7a1747011060dc486d1d00ccebcfc9b34e56b7bb6b3a7034112154f27
                                        • Instruction ID: 161da95b9d3d2a4295b89ff682689daed3a2828369c89155fd363291c68bfabd
                                        • Opcode Fuzzy Hash: fedbb2d7a1747011060dc486d1d00ccebcfc9b34e56b7bb6b3a7034112154f27
                                        • Instruction Fuzzy Hash: 00412837610E548ECB14DF75C9902DE2762F784B9CB245465EE0E9BB48EF39D892C380
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                        • String ID: csm$csm$csm
                                        • API String ID: 3523768491-393685449
                                        • Opcode ID: 06fbb35a787d042d80e9397f648e0fb2ecdfb7ab343b487120ed669a079a4c75
                                        • Instruction ID: 346b976f7a804e75de06de834349399657f8b30c5c34c56730bd9b09f9528d8e
                                        • Opcode Fuzzy Hash: 06fbb35a787d042d80e9397f648e0fb2ecdfb7ab343b487120ed669a079a4c75
                                        • Instruction Fuzzy Hash: 41E1A2B39047808AE7619F38D4803EDBBA4F354798F144129EE89577DADB38D682CB43
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLastError.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0A07
                                        • FlsSetValue.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0A3D
                                        • FlsSetValue.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0A6A
                                        • FlsSetValue.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0A7B
                                        • FlsSetValue.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0A8C
                                        • SetLastError.KERNEL32(?,?,00002B992DDFA232,000000013FBEDCF9,?,?,?,?,000000013FBF3D32,?,?,00000000,000000013FBEE1F3,?,?,?), ref: 000000013FBF0AA7
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Value$ErrorLast
                                        • String ID:
                                        • API String ID: 2506987500-0
                                        • Opcode ID: 01a268636fbdeda739f22a670003d803f7de8d182125cab696239c8be3d0f118
                                        • Instruction ID: 5c9c74b6392235d7aa27506b22bd5226e2e26c59ebc4124079ae38be96a498fa
                                        • Opcode Fuzzy Hash: 01a268636fbdeda739f22a670003d803f7de8d182125cab696239c8be3d0f118
                                        • Instruction Fuzzy Hash: DF11AFB5F0030542FA546B31EA553E9E2829B887F0F14973CA87A067FEDE39C64B8240
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileHandleWrite
                                        • String ID:
                                        • API String ID: 3320372497-0
                                        • Opcode ID: 319ed979488f15241d6a635eaefc13e86de23c9428766b61921c3b10f7b15803
                                        • Instruction ID: 458e5ccb581a942e5e0e82a95b8b99a0cd1468963a546c9ff3e7b13f8830b058
                                        • Opcode Fuzzy Hash: 319ed979488f15241d6a635eaefc13e86de23c9428766b61921c3b10f7b15803
                                        • Instruction Fuzzy Hash: 5711ED1231596448E7189BB2BC1179A7251A789FD8F24837AAD6E47BE4DF3CC08283D0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • EnterCriticalSection.KERNEL32 ref: 000000013FBD3E19
                                          • Part of subcall function 000000013FBD65B0: GetCurrentThreadId.KERNEL32(000000013FBD305E), ref: 000000013FBD66A8
                                          • Part of subcall function 000000013FBD65B0: EnterCriticalSection.KERNEL32 ref: 000000013FBD675A
                                          • Part of subcall function 000000013FBD65B0: EnterCriticalSection.KERNEL32 ref: 000000013FBD6771
                                          • Part of subcall function 000000013FBD65B0: CreateFileW.KERNEL32 ref: 000000013FBD679B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalEnterSection$CreateCurrentFileThread
                                        • String ID: CMobileDeviceListener::HandleMobileDeviceNotification()$received kAMDeviceAttached action$received kAMDeviceDetached action$received kAMDeviceNotificationStopped action$received unknown action (%d)
                                        • API String ID: 4231907919-2832115663
                                        • Opcode ID: 11a2e075e34ed0d9d3f7579c63c71f0a3be8f9758189425526bf37571e2a08f6
                                        • Instruction ID: 72f740eb5e6e9e52280e1e098b000ba1736c9167df05c358149743d4c0f50354
                                        • Opcode Fuzzy Hash: 11a2e075e34ed0d9d3f7579c63c71f0a3be8f9758189425526bf37571e2a08f6
                                        • Instruction Fuzzy Hash: C2113AF1E1068491F624AF25E8057E9E320A744784F48513ABA86126EECF39C78BC767
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                        • String ID: nzyj5cx40ttqa
                                        • API String ID: 3936042273-369995452
                                        • Opcode ID: 0a41fc59f1b62d7afdf9e9611e5cc5442c2ece647804f23b3a77e1e1928df277
                                        • Instruction ID: 41b1eb59c3549b2253e10110d9e03b851ba17d21b9a003ead3732e5d9cd29179
                                        • Opcode Fuzzy Hash: 0a41fc59f1b62d7afdf9e9611e5cc5442c2ece647804f23b3a77e1e1928df277
                                        • Instruction Fuzzy Hash: 17A1BEB2B15B8099FB00CF74D5403DCA362E749798F444629EE6D17BEADB78C686C342
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                        • String ID: csm$f
                                        • API String ID: 2395640692-629598281
                                        • Opcode ID: 29a62fd970dc32458c688bce9ad1de560091d2cb3cfb02250b2b7f494fa5ead3
                                        • Instruction ID: c2fd6d1447ce45359ed98912fb9218d64e763c1d4cc3eae943e89f66dce1eef0
                                        • Opcode Fuzzy Hash: 29a62fd970dc32458c688bce9ad1de560091d2cb3cfb02250b2b7f494fa5ead3
                                        • Instruction Fuzzy Hash: 0551D1B2B01600CAEB54EF25E444B99B7A5F348BC8F118238EE964778CDB74DA42C702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,6BE4C7D2,?,?,?,?,6BE56127), ref: 6BE4C67A
                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,6BE4C7D2,?,?,?,?,6BE56127), ref: 6BE4C689
                                        • GetLogicalProcessorInformation.KERNEL32(?,?,?,?,?,?,?,?,?,6BE4C7D2,?,?,?,?,6BE56127), ref: 6BE4C6C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AddressHandleInformationLogicalModuleProcProcessor
                                        • String ID: GetLogicalProcessorInformation$kernel32.dll
                                        • API String ID: 4292003513-812649623
                                        • Opcode ID: 3b4b0924f19bb9e407b63a49b031a4330654d4ec17db5ebb9aec849a6b39ba72
                                        • Instruction ID: 8ca76bc2b8f583fdcd273d12990e17c702c93dceb5f679efdcfd3fb97134ec74
                                        • Opcode Fuzzy Hash: 3b4b0924f19bb9e407b63a49b031a4330654d4ec17db5ebb9aec849a6b39ba72
                                        • Instruction Fuzzy Hash: 382158326026148EDB44DF35E59929D3BA5EB44BCCF20216AF60E47B18DF79C8D9C380
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: fbfdb10de66448dbc241282a1ad3488d8ba21be0d24f4693b64693b8e6d8c624
                                        • Instruction ID: 2806cf304c8dae7a65af84e3cf8e37b65e95cda282fe1fc380baa09cae09a6b6
                                        • Opcode Fuzzy Hash: fbfdb10de66448dbc241282a1ad3488d8ba21be0d24f4693b64693b8e6d8c624
                                        • Instruction Fuzzy Hash: ADF062B1A1170581EB109B24E8547A99321BB997A1F94163DD66A452F8DF3DC24BC700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Library$AddressFreeLoadProc
                                        • String ID: GetCurrentPackagePath$kernel32.dll
                                        • API String ID: 145871493-1537745806
                                        • Opcode ID: 2fa8dacda9a2a5c93730cdbeb28ba2d7876c22e5f016b2438ffb50a8c886d06f
                                        • Instruction ID: 9abc31802e3d615dab34cc1b74af3cb06a5c6fd4c9940969e3cc756d1846ca34
                                        • Opcode Fuzzy Hash: 2fa8dacda9a2a5c93730cdbeb28ba2d7876c22e5f016b2438ffb50a8c886d06f
                                        • Instruction Fuzzy Hash: 20F05471F1174081EB44DF55F5847A9A361BB88780F48583DE91A42768EF3CC74A8600
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: 93ff60b04d408f334fabc5721a47d3d5baa5d7c02017824e367b26aeeb6bf317
                                        • Instruction ID: e597af8174ac7ec91d207ada1177c0435b23cbf214d32a602e7fc46afb233914
                                        • Opcode Fuzzy Hash: 93ff60b04d408f334fabc5721a47d3d5baa5d7c02017824e367b26aeeb6bf317
                                        • Instruction Fuzzy Hash: 84B18EB2A06A44D1EA669F15D4803A9E790EB58BC4F09893DAEC9077DDDB39C6538303
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: PropWindow$DestroyMessagePostProcThread
                                        • String ID:
                                        • API String ID: 2227124644-0
                                        • Opcode ID: bd4f10650631a75663ead75c7bc6ec9d681bf6a5735d8700f3535a1bde8d7187
                                        • Instruction ID: 4700d78882147c53773af571f1a194d5a3bbc0d4f996915ac0753541d161ce67
                                        • Opcode Fuzzy Hash: bd4f10650631a75663ead75c7bc6ec9d681bf6a5735d8700f3535a1bde8d7187
                                        • Instruction Fuzzy Hash: B6317FB1E0470181FA649F56E9943E8E261A745BC4F0C043EFA46177EEDA6FCA478323
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2067211477-0
                                        • Opcode ID: 5fcb5b378eb968763da44a80a56519326b06c4b6a072ebfe58107360d84148bb
                                        • Instruction ID: 04010b38dd3a43836283a0346417741333e6c5f34eccdde6cd57f7f1dcf80450
                                        • Opcode Fuzzy Hash: 5fcb5b378eb968763da44a80a56519326b06c4b6a072ebfe58107360d84148bb
                                        • Instruction Fuzzy Hash: 5B211AB9A05B4089EE14DF65F4503E9F3A1BB98BD0F084539EE5D87B59DE7CC6068600
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _set_statfp
                                        • String ID:
                                        • API String ID: 1156100317-0
                                        • Opcode ID: 294b3f9744d026325944edce4feecdf3d22c0093d8c68ca8215e412a494e173a
                                        • Instruction ID: af89a81ba89785fa16ae6afaaeaedab37421af103c3caf435e6d66dff0ae1c70
                                        • Opcode Fuzzy Hash: 294b3f9744d026325944edce4feecdf3d22c0093d8c68ca8215e412a494e173a
                                        • Instruction Fuzzy Hash: 2611C6F2E54B0726F7581128E4563E79180AB587B4F08963CF96707BDECE2A8B8F9100
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2310279950-0
                                        • Opcode ID: ec9380e02f427a3e887e39069d41858fe792cc241cdab3d6eb553eb884881c93
                                        • Instruction ID: 43547b5b25ba18b9f7c142375482b696920db70956068727fb0497a174992f51
                                        • Opcode Fuzzy Hash: ec9380e02f427a3e887e39069d41858fe792cc241cdab3d6eb553eb884881c93
                                        • Instruction Fuzzy Hash: 6F1173B1A0478056FA055F66E9053EAE250AB5AFF1F044238EA1907ADEDF68C6478206
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FlsGetValue.KERNEL32(?,?,?,000000013FBED847,?,?,00000000,000000013FBEDAE2,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBF0ADF
                                        • FlsSetValue.KERNEL32(?,?,?,000000013FBED847,?,?,00000000,000000013FBEDAE2,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBF0AFE
                                        • FlsSetValue.KERNEL32(?,?,?,000000013FBED847,?,?,00000000,000000013FBEDAE2,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBF0B26
                                        • FlsSetValue.KERNEL32(?,?,?,000000013FBED847,?,?,00000000,000000013FBEDAE2,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBF0B37
                                        • FlsSetValue.KERNEL32(?,?,?,000000013FBED847,?,?,00000000,000000013FBEDAE2,?,?,?,?,?,000000013FBEDA6E), ref: 000000013FBF0B48
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Value
                                        • String ID:
                                        • API String ID: 3702945584-0
                                        • Opcode ID: fd1d3b6c411fdf7a17c303d4863063fc1c155c4511383b150e60a08007bf8254
                                        • Instruction ID: 636eeca5ebe64e987088836bf979c2bee36e02f576a6984f90daee2879755088
                                        • Opcode Fuzzy Hash: fd1d3b6c411fdf7a17c303d4863063fc1c155c4511383b150e60a08007bf8254
                                        • Instruction Fuzzy Hash: 5711BFB0F0070541FA58AB35E9917E9E252AB947F4F58533CA93A067FFDE39C6478240
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Value
                                        • String ID:
                                        • API String ID: 3702945584-0
                                        • Opcode ID: 785c0a99e285cefd74391223a65e3919330946fda276fa9c8b9794417d3e7ec7
                                        • Instruction ID: 9825145a0eeba04e933e767f0fa6503d8d4761204e91476d33b21dcb16e3df41
                                        • Opcode Fuzzy Hash: 785c0a99e285cefd74391223a65e3919330946fda276fa9c8b9794417d3e7ec7
                                        • Instruction Fuzzy Hash: C21161B0F4030941FA686B79D8127E991429BD53F4F14973C997A0A3FFEA39D74B8281
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CallEncodePointerTranslator
                                        • String ID: MOC$RCC
                                        • API String ID: 3544855599-2084237596
                                        • Opcode ID: 2b4d928047f35922730304493831ac4990864c9ff03719c8d85e12f30cdae734
                                        • Instruction ID: 93f5c7ca72d31088c08ad53faf6f24ea986b3e8742b21f0f9a7297fe1938375c
                                        • Opcode Fuzzy Hash: 2b4d928047f35922730304493831ac4990864c9ff03719c8d85e12f30cdae734
                                        • Instruction Fuzzy Hash: 719192B3A047948AE711CF65E8903DDBBB0F744788F144129EF8957B99DB38D296CB02
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                        • String ID: csm$csm
                                        • API String ID: 3896166516-3733052814
                                        • Opcode ID: 17154edcb995ee05828c9d9b51f4a5893df044ab9d2bfa73246452588fd6ace7
                                        • Instruction ID: 7254ee49c173358263b64d028e59b0fd124ed5258e27ab01e05aaf10249660bc
                                        • Opcode Fuzzy Hash: 17154edcb995ee05828c9d9b51f4a5893df044ab9d2bfa73246452588fd6ace7
                                        • Instruction Fuzzy Hash: 985191B290878086EB748F25D55439CBBA4F355B94F144129FB9847BDECB38D692CB03
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 000000013FBD3360: WaitForSingleObject.KERNEL32 ref: 000000013FBD33AC
                                          • Part of subcall function 000000013FBD3360: _mbsupr.LIBCMT ref: 000000013FBD3422
                                          • Part of subcall function 000000013FBD3360: Process32Next.KERNEL32 ref: 000000013FBD345F
                                          • Part of subcall function 000000013FBD3360: CloseHandle.KERNEL32 ref: 000000013FBD346C
                                          • Part of subcall function 000000013FBD3360: RegOpenKeyExA.ADVAPI32 ref: 000000013FBD34B6
                                          • Part of subcall function 000000013FBD3360: RegQueryValueExA.ADVAPI32 ref: 000000013FBD350B
                                        • SysFreeString.OLEAUT32 ref: 000000013FBD386B
                                        • SysFreeString.OLEAUT32 ref: 000000013FBD3875
                                          • Part of subcall function 000000013FBD65B0: GetCurrentThreadId.KERNEL32(000000013FBD305E), ref: 000000013FBD66A8
                                          • Part of subcall function 000000013FBD65B0: EnterCriticalSection.KERNEL32 ref: 000000013FBD675A
                                          • Part of subcall function 000000013FBD65B0: EnterCriticalSection.KERNEL32 ref: 000000013FBD6771
                                          • Part of subcall function 000000013FBD65B0: CreateFileW.KERNEL32 ref: 000000013FBD679B
                                          • Part of subcall function 000000013FBD1720: SysStringLen.OLEAUT32 ref: 000000013FBD179F
                                          • Part of subcall function 000000013FBD1720: SysFreeString.OLEAUT32 ref: 000000013FBD17AF
                                          • Part of subcall function 000000013FBD1720: MultiByteToWideChar.KERNEL32 ref: 000000013FBD17CE
                                          • Part of subcall function 000000013FBD1720: SysAllocStringLen.OLEAUT32 ref: 000000013FBD17DB
                                          • Part of subcall function 000000013FBD1720: MultiByteToWideChar.KERNEL32 ref: 000000013FBD1802
                                          • Part of subcall function 000000013FBD1720: SysStringLen.OLEAUT32 ref: 000000013FBD1824
                                          • Part of subcall function 000000013FBD1720: VarBstrCat.OLEAUT32 ref: 000000013FBD183C
                                          • Part of subcall function 000000013FBD1720: SysFreeString.OLEAUT32 ref: 000000013FBD1848
                                          • Part of subcall function 000000013FBD1720: SysStringLen.OLEAUT32 ref: 000000013FBD186D
                                          • Part of subcall function 000000013FBD1720: VarBstrCat.OLEAUT32 ref: 000000013FBD1889
                                          • Part of subcall function 000000013FBD1720: SysFreeString.OLEAUT32 ref: 000000013FBD1895
                                          • Part of subcall function 000000013FBD1720: SysStringLen.OLEAUT32 ref: 000000013FBD18AC
                                          • Part of subcall function 000000013FBD1720: SysFreeString.OLEAUT32 ref: 000000013FBD1A33
                                          • Part of subcall function 000000013FBD1720: SysFreeString.OLEAUT32 ref: 000000013FBD1A3D
                                        Strings
                                        • CItunesHelperMsgListener::Launch_iTunes() - NOT ok to Launch!, xrefs: 000000013FBD384D
                                        • CItunesHelperMsgListener::Launch_iTunes() - OK to Launch!, xrefs: 000000013FBD3836
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: String$Free$BstrByteCharCriticalEnterMultiSectionWide$AllocCloseCreateCurrentFileHandleNextObjectOpenProcess32QuerySingleThreadValueWait_mbsupr
                                        • String ID: CItunesHelperMsgListener::Launch_iTunes() - NOT ok to Launch!$CItunesHelperMsgListener::Launch_iTunes() - OK to Launch!
                                        • API String ID: 2127640348-2365413097
                                        • Opcode ID: b7f4ce8b243426e40cd0049ebcc46229a115af31500903672e5d60eede6a9391
                                        • Instruction ID: ce079ce92f6ccfe8459feaae81d2ebf19234e426d5a4964a40c76dcaa26f455e
                                        • Opcode Fuzzy Hash: b7f4ce8b243426e40cd0049ebcc46229a115af31500903672e5d60eede6a9391
                                        • Instruction Fuzzy Hash: 40015EB4B1074081FA48AF25D5503E9A361E780B90F085439EA09076DECF2AC65B8352
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        • timerID == kMobileDeviceResubscribeTimerID, xrefs: 000000013FBD3F39
                                        • D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\MobileDeviceListener.cpp, xrefs: 000000013FBD3F2C
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalEnterKillSectionTimer
                                        • String ID: D:\BWA\6B22E293-2BF5-0\iTunesWin-1200.12.12.9.4\srcroot\iTunes\iPodSupport\(Win32)\iTunesHelper\MobileDeviceListener.cpp$timerID == kMobileDeviceResubscribeTimerID
                                        • API String ID: 3568000350-1376296042
                                        • Opcode ID: a3e3992318ef14403295c00c1aedcc3e80f365b3b2bcb317c9a8b6a66e89dd65
                                        • Instruction ID: 695f01a1460f8712cba39764d2c845cb471b3477b2646813b7bbee4cd77fc328
                                        • Opcode Fuzzy Hash: a3e3992318ef14403295c00c1aedcc3e80f365b3b2bcb317c9a8b6a66e89dd65
                                        • Instruction Fuzzy Hash: A9F082B1E54B45D1FA409F16F984BE5A320F7A4B84F845039E909076FD9E2DC79BC301
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: FileWrite$ConsoleErrorLastOutput
                                        • String ID:
                                        • API String ID: 2718003287-0
                                        • Opcode ID: 121267bb7df3aa258e1c85b07bf07d6216f6440df5c099c72d538968e5e771e9
                                        • Instruction ID: ea18340b33104dba684aa03400fe985f7ccc9cf572b5373711a0daeee46a4461
                                        • Opcode Fuzzy Hash: 121267bb7df3aa258e1c85b07bf07d6216f6440df5c099c72d538968e5e771e9
                                        • Instruction Fuzzy Hash: C6D19CB2B14B808AE715CF69D4403ECB7BAF344B98F148229DE5997B9DDA35C64BC700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ConsoleErrorLastMode
                                        • String ID:
                                        • API String ID: 953036326-0
                                        • Opcode ID: f69f43bd3180882cedac2a279c4bd6430da6845056f4bb2ea38d39d8c77d23d3
                                        • Instruction ID: 15568dd8ac098188a571109ed2b58453afa2035ea22e65e96b5c02d307945668
                                        • Opcode Fuzzy Hash: f69f43bd3180882cedac2a279c4bd6430da6845056f4bb2ea38d39d8c77d23d3
                                        • Instruction Fuzzy Hash: A591A1B2F10790C5F758CF65D4803EDABA8A744F88F54412DDE4A57A89DB3AC68BC700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetThreadUILanguage.KERNEL32 ref: 6BE54319
                                        • SetThreadPreferredUILanguages.KERNEL32 ref: 6BE5438A
                                        • SetThreadPreferredUILanguages.KERNEL32 ref: 6BE543F6
                                        • SetThreadPreferredUILanguages.KERNEL32 ref: 6BE54435
                                          • Part of subcall function 6BE542A0: GetThreadPreferredUILanguages.KERNEL32 ref: 6BE542C4
                                          • Part of subcall function 6BE542A0: GetThreadPreferredUILanguages.KERNEL32 ref: 6BE542EC
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Thread$LanguagesPreferred$Language
                                        • String ID:
                                        • API String ID: 2255706666-0
                                        • Opcode ID: 1a6ca4b4bf74247a47c0fb09211f913226520dfc2c311b3e54c252bdeb4bbe4a
                                        • Instruction ID: b9b8b102ff58f1a91d1873900d2b018f497e81aaabfff3eb444c3eeb2e4da4f8
                                        • Opcode Fuzzy Hash: 1a6ca4b4bf74247a47c0fb09211f913226520dfc2c311b3e54c252bdeb4bbe4a
                                        • Instruction Fuzzy Hash: 0B31AF772115609ADB48DF35EA542EE2772EB447DCF902126FE0787B68DB7AC4A5C300
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                        • String ID:
                                        • API String ID: 1452418845-0
                                        • Opcode ID: 61f16cc6ada6a60f1c142649b1bc40caf53e114f8a20a5f315308f1e3ce305eb
                                        • Instruction ID: 417449e71589c073f06cabfa0f4db83656130526d158e334f70c40c6d2130e4f
                                        • Opcode Fuzzy Hash: 61f16cc6ada6a60f1c142649b1bc40caf53e114f8a20a5f315308f1e3ce305eb
                                        • Instruction Fuzzy Hash: D631A2F1E41240C6FB54AF69E5613E9A2959B81384F45543CB649472EFDE2C8B4BC343
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LeaveCriticalSection.KERNEL32 ref: 6BE544C0
                                        • EnterCriticalSection.KERNEL32 ref: 6BE54595
                                        • LeaveCriticalSection.KERNEL32 ref: 6BE545CD
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510605183.000000006BE41000.00000020.00000001.01000000.00000008.sdmp, Offset: 6BE40000, based on PE: true
                                        • Associated: 0000000A.00000002.510602210.000000006BE40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510605183.000000006BF88000.00000020.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510627770.000000006BF8B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510630664.000000006BF8C000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510633632.000000006BF8D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510636597.000000006BF8F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510639528.000000006BF90000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510642616.000000006BF92000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510645780.000000006BF93000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510648669.000000006BF95000.00000008.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510652529.000000006BFAB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510655703.000000006BFB1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510658685.000000006BFB6000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFBA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 0000000A.00000002.510662023.000000006BFCE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_6be40000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter
                                        • String ID:
                                        • API String ID: 2978645861-0
                                        • Opcode ID: 9e80c20bab758db8cc8054d685c93522879ceb526ba6dea55be9d22b913360c8
                                        • Instruction ID: df1c6b027ba52e39a3c4d25d3afb5321781827a791d303ac905f7188de1f4457
                                        • Opcode Fuzzy Hash: 9e80c20bab758db8cc8054d685c93522879ceb526ba6dea55be9d22b913360c8
                                        • Instruction Fuzzy Hash: B7414162200A10C8DB54DF71E8913AD3772EB8479CF651126EA1ECBA68DF7EC5E5C390
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Virtual$AllocInfoProtectQuerySystem
                                        • String ID:
                                        • API String ID: 3562403962-0
                                        • Opcode ID: 97f41f8ce2a9f6a6696a39ee6abcffc46ef767a5258316586e69072ece0116ac
                                        • Instruction ID: 634259327d778e67d63a5ab3d53f6c293a434c297d7a0a9f4d85780827922354
                                        • Opcode Fuzzy Hash: 97f41f8ce2a9f6a6696a39ee6abcffc46ef767a5258316586e69072ece0116ac
                                        • Instruction Fuzzy Hash: 79317A72710B849EEB20CF35D8947D873A5F748B88F854429EA4E87B58DF39D64AC700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CriticalDeleteEventMessagePostProcessReleaseSectionServerThread
                                        • String ID:
                                        • API String ID: 2992442974-0
                                        • Opcode ID: 8e4252f1b348df6c924ecf5ff6a85f565933e6bde9dec1b0310b915dbd3f5c20
                                        • Instruction ID: d63aa02fe3402bedaa2c509e43f5b7d0c588ebb390f1625ecd5ca3775f4fe3df
                                        • Opcode Fuzzy Hash: 8e4252f1b348df6c924ecf5ff6a85f565933e6bde9dec1b0310b915dbd3f5c20
                                        • Instruction Fuzzy Hash: 7231AD72B00B8186EB14DF26E44039EA3A4F784B84F1C4439EF5907B9ACF39CA96C751
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ConditionMask$InfoVerifyVersion
                                        • String ID:
                                        • API String ID: 2793162063-0
                                        • Opcode ID: 7f531c5ea5382b422b416a6cb1e51257c7bfd78ad4f283a59d68eda78c520b4e
                                        • Instruction ID: 7dc319afc7d7f24a244c4cd4dcc31f33643ccba1a8b48f19bda241c116d3af09
                                        • Opcode Fuzzy Hash: 7f531c5ea5382b422b416a6cb1e51257c7bfd78ad4f283a59d68eda78c520b4e
                                        • Instruction Fuzzy Hash: 59110D76D187C183E710CF21E4543AAB3A1F3E9704F11A329EA8D06715EB7DD6D68B44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: __except_validate_context_record
                                        • String ID: csm$csm
                                        • API String ID: 1467352782-3733052814
                                        • Opcode ID: e05f943ff51b347511aba1ffee117274e44ff8b8d777144ae57211cd662de935
                                        • Instruction ID: c6e35d455bc554e76dd0bbd0a5f3c15297af83559ed227312b5c5a62433d38f0
                                        • Opcode Fuzzy Hash: e05f943ff51b347511aba1ffee117274e44ff8b8d777144ae57211cd662de935
                                        • Instruction Fuzzy Hash: 657183B290968086DB618F25E4607ADFBA0F754FD4F158129EE884BBCDD738C652C743
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: EncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 2118026453-2084237596
                                        • Opcode ID: 1435ffc62e8753ab977fa743d398f0d29982861df538086d1b7bf0f94791c234
                                        • Instruction ID: 287b261d56a1346a0f99d2af1e5a5485ede821a869d1c92686d3536282095150
                                        • Opcode Fuzzy Hash: 1435ffc62e8753ab977fa743d398f0d29982861df538086d1b7bf0f94791c234
                                        • Instruction Fuzzy Hash: 89616AB3A01B848AE720DF65D4803DDB7A1F358B9CF144229EF4917B99CB38C256C702
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: JanFebMarAprMayJunJulAugSepOctNovDec$SunMonTueWedThuFriSat
                                        • API String ID: 3215553584-2143786750
                                        • Opcode ID: f985b59b386dc2b99b79ff982a4cb7ad7016e16c00ac25bcf35adc67a3f7a929
                                        • Instruction ID: 59b9d7fe6f5d67b9d6ca348e5682c28c91e86319a91f9688f40449b5e63ed210
                                        • Opcode Fuzzy Hash: f985b59b386dc2b99b79ff982a4cb7ad7016e16c00ac25bcf35adc67a3f7a929
                                        • Instruction Fuzzy Hash: 6E51CEB2A0138097EB1ACF18D5987ECB761A755744F88C03AC6058778BDB3ADA1AC761
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                        • String ID: ?
                                        • API String ID: 1286766494-1684325040
                                        • Opcode ID: 8e4b223bb18fcd5f17b90937aec0d9c75f0234b8f735c28f00ccc4d8cf1b3474
                                        • Instruction ID: fd8f333a9e4d8678402586d15dc117fcf46c7d5ee192ec4b3789b8065027bda3
                                        • Opcode Fuzzy Hash: 8e4b223bb18fcd5f17b90937aec0d9c75f0234b8f735c28f00ccc4d8cf1b3474
                                        • Instruction Fuzzy Hash: FA4119B2B1478056FB249B25E4513EAE660E790BA4F14423DEED807EEDDB3AC647C700
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CreateFrameInfo__except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 2558813199-1018135373
                                        • Opcode ID: fca0483de9b0fa939f7b26b712f6193c396b5384a9adb9a24223d1f0755b63cd
                                        • Instruction ID: b0f16a2a9ec0b359986a5950cb3d2e50492fb102f8ea38b81f308ea996dcf261
                                        • Opcode Fuzzy Hash: fca0483de9b0fa939f7b26b712f6193c396b5384a9adb9a24223d1f0755b63cd
                                        • Instruction Fuzzy Hash: 21513EB761574086E660EF25E44039EBBF4F388BA0F145129EB8947B99CB38C562CB02
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastWrite
                                        • String ID: U
                                        • API String ID: 442123175-4171548499
                                        • Opcode ID: 0b5a7e79469549b242472dd014f1ebaa24882eb94c0cedeb932111a1d3df3415
                                        • Instruction ID: 1b3eb5dcdaa97051789b96ffbf94d176627ecf520d47f58ba3f7e2fb38bc3dc6
                                        • Opcode Fuzzy Hash: 0b5a7e79469549b242472dd014f1ebaa24882eb94c0cedeb932111a1d3df3415
                                        • Instruction Fuzzy Hash: 1041B272B14B44D1DB208F25E8443E9A7A5F798B94F814039EE4D87798DB3DC646C740
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FBDAADB), ref: 000000013FBDBFF4
                                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FBDAADB), ref: 000000013FBDC03A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: ExceptionFileHeaderRaise
                                        • String ID: csm
                                        • API String ID: 2573137834-1018135373
                                        • Opcode ID: f67719db860f5f84d74875cfcfc983da18b19b4b8c4f86296ed4e5ed49dc3f0d
                                        • Instruction ID: a21e7bfce4f0bbbda58ca53b513e7aed048cb0d0c071862f1bed93fc2ae1e40e
                                        • Opcode Fuzzy Hash: f67719db860f5f84d74875cfcfc983da18b19b4b8c4f86296ed4e5ed49dc3f0d
                                        • Instruction Fuzzy Hash: E9112E72614B8082EB618F15F440399B7A5F788B94F184225EF8D07799DF3DC656CB01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Module$CriticalFileHandleInitializeNameSection_invalid_parameter_noinfo
                                        • String ID: Started %s (%s)
                                        • API String ID: 3725157555-3984459306
                                        • Opcode ID: c61f5a16bf8027e920478a51313bced64caa3594db5f583a95780fb3cabf27c8
                                        • Instruction ID: f082e870d032f0640841d6ba839b4521e3bb90ffe628286cc50b94cb2463d23a
                                        • Opcode Fuzzy Hash: c61f5a16bf8027e920478a51313bced64caa3594db5f583a95780fb3cabf27c8
                                        • Instruction Fuzzy Hash: 51112175A1578482EA51EF20F4517EEA361F786740FC01039B64D42BD9DF3DC60AC742
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: Module$CriticalFileHandleInitializeNameSection_invalid_parameter_noinfo
                                        • String ID: Stopped %s (%s)
                                        • API String ID: 3725157555-1266345863
                                        • Opcode ID: c333885c6cad1c558b64e30484895d0202c60523ea27ceda5659a018fd8b8999
                                        • Instruction ID: e55c9720281ecb809ebd1bacbcebeb619ed93caf2e41fc5f5f31c2888ccd1813
                                        • Opcode Fuzzy Hash: c333885c6cad1c558b64e30484895d0202c60523ea27ceda5659a018fd8b8999
                                        • Instruction Fuzzy Hash: 71112E71A1578482EA51EF20E4517EEA361FB8A740FC01039BA4D42ADADF3DC60ACB42
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.510674284.000000013FBD1000.00000020.00000001.01000000.00000007.sdmp, Offset: 000000013FBD0000, based on PE: true
                                        • Associated: 0000000A.00000002.510671270.000000013FBD0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510679359.000000013FBFE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510683405.000000013FC0F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510686501.000000013FC10000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.510689610.000000013FC12000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_13fbd0000_iTunesHelper.jbxd
                                        Similarity
                                        • API ID: CreateEventSleep
                                        • String ID: DoMsgPump
                                        • API String ID: 3100162736-4138071542
                                        • Opcode ID: 2d7793d109980c7dbfb0a621cef23f39ab30e487b54f1aab22f7992a423727f4
                                        • Instruction ID: 474594af97566ead23120ecbf6045bbf0b5fb8312db7998465b369f6216a9e49
                                        • Opcode Fuzzy Hash: 2d7793d109980c7dbfb0a621cef23f39ab30e487b54f1aab22f7992a423727f4
                                        • Instruction Fuzzy Hash: 21F044B1F1474082F7545F61F5807E99252F744780F495138EA0647FC9DB79C6968316
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:3.2%
                                        Dynamic/Decrypted Code Coverage:17.8%
                                        Signature Coverage:2.1%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:117
                                        execution_graph 137002 4c6cae4 137003 4c6caec 137002->137003 137003->137003 137150 4c167d4 137003->137150 137012 4c6cb6a 137183 4c42d60 137012->137183 137151 4c167e5 137150->137151 137442 4c140dc 137151->137442 137154 4c14450 137155 4c14454 137154->137155 137158 4c14464 137154->137158 137155->137158 137473 4c144c0 137155->137473 137156 4c14492 137160 4c44d14 GetModuleHandleA 137156->137160 137158->137156 137478 4c12a58 7 API calls 137158->137478 137161 4c44d44 LoadLibraryA 137160->137161 137162 4c44d59 137161->137162 137163 4c4411c 137162->137163 137164 4c4412c 137163->137164 137165 4c44140 137164->137165 137480 4c440d0 137164->137480 137484 4c143fc 137165->137484 137169 4c40b2c 137170 4c40b41 137169->137170 137171 4c40b82 137170->137171 137489 4c14930 137170->137489 137501 4c14420 137171->137501 137178 4c43878 137507 4c437d8 Sleep 137178->137507 137180 4c43882 137508 4c43d9c 137180->137508 137182 4c4388e 137182->137012 137184 4c42d68 137183->137184 137184->137184 137510 4c42aec 137184->137510 137443 4c1410f 137442->137443 137446 4c1406c 137443->137446 137447 4c140b7 137446->137447 137448 4c14081 137446->137448 137447->137154 137448->137447 137450 4c15974 137448->137450 137451 4c15984 GetModuleFileNameA 137450->137451 137452 4c159a0 137450->137452 137454 4c15c08 GetModuleFileNameA RegOpenKeyExA 137451->137454 137452->137448 137455 4c15c8a 137454->137455 137456 4c15c4a RegOpenKeyExA 137454->137456 137472 4c15a30 6 API calls 137455->137472 137456->137455 137457 4c15c68 RegOpenKeyExA 137456->137457 137457->137455 137459 4c15d13 lstrcpyn GetThreadLocale GetLocaleInfoA 137457->137459 137463 4c15e43 137459->137463 137464 4c15d4a 137459->137464 137460 4c15caf RegQueryValueExA 137461 4c15cf1 RegCloseKey 137460->137461 137462 4c15ccf RegQueryValueExA 137460->137462 137461->137452 137462->137461 137466 4c15ced 137462->137466 137463->137452 137464->137463 137465 4c15d5a lstrlen 137464->137465 137467 4c15d73 137465->137467 137466->137461 137467->137463 137468 4c15da1 lstrcpyn LoadLibraryExA 137467->137468 137469 4c15dcd 137467->137469 137468->137469 137469->137463 137470 4c15dd7 lstrcpyn LoadLibraryExA 137469->137470 137470->137463 137471 4c15e0d lstrcpyn LoadLibraryExA 137470->137471 137471->137463 137472->137460 137474 4c144c4 137473->137474 137475 4c144e8 137473->137475 137479 4c12a28 7 API calls 137474->137479 137475->137158 137477 4c144d1 137477->137158 137478->137156 137479->137477 137481 4c440e0 137480->137481 137482 4c143fc 7 API calls 137481->137482 137483 4c4410d 137482->137483 137483->137165 137485 4c14402 137484->137485 137486 4c1441d 137484->137486 137485->137486 137488 4c12a58 7 API calls 137485->137488 137486->137012 137486->137169 137488->137486 137490 4c148e4 137489->137490 137491 4c1491f 137490->137491 137492 4c144c0 7 API calls 137490->137492 137495 4c40a98 137491->137495 137493 4c148fb 137492->137493 137493->137491 137505 4c12a58 7 API calls 137493->137505 137496 4c40ab1 137495->137496 137497 4c40b06 137496->137497 137500 4c40afa CloseHandle 137496->137500 137498 4c143fc 7 API calls 137497->137498 137499 4c40b1b Sleep 137498->137499 137499->137171 137500->137497 137503 4c14426 137501->137503 137502 4c1444c 137502->137178 137503->137502 137506 4c12a58 7 API calls 137503->137506 137505->137491 137506->137503 137507->137180 137509 4c43db3 TerminateProcess 137508->137509 137509->137182 137547 4c4156c 137510->137547 137512 4c42b04 137513 4c42b68 137512->137513 137514 4c4156c 9 API calls 137513->137514 137515 4c42b93 137514->137515 137516 4c42ba3 137515->137516 137517 4c42b98 137515->137517 137519 4c14450 7 API calls 137516->137519 137557 4c410bc 7 API calls 137517->137557 137520 4c42ba1 137519->137520 137553 4c18690 137520->137553 137523 4c14798 7 API calls 137524 4c42bdb 137523->137524 137525 4c143fc 7 API calls 137524->137525 137526 4c42bf0 137525->137526 137527 4c42cd8 137526->137527 137528 4c42d03 137527->137528 137529 4c42d37 137528->137529 137530 4c42d1b 137528->137530 137532 4c143fc 7 API calls 137529->137532 137566 4c14a6c SysFreeString SysAllocStringLen SysFreeString 137530->137566 137534 4c42d35 137532->137534 137533 4c42d2b 137567 4c4132c 8 API calls 137533->137567 137563 4c14a9c 137534->137563 137538 4c14798 137539 4c147a9 137538->137539 137540 4c147e6 137539->137540 137541 4c147cf 137539->137541 137543 4c144c0 7 API calls 137540->137543 137568 4c14a08 137541->137568 137544 4c147dc 137543->137544 137545 4c14817 137544->137545 137546 4c14450 7 API calls 137544->137546 137546->137545 137548 4c143fc 7 API calls 137547->137548 137550 4c41589 137548->137550 137549 4c415fa RegCloseKey 137549->137512 137550->137549 137551 4c415d4 RegQueryValueExA 137550->137551 137551->137549 137552 4c415e2 137551->137552 137552->137549 137554 4c186a6 137553->137554 137558 4c144ec 137554->137558 137557->137520 137559 4c144c0 7 API calls 137558->137559 137560 4c144fc 137559->137560 137561 4c143fc 7 API calls 137560->137561 137562 4c14514 137561->137562 137562->137523 137564 4c14ab0 137563->137564 137565 4c14aa2 SysFreeString 137563->137565 137564->137538 137565->137564 137566->137533 137567->137534 137569 4c14a15 137568->137569 137573 4c14a45 137568->137573 137571 4c14a21 137569->137571 137572 4c144c0 7 API calls 137569->137572 137570 4c143fc 7 API calls 137570->137571 137571->137544 137572->137573 137573->137570 137796 fbe438 137800 f85ede Mailbox _memmove 137796->137800 137809 f85569 Mailbox 137800->137809 137829 f85447 Mailbox 137800->137829 137833 fa0fe6 60 API calls Mailbox 137800->137833 137834 f86a9b 137800->137834 137837 f86abc 137800->137837 137838 fbeff9 137800->137838 137840 fd7aad 60 API calls 137800->137840 137841 fbf007 137800->137841 137843 fbefeb 137800->137843 137851 f853b0 137800->137851 137878 fe8cd0 137800->137878 137882 fe413a 137800->137882 137885 f942cf 137800->137885 137889 f8d679 137800->137889 137929 ffe60c 137800->137929 137932 f93df7 137800->137932 137941 ff4b25 137800->137941 137950 ffc9c9 137800->137950 137982 f91c9c 137800->137982 137988 f85190 60 API calls Mailbox 137800->137988 137989 f8523c 60 API calls 137800->137989 137991 ffc87c 86 API calls 2 library calls 137800->137991 137992 fe7f11 60 API calls Mailbox 137800->137992 137993 f91a36 137800->137993 137997 ffc355 318 API calls Mailbox 137800->137997 137998 fd6cf1 60 API calls Mailbox 137800->137998 137803 fa0fe6 60 API calls Mailbox 137803->137829 137804 f869fa 137813 f91c9c 60 API calls 137804->137813 137808 f91c9c 60 API calls 137808->137829 137810 fbe691 137999 fea48d 90 API calls 4 library calls 137810->137999 137811 fbea9a 137817 f91c9c 60 API calls 137811->137817 137813->137809 137816 f91207 60 API calls 137816->137829 137817->137809 137818 f869ff 138007 fea48d 90 API calls 4 library calls 137818->138007 137819 fbe6a0 137820 fbeb67 137820->137809 138000 fd7aad 60 API calls 137820->138000 137822 fa2f70 68 API calls __cinit 137822->137829 137824 fd7aad 60 API calls 137824->137829 137829->137803 137829->137804 137829->137808 137829->137809 137829->137810 137829->137811 137829->137816 137829->137818 137829->137820 137829->137822 137829->137824 137830 fbef28 137829->137830 137832 f85a1a 137829->137832 137986 f87e50 318 API calls 2 library calls 137829->137986 137987 f86e30 61 API calls Mailbox 137829->137987 138001 fea48d 90 API calls 4 library calls 137830->138001 138006 fea48d 90 API calls 4 library calls 137832->138006 137833->137800 137990 f8a9de 318 API calls 137834->137990 138002 fea48d 90 API calls 4 library calls 137837->138002 138004 f85190 60 API calls Mailbox 137838->138004 137840->137800 138005 fea48d 90 API calls 4 library calls 137841->138005 137843->137809 138003 fd6cf1 60 API calls Mailbox 137843->138003 137852 f853cf 137851->137852 137873 f853fd Mailbox 137851->137873 138008 fa0fe6 137852->138008 137853 fa2f70 68 API calls __cinit 137853->137873 137855 f869fa 137856 f91c9c 60 API calls 137855->137856 137874 f85569 Mailbox 137856->137874 137857 fa0fe6 60 API calls Mailbox 137857->137873 137858 fd7aad 60 API calls 137858->137873 137859 f869ff 138024 fea48d 90 API calls 4 library calls 137859->138024 137862 f91c9c 60 API calls 137862->137873 137863 fbe691 138020 fea48d 90 API calls 4 library calls 137863->138020 137864 fbea9a 137868 f91c9c 60 API calls 137864->137868 137866 f91207 60 API calls 137866->137873 137868->137874 137870 fbe6a0 137870->137800 137871 fbeb67 137871->137874 138021 fd7aad 60 API calls 137871->138021 137873->137853 137873->137855 137873->137857 137873->137858 137873->137859 137873->137862 137873->137863 137873->137864 137873->137866 137873->137871 137873->137874 137875 fbef28 137873->137875 137877 f85a1a 137873->137877 138018 f87e50 318 API calls 2 library calls 137873->138018 138019 f86e30 61 API calls Mailbox 137873->138019 137874->137800 138022 fea48d 90 API calls 4 library calls 137875->138022 138023 fea48d 90 API calls 4 library calls 137877->138023 137879 fe8cd9 137878->137879 137881 fe8cde 137878->137881 138053 fe7d6e 137879->138053 137881->137800 138076 fe494a GetFileAttributesW 137882->138076 137886 f942d9 137885->137886 137887 f942e8 137885->137887 137886->137800 137887->137886 137888 f942ed CloseHandle 137887->137888 137888->137886 138080 f84f98 137889->138080 137893 fa0fe6 Mailbox 60 API calls 137894 f8d6aa 137893->137894 137897 f8d6ba 137894->137897 137898 f93df7 61 API calls 137894->137898 137895 f8d6df 137905 f8d6ec 137895->137905 138157 f8502b 137895->138157 137896 fc5068 137896->137895 138164 fefbb7 60 API calls 137896->138164 138093 f84d37 137897->138093 137898->137897 137903 fc50b0 137903->137905 137906 fc50b8 137903->137906 138124 f941d6 137905->138124 137907 f8502b 60 API calls 137906->137907 137910 f8d6f3 137907->137910 137911 f8d70d 137910->137911 137912 fc50ca 137910->137912 138129 f91207 137911->138129 137913 fa0fe6 Mailbox 60 API calls 137912->137913 137915 fc50d0 137913->137915 137918 fc50e4 137915->137918 138165 f93ea1 ReadFile SetFilePointerEx 137915->138165 137923 fc50e8 _memmove 137918->137923 138166 fe7c7f 60 API calls 2 library calls 137918->138166 137919 f8d724 137919->137923 138161 f84f3c 60 API calls Mailbox 137919->138161 137924 f8d738 Mailbox 137925 f8d772 137924->137925 137926 f942cf CloseHandle 137924->137926 137925->137800 137927 f8d766 137926->137927 137927->137925 138162 f93f0b CloseHandle 137927->138162 138265 ffd1c6 137929->138265 137931 ffe61c 137931->137800 137933 fa0fe6 Mailbox 60 API calls 137932->137933 137934 f93e07 137933->137934 137935 f942cf CloseHandle 137934->137935 137936 f93e12 137935->137936 137937 f91207 60 API calls 137936->137937 137938 f93e1a 137937->137938 137939 f942cf CloseHandle 137938->137939 137940 f93e21 137939->137940 137940->137800 137942 f84d37 85 API calls 137941->137942 137943 ff4b5f 137942->137943 138377 f920e0 137943->138377 137945 ff4b6f 137946 ff4b94 137945->137946 137947 f853b0 318 API calls 137945->137947 137948 f84f98 60 API calls 137946->137948 137949 ff4b98 137946->137949 137947->137946 137948->137949 137949->137800 137951 f91207 60 API calls 137950->137951 137952 ffc9dd 137951->137952 137953 f91207 60 API calls 137952->137953 137954 ffc9e5 137953->137954 137955 f91207 60 API calls 137954->137955 137956 ffc9ed 137955->137956 137957 f84d37 85 API calls 137956->137957 137970 ffc9fb 137957->137970 137958 f91821 60 API calls 137958->137970 137959 ffcbe4 137960 ffcc11 Mailbox 137959->137960 138440 f84f3c 60 API calls Mailbox 137959->138440 137960->137800 137962 ffcbcb 138424 f91900 137962->138424 137963 ffcbe6 137968 f91900 60 API calls 137963->137968 137964 f91c9c 60 API calls 137964->137970 137967 f9153b 60 API calls 137967->137970 137969 ffcbf5 137968->137969 137973 f917e0 60 API calls 137969->137973 137970->137958 137970->137959 137970->137960 137970->137962 137970->137963 137970->137964 137970->137967 137971 f91aa4 60 API calls 137970->137971 137974 f91aa4 60 API calls 137970->137974 137979 f91900 60 API calls 137970->137979 137980 f84d37 85 API calls 137970->137980 137981 f917e0 60 API calls 137970->137981 137975 ffca92 CharUpperBuffW 137971->137975 137973->137959 137976 ffcb52 CharUpperBuffW 137974->137976 138422 f83938 69 API calls 137975->138422 138423 f87b3f 69 API calls 2 library calls 137976->138423 137979->137970 137980->137970 137981->137970 137983 f91caf 137982->137983 137984 f91ca7 137982->137984 137983->137800 138453 f91bcc 60 API calls 2 library calls 137984->138453 137986->137829 137987->137829 137988->137800 137989->137800 137990->137837 137991->137800 137992->137800 137994 f91a45 __NMSG_WRITE _memmove 137993->137994 137995 fa0fe6 Mailbox 60 API calls 137994->137995 137996 f91a83 137995->137996 137996->137800 137997->137800 137998->137800 137999->137819 138000->137809 138001->137832 138002->137843 138003->137809 138004->137843 138005->137843 138006->137809 138007->137809 138011 fa0fee 138008->138011 138010 fa1008 138010->137873 138011->138010 138013 fa100c std::exception::exception 138011->138013 138025 fa593c 138011->138025 138042 fa35d1 DecodePointer 138011->138042 138043 fa87cb RaiseException 138013->138043 138015 fa1036 138044 fa8701 59 API calls _free 138015->138044 138017 fa1048 138017->137873 138018->137873 138019->137873 138020->137870 138021->137874 138022->137877 138023->137874 138024->137874 138026 fa59b7 138025->138026 138035 fa5948 138025->138035 138051 fa35d1 DecodePointer 138026->138051 138028 fa59bd 138052 fa8d58 59 API calls __getptd_noexit 138028->138052 138031 fa597b RtlAllocateHeap 138031->138035 138041 fa59af 138031->138041 138033 fa5953 138033->138035 138045 faa39b 59 API calls 2 library calls 138033->138045 138046 faa3f8 59 API calls 6 library calls 138033->138046 138047 fa32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 138033->138047 138034 fa59a3 138049 fa8d58 59 API calls __getptd_noexit 138034->138049 138035->138031 138035->138033 138035->138034 138039 fa59a1 138035->138039 138048 fa35d1 DecodePointer 138035->138048 138050 fa8d58 59 API calls __getptd_noexit 138039->138050 138041->138011 138042->138011 138043->138015 138044->138017 138045->138033 138046->138033 138048->138035 138049->138039 138050->138041 138051->138028 138052->138041 138054 fe7d85 138053->138054 138071 fe7ea5 138053->138071 138055 fe7d9d 138054->138055 138057 fe7dc5 138054->138057 138061 fe7ddc 138054->138061 138055->138057 138059 fe7dad 138055->138059 138056 fa0fe6 Mailbox 60 API calls 138058 fe7dbb Mailbox _memmove 138056->138058 138057->138056 138069 fa0fe6 Mailbox 60 API calls 138058->138069 138067 fa0fe6 Mailbox 60 API calls 138059->138067 138060 fe7df9 138060->138058 138062 fe7e24 138060->138062 138063 fe7e32 138060->138063 138061->138060 138064 fa0fe6 Mailbox 60 API calls 138061->138064 138065 fa0fe6 Mailbox 60 API calls 138062->138065 138066 fa0fe6 Mailbox 60 API calls 138063->138066 138064->138060 138065->138058 138068 fe7e38 138066->138068 138067->138058 138074 fe7a26 60 API calls Mailbox 138068->138074 138069->138071 138071->137881 138072 fe7e44 138075 f9402a 62 API calls Mailbox 138072->138075 138074->138072 138075->138058 138077 fe413f 138076->138077 138078 fe4965 FindFirstFileW 138076->138078 138077->137800 138078->138077 138079 fe497a FindClose 138078->138079 138079->138077 138081 fbdd2b 138080->138081 138082 f84fa8 138080->138082 138083 fbdd3c 138081->138083 138167 f91821 138081->138167 138087 fa0fe6 Mailbox 60 API calls 138082->138087 138176 f919e1 138083->138176 138086 fbdd46 138090 f84fd4 138086->138090 138091 f91207 60 API calls 138086->138091 138088 f84fbb 138087->138088 138088->138086 138089 f84fc6 138088->138089 138089->138090 138092 f91a36 60 API calls 138089->138092 138090->137893 138090->137896 138091->138090 138092->138090 138094 f84d51 138093->138094 138102 f84d4b 138093->138102 138095 f84d57 __itow 138094->138095 138096 f84d99 138094->138096 138097 fbdb28 __i64tow 138094->138097 138103 fbda2f 138094->138103 138100 fa0fe6 Mailbox 60 API calls 138095->138100 138192 fa38c8 84 API calls 4 library calls 138096->138192 138097->138097 138101 f84d71 138100->138101 138101->138102 138105 f91a36 60 API calls 138101->138105 138111 f93e47 138102->138111 138104 fa0fe6 Mailbox 60 API calls 138103->138104 138109 fbdaa7 Mailbox _wcscpy 138103->138109 138106 fbda74 138104->138106 138105->138102 138107 fa0fe6 Mailbox 60 API calls 138106->138107 138108 fbda9a 138107->138108 138108->138109 138110 f91a36 60 API calls 138108->138110 138193 fa38c8 84 API calls 4 library calls 138109->138193 138110->138109 138112 f942cf CloseHandle 138111->138112 138113 f93e53 138112->138113 138194 f942f9 138113->138194 138115 f8d6d7 138115->137895 138115->137896 138163 f93f0b CloseHandle 138115->138163 138116 f93e72 138116->138115 138202 f93c61 138116->138202 138118 f93e84 138219 f9389f SetFilePointerEx SetFilePointerEx 138118->138219 138120 f93e8b 138120->138115 138121 fd05ab 138120->138121 138220 fe394d SetFilePointerEx SetFilePointerEx WriteFile 138121->138220 138123 fd05db 138123->138115 138125 f9410a 2 API calls 138124->138125 138126 f941f7 138125->138126 138127 f9410a 2 API calls 138126->138127 138128 f9420b 138127->138128 138128->137910 138130 fa0fe6 Mailbox 60 API calls 138129->138130 138131 f91228 138130->138131 138132 fa0fe6 Mailbox 60 API calls 138131->138132 138133 f8d715 138132->138133 138134 f93bc3 138133->138134 138135 f93bce 138134->138135 138136 f93bf3 138134->138136 138135->138136 138138 f93bdd 138135->138138 138137 f919e1 60 API calls 138136->138137 138144 fe3751 138137->138144 138139 f93b7b 138138->138139 138141 f93bed 138138->138141 138241 f940cd 138139->138241 138140 fe3780 138140->137919 138145 f940cd 60 API calls 138141->138145 138144->138140 138253 fe36ed ReadFile SetFilePointerEx 138144->138253 138254 f9153b 60 API calls 2 library calls 138144->138254 138148 fe3871 138145->138148 138150 f93b23 62 API calls 138148->138150 138152 fe387f 138150->138152 138156 fe388f Mailbox 138152->138156 138255 f913f1 62 API calls Mailbox 138152->138255 138155 f93bab Mailbox 138155->137919 138156->137919 138158 f85041 138157->138158 138159 f8503c 138157->138159 138158->137903 138159->138158 138264 fa37ba 60 API calls 138159->138264 138161->137924 138162->137925 138163->137896 138164->137896 138165->137918 138166->137923 138168 f9189a 138167->138168 138169 f9182d __NMSG_WRITE 138167->138169 138184 f91981 138168->138184 138171 f91868 138169->138171 138172 f91843 138169->138172 138181 f91c7e 138171->138181 138180 f91b7c 60 API calls Mailbox 138172->138180 138175 f9184b _memmove 138175->138083 138177 f919fb 138176->138177 138178 f919ee 138176->138178 138179 fa0fe6 Mailbox 60 API calls 138177->138179 138178->138086 138179->138178 138180->138175 138182 fa0fe6 Mailbox 60 API calls 138181->138182 138183 f91c88 138182->138183 138183->138175 138185 f91998 _memmove 138184->138185 138186 f9198f 138184->138186 138185->138175 138186->138185 138188 f91aa4 138186->138188 138189 f91ab7 138188->138189 138191 f91ab4 _memmove 138188->138191 138190 fa0fe6 Mailbox 60 API calls 138189->138190 138190->138191 138191->138185 138192->138095 138193->138097 138195 fd06fc 138194->138195 138196 f94312 CreateFileW 138194->138196 138197 f94334 138195->138197 138198 fd0702 CreateFileW 138195->138198 138196->138197 138197->138116 138198->138197 138199 fd0728 138198->138199 138221 f9410a 138199->138221 138203 fd0549 138202->138203 138204 f93c7c 138202->138204 138208 f941d6 2 API calls 138203->138208 138218 f93d0b 138203->138218 138205 f9410a 2 API calls 138204->138205 138204->138218 138206 f93c9e 138205->138206 138231 f9433f 138206->138231 138208->138218 138210 f93cb5 138211 fa0fe6 Mailbox 60 API calls 138210->138211 138212 f93cc0 138211->138212 138213 f9433f 60 API calls 138212->138213 138214 f93ccb 138213->138214 138234 f94220 138214->138234 138217 f9410a 2 API calls 138217->138218 138218->138118 138219->138120 138220->138123 138228 f94124 138221->138228 138222 fd06cc 138230 f942ae SetFilePointerEx 138222->138230 138223 f941ab SetFilePointerEx 138229 f942ae SetFilePointerEx 138223->138229 138226 fd06e6 138227 f9417f 138227->138197 138228->138222 138228->138223 138228->138227 138229->138227 138230->138226 138232 fa0fe6 Mailbox 60 API calls 138231->138232 138233 f93ca8 138232->138233 138233->138203 138233->138210 138235 f94293 138234->138235 138236 f9422e 138234->138236 138240 f942ae SetFilePointerEx 138235->138240 138237 f93cf8 138236->138237 138239 f94266 ReadFile 138236->138239 138237->138217 138239->138236 138239->138237 138240->138236 138242 fa0fe6 Mailbox 60 API calls 138241->138242 138243 f940e0 138242->138243 138244 f91c7e 60 API calls 138243->138244 138245 f93b8d 138244->138245 138246 f93b23 138245->138246 138256 f93f20 138246->138256 138248 f93b34 138249 f94220 2 API calls 138248->138249 138250 f93b65 138248->138250 138263 f9408f 60 API calls 2 library calls 138248->138263 138249->138248 138250->138155 138252 f9124d 62 API calls Mailbox 138250->138252 138252->138155 138253->138144 138254->138144 138255->138156 138257 f93f31 138256->138257 138258 fd05e0 138256->138258 138257->138248 138259 f91c7e 60 API calls 138258->138259 138260 fd05ea 138259->138260 138261 fa0fe6 Mailbox 60 API calls 138260->138261 138262 fd05f6 138261->138262 138263->138248 138264->138158 138266 f84d37 85 API calls 138265->138266 138267 ffd203 138266->138267 138291 ffd24a Mailbox 138267->138291 138303 ffde8e 138267->138303 138269 ffd4a2 138270 ffd617 138269->138270 138274 ffd4b0 138269->138274 138353 ffdfb1 93 API calls Mailbox 138270->138353 138273 ffd626 138273->138274 138276 ffd632 138273->138276 138316 ffd057 138274->138316 138275 f84d37 85 API calls 138286 ffd29b Mailbox 138275->138286 138276->138291 138281 ffd4e9 138331 fa0e38 138281->138331 138284 ffd51c 138338 f847be 138284->138338 138285 ffd503 138337 fea48d 90 API calls 4 library calls 138285->138337 138286->138269 138286->138275 138286->138291 138335 fefc0d 60 API calls 2 library calls 138286->138335 138336 ffd6c8 62 API calls 2 library calls 138286->138336 138289 ffd50e GetCurrentProcess TerminateProcess 138289->138284 138291->137931 138295 ffd68d 138295->138291 138299 ffd6a1 FreeLibrary 138295->138299 138296 ffd554 138350 ffdd32 108 API calls _free 138296->138350 138299->138291 138302 ffd565 138302->138295 138351 f84230 60 API calls Mailbox 138302->138351 138352 f8523c 60 API calls 138302->138352 138354 ffdd32 108 API calls _free 138302->138354 138304 f91aa4 60 API calls 138303->138304 138305 ffdea9 CharLowerBuffW 138304->138305 138355 fdf903 138305->138355 138309 f91207 60 API calls 138310 ffdee2 138309->138310 138362 f91462 60 API calls 2 library calls 138310->138362 138312 ffdef9 138313 f91981 60 API calls 138312->138313 138314 ffdf05 Mailbox 138313->138314 138315 ffdf41 Mailbox 138314->138315 138363 ffd6c8 62 API calls 2 library calls 138314->138363 138315->138286 138317 ffd072 138316->138317 138321 ffd0c7 138316->138321 138318 fa0fe6 Mailbox 60 API calls 138317->138318 138320 ffd094 138318->138320 138319 fa0fe6 Mailbox 60 API calls 138319->138320 138320->138319 138320->138321 138322 ffe139 138321->138322 138323 ffe362 Mailbox 138322->138323 138330 ffe15c _strcat _wcscpy __NMSG_WRITE 138322->138330 138323->138281 138324 f850d5 60 API calls 138324->138330 138325 f8502b 60 API calls 138325->138330 138326 f85087 60 API calls 138326->138330 138327 f84d37 85 API calls 138327->138330 138328 fa593c 59 API calls __crtGetStringTypeA_stat 138328->138330 138330->138323 138330->138324 138330->138325 138330->138326 138330->138327 138330->138328 138366 fe5e42 62 API calls 2 library calls 138330->138366 138332 fa0e4d 138331->138332 138333 fa0ee5 VirtualProtect 138332->138333 138334 fa0eb3 138332->138334 138333->138334 138334->138284 138334->138285 138335->138286 138336->138286 138337->138289 138339 f847c6 138338->138339 138340 fa0fe6 Mailbox 60 API calls 138339->138340 138341 f847d4 138340->138341 138342 f847e0 138341->138342 138367 f846ec 60 API calls Mailbox 138341->138367 138344 f84540 138342->138344 138368 f84650 138344->138368 138346 f8454f 138347 fa0fe6 Mailbox 60 API calls 138346->138347 138348 f845eb 138346->138348 138347->138348 138348->138302 138349 f84230 60 API calls Mailbox 138348->138349 138349->138296 138350->138302 138351->138302 138352->138302 138353->138273 138354->138302 138356 fdf92e __NMSG_WRITE 138355->138356 138357 fdf96d 138356->138357 138359 fdfa14 138356->138359 138361 fdf963 138356->138361 138357->138309 138357->138314 138359->138357 138365 f914db 62 API calls 138359->138365 138361->138357 138364 f914db 62 API calls 138361->138364 138362->138312 138363->138315 138364->138361 138365->138359 138366->138330 138367->138342 138369 f84659 Mailbox 138368->138369 138370 fbd6ec 138369->138370 138374 f84663 138369->138374 138371 fa0fe6 Mailbox 60 API calls 138370->138371 138373 fbd6f8 138371->138373 138372 f8466a 138372->138346 138374->138372 138376 f85190 60 API calls Mailbox 138374->138376 138376->138374 138403 f9162d 138377->138403 138379 f9230d 138410 f9343f 138379->138410 138382 f92327 Mailbox 138382->137945 138384 fcf885 138420 fe0065 92 API calls 4 library calls 138384->138420 138385 f919e1 60 API calls 138395 f92105 _memmove 138385->138395 138387 f9343f 60 API calls 138387->138395 138390 fcf893 138391 f9343f 60 API calls 138390->138391 138392 fcf8a9 138391->138392 138392->138382 138393 fcf754 138394 f91c7e 60 API calls 138393->138394 138397 fcf75f 138394->138397 138395->138379 138395->138384 138395->138385 138395->138387 138395->138393 138398 fcf7b4 138395->138398 138399 f91aa4 60 API calls 138395->138399 138402 f926b7 _memmove 138395->138402 138408 f91e05 61 API calls 138395->138408 138409 f935b9 60 API calls Mailbox 138395->138409 138418 f91d0b 61 API calls 138395->138418 138419 f9153b 60 API calls 2 library calls 138395->138419 138401 fa0fe6 Mailbox 60 API calls 138397->138401 138398->138402 138400 f922de CharUpperBuffW 138399->138400 138400->138395 138401->138402 138402->138398 138421 fe0065 92 API calls 4 library calls 138402->138421 138404 fa0fe6 Mailbox 60 API calls 138403->138404 138405 f91652 138404->138405 138406 fa0fe6 Mailbox 60 API calls 138405->138406 138407 f91660 138406->138407 138407->138395 138408->138395 138409->138395 138411 f934df 138410->138411 138414 f93452 _memmove 138410->138414 138413 fa0fe6 Mailbox 60 API calls 138411->138413 138412 fa0fe6 Mailbox 60 API calls 138415 f93459 138412->138415 138413->138414 138414->138412 138416 fa0fe6 Mailbox 60 API calls 138415->138416 138417 f93482 138415->138417 138416->138417 138417->138382 138418->138395 138419->138395 138420->138390 138421->138382 138422->137970 138423->137970 138425 fcf534 138424->138425 138426 f91914 138424->138426 138428 f91c7e 60 API calls 138425->138428 138441 f918a5 138426->138441 138430 fcf53f __NMSG_WRITE _memmove 138428->138430 138429 f9191f 138431 f917e0 138429->138431 138432 f917f2 138431->138432 138433 fcf401 138431->138433 138446 f91680 138432->138446 138452 fd87f9 60 API calls _memmove 138433->138452 138436 f917fe 138436->137959 138437 fcf40b 138438 f91c9c 60 API calls 138437->138438 138439 fcf413 Mailbox 138438->138439 138440->137960 138442 f918b4 __NMSG_WRITE 138441->138442 138443 f918c5 _memmove 138442->138443 138444 f91c7e 60 API calls 138442->138444 138443->138429 138445 fcf4f1 _memmove 138444->138445 138447 f91692 138446->138447 138450 f916ba _memmove 138446->138450 138448 fa0fe6 Mailbox 60 API calls 138447->138448 138447->138450 138451 f9176f _memmove 138448->138451 138449 fa0fe6 Mailbox 60 API calls 138449->138451 138450->138436 138451->138449 138452->138437 138453->137983 138454 f8107d 138459 f92fc5 138454->138459 138456 f8108c 138490 fa2f70 138456->138490 138460 f92fd5 __write_nolock 138459->138460 138461 f91207 60 API calls 138460->138461 138462 f9308b 138461->138462 138493 fa00cf 138462->138493 138464 f93094 138500 fa08c1 138464->138500 138467 f91900 60 API calls 138468 f930ad 138467->138468 138506 f94c94 138468->138506 138471 f91207 60 API calls 138472 f930c5 138471->138472 138473 f919e1 60 API calls 138472->138473 138474 f930ce RegOpenKeyExW 138473->138474 138475 fd01a3 RegQueryValueExW 138474->138475 138479 f930f0 Mailbox 138474->138479 138476 fd0235 RegCloseKey 138475->138476 138477 fd01c0 138475->138477 138476->138479 138489 fd0247 _wcscat Mailbox __NMSG_WRITE 138476->138489 138478 fa0fe6 Mailbox 60 API calls 138477->138478 138480 fd01d9 138478->138480 138479->138456 138481 f9433f 60 API calls 138480->138481 138482 fd01e4 RegQueryValueExW 138481->138482 138483 fd0201 138482->138483 138486 fd021b 138482->138486 138484 f91821 60 API calls 138483->138484 138484->138486 138485 f91609 60 API calls 138485->138489 138486->138476 138487 f91a36 60 API calls 138487->138489 138488 f94c94 60 API calls 138488->138489 138489->138479 138489->138485 138489->138487 138489->138488 138528 fa2e74 138490->138528 138492 f81096 138512 fb1b70 138493->138512 138496 f91a36 60 API calls 138497 fa0102 138496->138497 138514 fa0284 138497->138514 138499 fa010c Mailbox 138499->138464 138501 fb1b70 __write_nolock 138500->138501 138502 fa08ce GetFullPathNameW 138501->138502 138503 fa08f0 138502->138503 138504 f91821 60 API calls 138503->138504 138505 f9309f 138504->138505 138505->138467 138507 f94ca2 138506->138507 138511 f94cc4 _memmove 138506->138511 138509 fa0fe6 Mailbox 60 API calls 138507->138509 138508 fa0fe6 Mailbox 60 API calls 138510 f930bc 138508->138510 138509->138511 138510->138471 138511->138508 138513 fa00dc GetModuleFileNameW 138512->138513 138513->138496 138515 fb1b70 __write_nolock 138514->138515 138516 fa0291 GetFullPathNameW 138515->138516 138517 fa02cd 138516->138517 138518 fa02b0 138516->138518 138520 f919e1 60 API calls 138517->138520 138519 f91821 60 API calls 138518->138519 138521 fa02bc 138519->138521 138520->138521 138524 f9133d 138521->138524 138525 f9134b 138524->138525 138526 f91981 60 API calls 138525->138526 138527 f9135b 138526->138527 138527->138499 138529 fa2e80 __lseeki64 138528->138529 138536 fa3447 138529->138536 138535 fa2ea7 __lseeki64 138535->138492 138553 fa9e3b 138536->138553 138538 fa2e89 138539 fa2eb8 RtlDecodePointer DecodePointer 138538->138539 138540 fa2e95 138539->138540 138541 fa2ee5 138539->138541 138550 fa2eb2 138540->138550 138541->138540 138601 fa89d4 60 API calls 2 library calls 138541->138601 138543 fa2f48 EncodePointer EncodePointer 138543->138540 138544 fa2f1c 138544->138540 138548 fa2f36 EncodePointer 138544->138548 138603 fa8a94 62 API calls 2 library calls 138544->138603 138545 fa2ef7 138545->138543 138545->138544 138602 fa8a94 62 API calls 2 library calls 138545->138602 138548->138543 138549 fa2f30 138549->138540 138549->138548 138604 fa3450 138550->138604 138554 fa9e5f EnterCriticalSection 138553->138554 138555 fa9e4c 138553->138555 138554->138538 138560 fa9ec3 138555->138560 138557 fa9e52 138557->138554 138584 fa32e5 59 API calls 3 library calls 138557->138584 138561 fa9ecf __lseeki64 138560->138561 138562 fa9ed8 138561->138562 138563 fa9ef0 138561->138563 138585 faa39b 59 API calls 2 library calls 138562->138585 138572 fa9f11 __lseeki64 138563->138572 138588 fa8a4d 59 API calls 2 library calls 138563->138588 138566 fa9edd 138586 faa3f8 59 API calls 6 library calls 138566->138586 138567 fa9f05 138570 fa9f1b 138567->138570 138571 fa9f0c 138567->138571 138569 fa9ee4 138587 fa32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 138569->138587 138575 fa9e3b __lock 59 API calls 138570->138575 138589 fa8d58 59 API calls __getptd_noexit 138571->138589 138572->138557 138577 fa9f22 138575->138577 138578 fa9f2f 138577->138578 138579 fa9f47 138577->138579 138590 faa05b 138578->138590 138593 fa2f85 138579->138593 138582 fa9f3b 138599 fa9f63 LeaveCriticalSection _doexit 138582->138599 138585->138566 138586->138569 138588->138567 138589->138572 138591 faa06b InitializeCriticalSectionEx 138590->138591 138592 faa078 InitializeCriticalSectionAndSpinCount 138590->138592 138591->138582 138592->138582 138594 fa2fb7 _free 138593->138594 138595 fa2f8e HeapFree 138593->138595 138594->138582 138595->138594 138596 fa2fa3 138595->138596 138600 fa8d58 59 API calls __getptd_noexit 138596->138600 138598 fa2fa9 GetLastError 138598->138594 138599->138572 138600->138598 138601->138545 138602->138544 138603->138549 138607 fa9fa5 LeaveCriticalSection 138604->138607 138606 fa2eb7 138606->138535 138607->138606 138608 381bde6 138611 3825ddd 138608->138611 138617 3825ff3 138611->138617 138613 381bdf2 138614 3825dec 138614->138613 138620 381e819 138614->138620 138658 381e7e9 138614->138658 138696 382618a GetPEB 138617->138696 138619 3825fff 138619->138614 138621 381e821 138620->138621 138698 381d47d 138621->138698 138626 381e868 MessageBoxA 138627 381e87b 138626->138627 138712 381e0b5 138627->138712 138630 381d47d 4 API calls 138631 381e895 138630->138631 138632 381e8d2 138631->138632 138753 381e789 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138631->138753 138633 381e8db MessageBoxA 138632->138633 138634 381e8ee 138632->138634 138633->138634 138720 381e5f9 138634->138720 138636 381e8ab 138638 381d47d 4 API calls 138636->138638 138640 381e8b8 138638->138640 138642 381e0b5 4 API calls 138640->138642 138641 381d47d 4 API calls 138643 381e911 138641->138643 138644 381e8c5 138642->138644 138735 381e195 138643->138735 138646 381d47d 4 API calls 138644->138646 138646->138632 138647 381e924 138648 381d47d 4 API calls 138647->138648 138649 381e931 138648->138649 138747 381e2c9 138649->138747 138659 381e821 138658->138659 138660 381d47d 4 API calls 138659->138660 138661 381e850 138660->138661 138662 381d10d 12 API calls 138661->138662 138663 381e85f 138662->138663 138664 381e868 MessageBoxA 138663->138664 138665 381e87b 138663->138665 138664->138665 138666 381e0b5 4 API calls 138665->138666 138667 381e888 138666->138667 138668 381d47d 4 API calls 138667->138668 138669 381e895 138668->138669 138670 381e8d2 138669->138670 138836 381e789 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138669->138836 138671 381e8db MessageBoxA 138670->138671 138672 381e8ee 138670->138672 138671->138672 138675 381e5f9 4 API calls 138672->138675 138674 381e8ab 138676 381d47d 4 API calls 138674->138676 138677 381e901 138675->138677 138678 381e8b8 138676->138678 138679 381d47d 4 API calls 138677->138679 138680 381e0b5 4 API calls 138678->138680 138681 381e911 138679->138681 138682 381e8c5 138680->138682 138683 381e195 4 API calls 138681->138683 138684 381d47d 4 API calls 138682->138684 138685 381e924 138683->138685 138684->138670 138686 381d47d 4 API calls 138685->138686 138687 381e931 138686->138687 138688 381e2c9 5 API calls 138687->138688 138689 381e93b 138688->138689 138690 381d429 4 API calls 138689->138690 138691 381e950 138690->138691 138837 381dc9d FreeLibrary ExitProcess LocalAlloc TlsGetValue 138691->138837 138693 381e95e 138694 381d44d 4 API calls 138693->138694 138695 381e96b 138694->138695 138695->138613 138697 382619d 138696->138697 138697->138619 138699 381d481 138698->138699 138702 381d491 138698->138702 138699->138702 138754 381d4e9 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138699->138754 138700 381d4bd 138704 381d10d 138700->138704 138702->138700 138755 381cef5 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138702->138755 138756 381d429 138704->138756 138707 381d125 138760 381d515 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138707->138760 138710 381d141 138710->138626 138710->138627 138711 381d143 138711->138710 138761 381d021 12 API calls 138711->138761 138713 381e0c9 138712->138713 138763 381e015 138713->138763 138716 381e0f8 138718 381d429 4 API calls 138716->138718 138719 381e10d 138718->138719 138719->138630 138721 381e617 138720->138721 138779 381d4c1 138721->138779 138725 381e69e 138786 381d44d 138725->138786 138727 381e64e 138727->138725 138729 381dc91 4 API calls 138727->138729 138733 381e67b 138729->138733 138730 381e691 138732 381d47d 4 API calls 138730->138732 138732->138725 138733->138725 138733->138730 138790 381d5c9 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138733->138790 138791 381d609 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138733->138791 138736 381e1bf 138735->138736 138737 381dc91 4 API calls 138736->138737 138738 381e1d3 138737->138738 138739 381dc91 4 API calls 138738->138739 138740 381e209 138739->138740 138813 381e145 138740->138813 138742 381e22f 138817 381d699 138742->138817 138744 381e297 138744->138647 138746 381e240 138746->138744 138826 381d5c1 138746->138826 138748 381e2e6 138747->138748 138749 381d5c1 4 API calls 138748->138749 138750 381e2ff 138749->138750 138751 381e4b7 138750->138751 138752 381e459 GetProcAddress 138750->138752 138752->138750 138753->138636 138754->138702 138755->138700 138757 381d121 138756->138757 138758 381d42f 138756->138758 138757->138707 138757->138711 138758->138757 138762 381cef5 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138758->138762 138760->138710 138761->138711 138762->138757 138765 381e02a 138763->138765 138764 381d429 4 API calls 138766 381e0a3 138764->138766 138768 381e072 138765->138768 138770 381cedd 138765->138770 138766->138716 138769 381d515 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138766->138769 138768->138764 138769->138716 138771 381ceeb 138770->138771 138773 381cee1 138770->138773 138771->138768 138772 381cf8e 138778 381cf5d FreeLibrary ExitProcess 138772->138778 138773->138771 138773->138772 138777 381de89 LocalAlloc TlsGetValue 138773->138777 138776 381cfb0 138776->138768 138777->138772 138778->138776 138781 381d4c5 138779->138781 138780 381d4e7 138783 381dc91 138780->138783 138781->138780 138792 381cef5 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138781->138792 138793 381db05 138783->138793 138787 381d453 138786->138787 138788 381d478 138787->138788 138812 381cef5 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138787->138812 138788->138641 138790->138733 138791->138733 138792->138780 138794 381db24 138793->138794 138799 381db3e 138793->138799 138795 381db2f 138794->138795 138808 381cf69 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138794->138808 138809 381dafd FreeLibrary ExitProcess LocalAlloc TlsGetValue 138795->138809 138798 381db39 138798->138727 138800 381db88 138799->138800 138810 381cf69 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138799->138810 138801 381db95 138800->138801 138803 381dbca 138800->138803 138811 381cf0d FreeLibrary ExitProcess LocalAlloc TlsGetValue 138801->138811 138805 381cedd 4 API calls 138803->138805 138806 381dbc5 138805->138806 138806->138798 138807 381db05 4 API calls 138806->138807 138807->138806 138808->138795 138809->138798 138810->138800 138811->138806 138812->138787 138814 381e158 138813->138814 138815 381dc91 4 API calls 138814->138815 138816 381e16e 138815->138816 138816->138742 138818 381d6a6 138817->138818 138825 381d6d6 138817->138825 138820 381d6cf 138818->138820 138822 381d6b2 138818->138822 138819 381d429 4 API calls 138821 381d6c0 138819->138821 138833 381d4e9 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138820->138833 138821->138746 138832 381cf0d FreeLibrary ExitProcess LocalAlloc TlsGetValue 138822->138832 138825->138819 138827 381d579 138826->138827 138828 381d5b3 138827->138828 138834 381d4e9 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138827->138834 138828->138746 138830 381d590 138830->138828 138835 381cef5 FreeLibrary ExitProcess LocalAlloc TlsGetValue 138830->138835 138832->138821 138833->138825 138834->138830 138835->138828 138836->138674 138837->138693 138838 381ce8b RtlAllocateHeap 138839 f81055 138844 f82a19 138839->138844 138842 fa2f70 __cinit 68 API calls 138843 f81064 138842->138843 138845 f91207 60 API calls 138844->138845 138846 f82a87 138845->138846 138852 f81256 138846->138852 138848 fbc3aa 138850 f82b24 138850->138848 138851 f8105a 138850->138851 138855 f813f8 138850->138855 138851->138842 138861 f81284 138852->138861 138856 f81430 138855->138856 138860 f8140a _memmove 138855->138860 138858 fa0fe6 Mailbox 60 API calls 138856->138858 138857 fa0fe6 Mailbox 60 API calls 138859 f81410 138857->138859 138858->138860 138859->138850 138860->138857 138862 f81291 138861->138862 138863 f81275 138861->138863 138862->138863 138864 f81298 RegOpenKeyExW 138862->138864 138863->138850 138864->138863 138865 f812b2 RegQueryValueExW 138864->138865 138866 f812e8 RegCloseKey 138865->138866 138867 f812d3 138865->138867 138866->138863 138867->138866 138868 f81016 138873 f95ce7 138868->138873 138871 fa2f70 __cinit 68 API calls 138872 f81025 138871->138872 138874 fa0fe6 Mailbox 60 API calls 138873->138874 138875 f95cef 138874->138875 138876 f8101b 138875->138876 138880 f95f39 138875->138880 138876->138871 138881 f95f42 138880->138881 138883 f95cfb 138880->138883 138882 fa2f70 __cinit 68 API calls 138881->138882 138882->138883 138884 f95d13 138883->138884 138885 f91207 60 API calls 138884->138885 138886 f95d2b GetVersionExW 138885->138886 138887 f91821 60 API calls 138886->138887 138888 f95d6e 138887->138888 138889 f91981 60 API calls 138888->138889 138892 f95d9b 138888->138892 138890 f95d8f 138889->138890 138891 f9133d 60 API calls 138890->138891 138891->138892 138893 f95e00 GetCurrentProcess IsWow64Process 138892->138893 138895 fd1098 138892->138895 138894 f95e19 138893->138894 138896 f95e98 GetSystemInfo 138894->138896 138897 f95e2f 138894->138897 138899 f95e65 138896->138899 138908 f955f0 138897->138908 138899->138876 138901 f95e8c GetSystemInfo 138904 f95e56 138901->138904 138902 f95e41 138903 f955f0 2 API calls 138902->138903 138905 f95e49 GetNativeSystemInfo 138903->138905 138904->138899 138906 f95e5c FreeLibrary 138904->138906 138905->138904 138906->138899 138909 f95619 138908->138909 138910 f955f9 LoadLibraryA 138908->138910 138909->138901 138909->138902 138910->138909 138911 f9560a GetProcAddress 138910->138911 138911->138909 138912 fa7e83 138913 fa7e8f __lseeki64 138912->138913 138949 faa038 GetStartupInfoW 138913->138949 138916 fa7e94 138951 fa8dac GetProcessHeap 138916->138951 138917 fa7ef7 138952 fa9d16 138917->138952 138918 fa7eec 138918->138917 139034 fa7fd3 59 API calls 3 library calls 138918->139034 138921 fa7efd 138923 fa7f08 __RTC_Initialize 138921->138923 139035 fa7fd3 59 API calls 3 library calls 138921->139035 138973 fad802 138923->138973 138925 fa7f17 138926 fa7f23 GetCommandLineW 138925->138926 139036 fa7fd3 59 API calls 3 library calls 138925->139036 138992 fb5153 GetEnvironmentStringsW 138926->138992 138929 fa7f22 138929->138926 138932 fa7f3d 138933 fa7f48 138932->138933 139037 fa32e5 59 API calls 3 library calls 138932->139037 139002 fb4f88 138933->139002 138936 fa7f59 139016 fa331f 138936->139016 138937 fa7f4e 138937->138936 139038 fa32e5 59 API calls 3 library calls 138937->139038 138940 fa7f61 138941 fa7f6c __wwincmdln 138940->138941 139039 fa32e5 59 API calls 3 library calls 138940->139039 139022 f95f8b 138941->139022 138944 fa7f80 138945 fa7f8f 138944->138945 139040 fa3588 59 API calls _doexit 138944->139040 139041 fa3310 59 API calls _doexit 138945->139041 138948 fa7f94 __lseeki64 138950 faa04e 138949->138950 138950->138916 138951->138918 139042 fa33b7 RtlEncodePointer 138952->139042 138954 fa9d1b 139048 fa9f6c 138954->139048 138957 fa9d24 139052 fa9d8c 62 API calls 2 library calls 138957->139052 138960 fa9d29 138960->138921 138961 fa9d36 138961->138957 138962 fa9d41 138961->138962 139054 fa8a05 138962->139054 138964 fa9d4e 138965 fa9d83 138964->138965 139060 faa016 TlsSetValue 138964->139060 139062 fa9d8c 62 API calls 2 library calls 138965->139062 138968 fa9d88 138968->138921 138969 fa9d62 138969->138965 138970 fa9d68 138969->138970 139061 fa9c63 59 API calls 4 library calls 138970->139061 138972 fa9d70 GetCurrentThreadId 138972->138921 138974 fad80e __lseeki64 138973->138974 138975 fa9e3b __lock 59 API calls 138974->138975 138976 fad815 138975->138976 138977 fa8a05 __calloc_crt 59 API calls 138976->138977 138978 fad826 138977->138978 138979 fad891 GetStartupInfoW 138978->138979 138980 fad831 __lseeki64 @_EH4_CallFilterFunc@8 138978->138980 138986 fad8a6 138979->138986 138989 fad9d5 138979->138989 138980->138925 138981 fada9d 139076 fadaad LeaveCriticalSection _doexit 138981->139076 138983 fa8a05 __calloc_crt 59 API calls 138983->138986 138984 fada22 GetStdHandle 138984->138989 138985 fada35 GetFileType 138985->138989 138986->138983 138988 fad8f4 138986->138988 138986->138989 138987 fad928 GetFileType 138987->138988 138988->138987 138988->138989 138990 faa05b __mtinitlocknum 2 API calls 138988->138990 138989->138981 138989->138984 138989->138985 138991 faa05b __mtinitlocknum 2 API calls 138989->138991 138990->138988 138991->138989 138993 fa7f33 138992->138993 138994 fb5164 138992->138994 138998 fb4d4b GetModuleFileNameW 138993->138998 139077 fa8a4d 59 API calls 2 library calls 138994->139077 138996 fb51a0 FreeEnvironmentStringsW 138996->138993 138997 fb518a _memmove 138997->138996 139000 fb4d7f _wparse_cmdline 138998->139000 138999 fb4dbf _wparse_cmdline 138999->138932 139000->138999 139078 fa8a4d 59 API calls 2 library calls 139000->139078 139003 fb4f99 139002->139003 139004 fb4fa1 __NMSG_WRITE 139002->139004 139003->138937 139005 fa8a05 __calloc_crt 59 API calls 139004->139005 139012 fb4fca __NMSG_WRITE 139005->139012 139006 fb5021 139007 fa2f85 _free 59 API calls 139006->139007 139007->139003 139008 fa8a05 __calloc_crt 59 API calls 139008->139012 139009 fb5046 139010 fa2f85 _free 59 API calls 139009->139010 139010->139003 139012->139003 139012->139006 139012->139008 139012->139009 139013 fb505d 139012->139013 139079 fb4837 59 API calls 2 library calls 139012->139079 139080 fa8ff6 IsProcessorFeaturePresent 139013->139080 139015 fb5069 139015->138937 139018 fa332b __IsNonwritableInCurrentImage 139016->139018 139103 faa701 139018->139103 139019 fa3349 __initterm_e 139020 fa2f70 __cinit 68 API calls 139019->139020 139021 fa3368 __cinit __IsNonwritableInCurrentImage 139019->139021 139020->139021 139021->138940 139023 f95fa5 139022->139023 139033 f96044 139022->139033 139024 f95fdf IsThemeActive 139023->139024 139106 fa359c 139024->139106 139028 f9600b 139118 f95f00 SystemParametersInfoW SystemParametersInfoW 139028->139118 139030 f96017 139119 f95240 139030->139119 139032 f9601f SystemParametersInfoW 139032->139033 139033->138944 139034->138917 139035->138923 139036->138929 139040->138945 139041->138948 139063 fa35f7 139042->139063 139044 fa33c8 __init_pointers __initp_misc_winsig 139064 faa754 EncodePointer 139044->139064 139046 fa33e0 __init_pointers 139047 faa0c9 34 API calls 139046->139047 139047->138954 139049 fa9f78 139048->139049 139050 faa05b __mtinitlocknum 2 API calls 139049->139050 139051 fa9d20 139049->139051 139050->139049 139051->138957 139053 fa9fba TlsAlloc 139051->139053 139052->138960 139053->138961 139055 fa8a0c 139054->139055 139057 fa8a47 139055->139057 139059 fa8a2a 139055->139059 139065 fb5426 139055->139065 139057->138964 139059->139055 139059->139057 139073 faa362 Sleep 139059->139073 139060->138969 139061->138972 139062->138968 139063->139044 139064->139046 139066 fb5431 139065->139066 139071 fb544c 139065->139071 139067 fb543d 139066->139067 139066->139071 139074 fa8d58 59 API calls __getptd_noexit 139067->139074 139069 fb545c HeapAlloc 139070 fb5442 139069->139070 139069->139071 139070->139055 139071->139069 139071->139070 139075 fa35d1 DecodePointer 139071->139075 139073->139059 139074->139070 139075->139071 139076->138980 139077->138997 139078->138999 139079->139012 139081 fa9001 139080->139081 139086 fa8e89 139081->139086 139085 fa901c 139085->139015 139087 fa8ea3 _memset ___raise_securityfailure 139086->139087 139088 fa8ec3 IsDebuggerPresent 139087->139088 139094 faa385 SetUnhandledExceptionFilter UnhandledExceptionFilter 139088->139094 139090 fa8f87 ___raise_securityfailure 139095 fac826 139090->139095 139092 fa8faa 139093 faa370 GetCurrentProcess TerminateProcess 139092->139093 139093->139085 139094->139090 139096 fac82e 139095->139096 139097 fac830 IsProcessorFeaturePresent 139095->139097 139096->139092 139099 fb5b3a 139097->139099 139102 fb5ae9 5 API calls ___raise_securityfailure 139099->139102 139101 fb5c1d 139101->139092 139102->139101 139104 faa704 EncodePointer 139103->139104 139104->139104 139105 faa71e 139104->139105 139105->139019 139107 fa9e3b __lock 59 API calls 139106->139107 139108 fa35a7 DecodePointer EncodePointer 139107->139108 139171 fa9fa5 LeaveCriticalSection 139108->139171 139110 f96004 139111 fa3604 139110->139111 139112 fa3628 139111->139112 139113 fa360e 139111->139113 139112->139028 139113->139112 139172 fa8d58 59 API calls __getptd_noexit 139113->139172 139115 fa3618 139173 fa8fe6 9 API calls __beginthreadex 139115->139173 139117 fa3623 139117->139028 139118->139030 139120 f9524d __write_nolock 139119->139120 139121 f91207 60 API calls 139120->139121 139122 f95258 GetCurrentDirectoryW 139121->139122 139174 f94ec8 139122->139174 139124 f9527e IsDebuggerPresent 139125 f9528c 139124->139125 139126 fd0b21 MessageBoxA 139124->139126 139127 fd0b39 139125->139127 139128 f952a0 139125->139128 139126->139127 139361 f9314d 60 API calls Mailbox 139127->139361 139242 f931bf 139128->139242 139131 fd0b49 139138 fd0b5f SetCurrentDirectoryW 139131->139138 139136 f9536c Mailbox 139136->139032 139138->139136 139171->139110 139172->139115 139173->139117 139175 f91207 60 API calls 139174->139175 139176 f94ede 139175->139176 139363 f95420 139176->139363 139178 f94efc 139179 f919e1 60 API calls 139178->139179 139180 f94f10 139179->139180 139181 f91c9c 60 API calls 139180->139181 139182 f94f1b 139181->139182 139377 f8477a 139182->139377 139185 f91a36 60 API calls 139186 f94f34 139185->139186 139380 f839be 139186->139380 139188 f94f44 Mailbox 139189 f91a36 60 API calls 139188->139189 139190 f94f68 139189->139190 139191 f839be 69 API calls 139190->139191 139192 f94f77 Mailbox 139191->139192 139193 f91207 60 API calls 139192->139193 139194 f94f94 139193->139194 139384 f955bc 139194->139384 139198 f94fae 139199 f94fb8 139198->139199 139200 fd0a54 139198->139200 139201 fa312d _W_store_winword 61 API calls 139199->139201 139202 f955bc 60 API calls 139200->139202 139203 f94fc3 139201->139203 139204 fd0a68 139202->139204 139203->139204 139205 f94fcd 139203->139205 139206 f955bc 60 API calls 139204->139206 139207 fa312d _W_store_winword 61 API calls 139205->139207 139208 fd0a84 139206->139208 139209 f94fd8 139207->139209 139211 fa00cf 62 API calls 139208->139211 139209->139208 139210 f94fe2 139209->139210 139212 fa312d _W_store_winword 61 API calls 139210->139212 139213 fd0aa7 139211->139213 139214 f94fed 139212->139214 139215 f955bc 60 API calls 139213->139215 139216 fd0ad0 139214->139216 139217 f94ff7 139214->139217 139218 fd0ab3 139215->139218 139220 f955bc 60 API calls 139216->139220 139219 f9501b 139217->139219 139223 f91c9c 60 API calls 139217->139223 139222 f91c9c 60 API calls 139218->139222 139227 f847be 60 API calls 139219->139227 139221 fd0aee 139220->139221 139224 f91c9c 60 API calls 139221->139224 139225 fd0ac1 139222->139225 139226 f9500e 139223->139226 139229 fd0afc 139224->139229 139230 f955bc 60 API calls 139225->139230 139231 f955bc 60 API calls 139226->139231 139228 f9502a 139227->139228 139232 f84540 60 API calls 139228->139232 139233 f955bc 60 API calls 139229->139233 139230->139216 139231->139219 139234 f95038 139232->139234 139235 fd0b0b 139233->139235 139400 f843d0 139234->139400 139235->139235 139237 f95055 139238 f8477a 60 API calls 139237->139238 139239 f843d0 60 API calls 139237->139239 139240 f955bc 60 API calls 139237->139240 139241 f9509b Mailbox 139237->139241 139238->139237 139239->139237 139240->139237 139241->139124 139243 f931cc __write_nolock 139242->139243 139244 fd0314 _memset 139243->139244 139245 f931e5 139243->139245 139248 fd0330 GetOpenFileNameW 139244->139248 139246 fa0284 61 API calls 139245->139246 139247 f931ee 139246->139247 139418 fa09c5 139247->139418 139250 fd037f 139248->139250 139252 f91821 60 API calls 139250->139252 139253 fd0394 139252->139253 139253->139253 139255 f93203 139436 f9278a 139255->139436 139361->139131 139364 f9542d __write_nolock 139363->139364 139365 f91821 60 API calls 139364->139365 139370 f95590 Mailbox 139364->139370 139367 f9545f 139365->139367 139376 f95495 Mailbox 139367->139376 139409 f91609 139367->139409 139368 f91609 60 API calls 139368->139376 139369 f95563 139369->139370 139371 f91a36 60 API calls 139369->139371 139370->139178 139372 f95584 139371->139372 139374 f94c94 60 API calls 139372->139374 139373 f91a36 60 API calls 139373->139376 139374->139370 139375 f94c94 60 API calls 139375->139376 139376->139368 139376->139369 139376->139370 139376->139373 139376->139375 139378 fa0fe6 Mailbox 60 API calls 139377->139378 139379 f84787 139378->139379 139379->139185 139381 f839c9 139380->139381 139383 f839f0 139381->139383 139412 f83ea3 69 API calls Mailbox 139381->139412 139383->139188 139385 f955df 139384->139385 139386 f955c6 139384->139386 139388 f91821 60 API calls 139385->139388 139387 f91c9c 60 API calls 139386->139387 139389 f94fa0 139387->139389 139388->139389 139390 fa312d 139389->139390 139391 fa31ae 139390->139391 139392 fa3139 139390->139392 139415 fa31c0 61 API calls 4 library calls 139391->139415 139399 fa315e 139392->139399 139413 fa8d58 59 API calls __getptd_noexit 139392->139413 139395 fa31bb 139395->139198 139396 fa3145 139414 fa8fe6 9 API calls __beginthreadex 139396->139414 139398 fa3150 139398->139198 139399->139198 139401 fbd6c9 139400->139401 139403 f843e7 139400->139403 139401->139403 139417 f840cb 60 API calls Mailbox 139401->139417 139404 f844e8 139403->139404 139405 f84530 139403->139405 139408 f844ef 139403->139408 139407 fa0fe6 Mailbox 60 API calls 139404->139407 139416 f8523c 60 API calls 139405->139416 139407->139408 139408->139237 139410 f91aa4 60 API calls 139409->139410 139411 f91614 139410->139411 139411->139367 139412->139383 139413->139396 139414->139398 139415->139395 139416->139408 139417->139403 139419 fb1b70 __write_nolock 139418->139419 139420 fa09d2 GetLongPathNameW 139419->139420 139421 f91821 60 API calls 139420->139421 139422 f931f7 139421->139422 139423 f92f3d 139422->139423 139424 f91207 60 API calls 139423->139424 139425 f92f4f 139424->139425 139426 fa0284 61 API calls 139425->139426 139427 f92f5a 139426->139427 139428 fd0177 139427->139428 139429 f92f65 139427->139429 139434 fd0191 139428->139434 139476 f9151f 62 API calls 139428->139476 139430 f94c94 60 API calls 139429->139430 139432 f92f71 139430->139432 139470 f81307 139432->139470 139435 f92f84 Mailbox 139435->139255 139477 f949c2 139436->139477 139439 fcf8d6 139594 fe9b16 139439->139594 139441 f949c2 137 API calls 139443 f927c3 139441->139443 139443->139439 139446 f927cb 139443->139446 139444 fcf908 139448 fa0fe6 Mailbox 60 API calls 139444->139448 139445 fcf8eb 139635 f94a2f 139445->139635 139449 f927d7 139446->139449 139450 fcf8f3 139446->139450 139455 fcf94d Mailbox 139448->139455 139501 f929be 139449->139501 139641 fe47e8 91 API calls _wprintf 139450->139641 139454 fcf901 139454->139444 139456 fcfb01 139455->139456 139460 f9343f 60 API calls 139455->139460 139464 fcfb12 139455->139464 139467 f91a36 60 API calls 139455->139467 139629 f93297 139455->139629 139642 fdfef8 60 API calls 2 library calls 139455->139642 139643 fdfe19 62 API calls 2 library calls 139455->139643 139644 fe793a 60 API calls Mailbox 139455->139644 139457 fa2f85 _free 59 API calls 139456->139457 139458 fcfb09 139457->139458 139459 f94a2f 85 API calls 139458->139459 139459->139464 139460->139455 139463 fa2f85 _free 59 API calls 139463->139464 139464->139463 139465 f94a2f 85 API calls 139464->139465 139645 fdff5c 90 API calls 4 library calls 139464->139645 139465->139464 139467->139455 139471 f81319 139470->139471 139475 f81338 _memmove 139470->139475 139473 fa0fe6 Mailbox 60 API calls 139471->139473 139472 fa0fe6 Mailbox 60 API calls 139474 f8134f 139472->139474 139473->139475 139474->139435 139475->139472 139476->139428 139646 f94b29 139477->139646 139482 f949ed LoadLibraryExW 139656 f94ade 139482->139656 139483 fd08bb 139485 f94a2f 85 API calls 139483->139485 139487 fd08c2 139485->139487 139488 f94ade 3 API calls 139487->139488 139490 fd08ca 139488->139490 139682 f94ab2 139490->139682 139491 f94a14 139491->139490 139492 f94a20 139491->139492 139494 f94a2f 85 API calls 139492->139494 139496 f927af 139494->139496 139496->139439 139496->139441 139498 fd08f1 139690 f94a6e 139498->139690 139500 fd08fe 139502 fcfd14 139501->139502 139503 f929e7 139501->139503 140056 fdff5c 90 API calls 4 library calls 139502->140056 139505 f93df7 61 API calls 139503->139505 139507 f92a09 139505->139507 139506 fcfd27 140057 fdff5c 90 API calls 4 library calls 139506->140057 139508 f93e47 68 API calls 139507->139508 139509 f92a1e 139508->139509 139509->139506 139511 f92a26 139509->139511 139512 f91207 60 API calls 139511->139512 139514 f92a32 139512->139514 139513 fcfd43 139545 f92a93 139513->139545 140046 fa0b8b 61 API calls __write_nolock 139514->140046 139516 f92a3e 139519 f91207 60 API calls 139516->139519 139517 f92aa1 139521 f91207 60 API calls 139517->139521 139518 fcfd56 139520 f942cf CloseHandle 139518->139520 139522 f92a4a 139519->139522 139523 fcfd62 139520->139523 139524 f92aaa 139521->139524 139526 f949c2 137 API calls 139523->139526 139527 f91207 60 API calls 139524->139527 139530 fcfd7e 139526->139530 139528 f92ab3 139527->139528 140048 fa0119 60 API calls Mailbox 139528->140048 139533 fcfda3 139530->139533 139537 fe9b16 123 API calls 139530->139537 139545->139517 139545->139518 139595 f94a8c 86 API calls 139594->139595 139596 fe9b85 139595->139596 140068 fe9cf1 139596->140068 139599 f94ab2 75 API calls 139600 fe9bb4 139599->139600 139601 f94ab2 75 API calls 139600->139601 139602 fe9bc4 139601->139602 139603 f94ab2 75 API calls 139602->139603 139604 fe9bdf 139603->139604 139605 f94ab2 75 API calls 139604->139605 139606 fe9bfa 139605->139606 139607 f94a8c 86 API calls 139606->139607 139608 fe9c11 139607->139608 139628 fcf8e7 139628->139444 139628->139445 139630 f932aa 139629->139630 139633 f93358 139629->139633 139631 fa0fe6 Mailbox 60 API calls 139630->139631 139634 f932dc 139630->139634 139631->139634 139632 fa0fe6 60 API calls Mailbox 139632->139634 139633->139455 139634->139632 139634->139633 139636 f94a39 139635->139636 139638 f94a40 139635->139638 139637 fa55c6 __fcloseall 84 API calls 139636->139637 139637->139638 139639 f94a4f 139638->139639 139640 f94a60 FreeLibrary 139638->139640 139639->139450 139640->139639 139641->139454 139642->139455 139643->139455 139644->139455 139645->139464 139695 f94b77 139646->139695 139649 f949d4 139653 fa547b 139649->139653 139650 f94b60 FreeLibrary 139650->139649 139651 f94b77 2 API calls 139652 f94b50 139651->139652 139652->139649 139652->139650 139699 fa5490 139653->139699 139655 f949e1 139655->139482 139655->139483 139779 f94baa 139656->139779 139659 f94b03 139661 f94a05 139659->139661 139662 f94b15 FreeLibrary 139659->139662 139660 f94baa 2 API calls 139660->139659 139663 f948b0 139661->139663 139662->139661 139664 fa0fe6 Mailbox 60 API calls 139663->139664 139665 f948c5 139664->139665 139666 f9433f 60 API calls 139665->139666 139667 f948d1 _memmove 139666->139667 139668 f9490c 139667->139668 139669 fd080a 139667->139669 139671 f94a6e 70 API calls 139668->139671 139670 fd0817 139669->139670 139788 fe9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 139669->139788 139789 fe9f5e 96 API calls 139670->139789 139675 f94915 139671->139675 139674 f94ab2 75 API calls 139674->139675 139675->139674 139676 fd0859 139675->139676 139679 f949a0 139675->139679 139680 f94a8c 86 API calls 139675->139680 139783 f94a8c 139676->139783 139679->139491 139680->139675 139681 f94ab2 75 API calls 139681->139679 139683 fd0945 139682->139683 139684 f94ac4 139682->139684 139895 fa5802 139684->139895 139687 fe96c4 140020 fe951a 139687->140020 139689 fe96da 139689->139498 139691 f94a7d 139690->139691 139692 fd0908 139690->139692 140025 fa5e80 139691->140025 139694 f94a85 139694->139500 139696 f94b44 139695->139696 139697 f94b80 LoadLibraryA 139695->139697 139696->139651 139696->139652 139697->139696 139698 f94b91 GetProcAddress 139697->139698 139698->139696 139701 fa549c __lseeki64 139699->139701 139700 fa54af 139748 fa8d58 59 API calls __getptd_noexit 139700->139748 139701->139700 139703 fa54e0 139701->139703 139718 fb0718 139703->139718 139704 fa54b4 139749 fa8fe6 9 API calls __beginthreadex 139704->139749 139707 fa54e5 139708 fa54fb 139707->139708 139709 fa54ee 139707->139709 139711 fa5525 139708->139711 139712 fa5505 139708->139712 139750 fa8d58 59 API calls __getptd_noexit 139709->139750 139733 fb0837 139711->139733 139751 fa8d58 59 API calls __getptd_noexit 139712->139751 139717 fa54bf __lseeki64 @_EH4_CallFilterFunc@8 139717->139655 139719 fb0724 __lseeki64 139718->139719 139720 fa9e3b __lock 59 API calls 139719->139720 139721 fb0732 139720->139721 139722 fb07ad 139721->139722 139727 fa9ec3 __mtinitlocknum 59 API calls 139721->139727 139731 fb07a6 139721->139731 139756 fa6e7d 60 API calls __lock 139721->139756 139757 fa6ee7 LeaveCriticalSection LeaveCriticalSection _doexit 139721->139757 139758 fa8a4d 59 API calls 2 library calls 139722->139758 139725 fb07b4 139726 faa05b __mtinitlocknum 2 API calls 139725->139726 139725->139731 139730 fb07da EnterCriticalSection 139726->139730 139727->139721 139729 fb0823 __lseeki64 139729->139707 139730->139731 139753 fb082e 139731->139753 139742 fb0857 __wopenfile 139733->139742 139734 fb0871 139763 fa8d58 59 API calls __getptd_noexit 139734->139763 139735 fb0a2c 139735->139734 139739 fb0a8f 139735->139739 139737 fb0876 139764 fa8fe6 9 API calls __beginthreadex 139737->139764 139760 fb87d1 139739->139760 139740 fa5530 139752 fa5552 LeaveCriticalSection LeaveCriticalSection _fseek 139740->139752 139742->139734 139742->139735 139765 fa39fb 61 API calls 3 library calls 139742->139765 139744 fb0a25 139744->139735 139766 fa39fb 61 API calls 3 library calls 139744->139766 139746 fb0a44 139746->139735 139767 fa39fb 61 API calls 3 library calls 139746->139767 139748->139704 139749->139717 139750->139717 139751->139717 139752->139717 139759 fa9fa5 LeaveCriticalSection 139753->139759 139755 fb0835 139755->139729 139756->139721 139757->139721 139758->139725 139759->139755 139768 fb7fb5 139760->139768 139762 fb87ea 139762->139740 139763->139737 139764->139740 139765->139744 139766->139746 139767->139735 139769 fb7fc1 __lseeki64 139768->139769 139770 fb7fd7 139769->139770 139773 fb800d 139769->139773 139771 fa8d58 __chsize_nolock 59 API calls 139770->139771 139772 fb7fdc 139771->139772 139775 fa8fe6 __beginthreadex 9 API calls 139772->139775 139774 fb807e __wsopen_nolock 110 API calls 139773->139774 139776 fb8029 139774->139776 139778 fb7fe6 __lseeki64 139775->139778 139777 fb8052 __wsopen_helper LeaveCriticalSection 139776->139777 139777->139778 139778->139762 139780 f94af7 139779->139780 139781 f94bb3 LoadLibraryA 139779->139781 139780->139659 139780->139660 139781->139780 139782 f94bc4 GetProcAddress 139781->139782 139782->139780 139784 f94a9b 139783->139784 139785 fd0923 139783->139785 139790 fa5a6d 139784->139790 139787 f94aa9 139787->139681 139788->139670 139789->139675 139794 fa5a79 __lseeki64 139790->139794 139791 fa5a8b 139821 fa8d58 59 API calls __getptd_noexit 139791->139821 139793 fa5ab1 139803 fa6e3e 139793->139803 139794->139791 139794->139793 139795 fa5a90 139822 fa8fe6 9 API calls __beginthreadex 139795->139822 139802 fa5a9b __lseeki64 139802->139787 139804 fa6e4e 139803->139804 139805 fa6e70 EnterCriticalSection 139803->139805 139804->139805 139807 fa6e56 139804->139807 139806 fa5ab7 139805->139806 139809 fa59de 139806->139809 139808 fa9e3b __lock 59 API calls 139807->139808 139808->139806 139810 fa59fc 139809->139810 139811 fa59ec 139809->139811 139813 fa5a12 139810->139813 139824 fa5af0 139810->139824 139894 fa8d58 59 API calls __getptd_noexit 139811->139894 139853 fa4c5d 139813->139853 139814 fa59f1 139823 fa5ae8 LeaveCriticalSection LeaveCriticalSection _fseek 139814->139823 139819 fa5a53 139866 fb185f 139819->139866 139821->139795 139822->139802 139823->139802 139825 fa5afd __write_nolock 139824->139825 139826 fa5b2d 139825->139826 139827 fa5b15 139825->139827 139829 fa4906 __fputwc_nolock 59 API calls 139826->139829 139828 fa8d58 __chsize_nolock 59 API calls 139827->139828 139830 fa5b1a 139828->139830 139831 fa5b35 139829->139831 139832 fa8fe6 __beginthreadex 9 API calls 139830->139832 139833 fb185f __write 65 API calls 139831->139833 139851 fa5b25 139832->139851 139834 fa5b51 139833->139834 139837 fa5d41 139834->139837 139838 fa5bd4 139834->139838 139834->139851 139835 fac826 __fltin2 6 API calls 139836 fa5e7c 139835->139836 139836->139813 139839 fa5d4a 139837->139839 139843 fa5cfd 139837->139843 139841 fa5bfa 139838->139841 139838->139843 139840 fa8d58 __chsize_nolock 59 API calls 139839->139840 139840->139851 139842 fb19f5 __lseeki64 63 API calls 139841->139842 139841->139851 139844 fa5c33 139842->139844 139845 fb185f __write 65 API calls 139843->139845 139843->139851 139844->139851 139847 fa5dae 139845->139847 139847->139851 139851->139835 139854 fa4c70 139853->139854 139858 fa4c94 139853->139858 139855 fa4906 __fputwc_nolock 59 API calls 139854->139855 139854->139858 139856 fa4c8d 139855->139856 139857 fadab6 __write 79 API calls 139856->139857 139857->139858 139859 fa4906 139858->139859 139860 fa4910 139859->139860 139861 fa4925 139859->139861 139862 fa8d58 __chsize_nolock 59 API calls 139860->139862 139861->139819 139863 fa4915 139862->139863 139864 fa8fe6 __beginthreadex 9 API calls 139863->139864 139865 fa4920 139864->139865 139865->139819 139867 fb186b __lseeki64 139866->139867 139868 fb1878 139867->139868 139869 fb188f 139867->139869 139870 fa8d24 __chsize_nolock 59 API calls 139868->139870 139871 fb192e 139869->139871 139873 fb18a3 139869->139873 139872 fb187d 139870->139872 139874 fa8d24 __chsize_nolock 59 API calls 139871->139874 139876 fb18cb 139873->139876 139877 fb18c1 139873->139877 139894->139814 139898 fa581d 139895->139898 139897 f94ad5 139897->139687 139899 fa5829 __lseeki64 139898->139899 139900 fa586c 139899->139900 139901 fa5864 __lseeki64 139899->139901 139903 fa583f _memset 139899->139903 139902 fa6e3e __lock_file 60 API calls 139900->139902 139901->139897 139904 fa5872 139902->139904 139925 fa8d58 59 API calls __getptd_noexit 139903->139925 139911 fa563d 139904->139911 139906 fa5859 139926 fa8fe6 9 API calls __beginthreadex 139906->139926 139912 fa5673 139911->139912 139915 fa5658 _memset 139911->139915 139927 fa58a6 LeaveCriticalSection LeaveCriticalSection _fseek 139912->139927 139913 fa5663 140016 fa8d58 59 API calls __getptd_noexit 139913->140016 139915->139912 139915->139913 139918 fa56b3 139915->139918 139918->139912 139919 fa57c4 _memset 139918->139919 139920 fa4906 __fputwc_nolock 59 API calls 139918->139920 139928 fb108b 139918->139928 139996 fb0dd7 139918->139996 140018 fb0ef8 59 API calls 4 library calls 139918->140018 140019 fa8d58 59 API calls __getptd_noexit 139919->140019 139920->139918 139924 fa5668 140017 fa8fe6 9 API calls __beginthreadex 139924->140017 139925->139906 139926->139901 139927->139901 139929 fb10ac 139928->139929 139930 fb10c3 139928->139930 139931 fa8d24 __chsize_nolock 59 API calls 139929->139931 139932 fb17fb 139930->139932 139935 fb10fd 139930->139935 139934 fb10b1 139931->139934 139933 fa8d24 __chsize_nolock 59 API calls 139932->139933 139936 fb1800 139933->139936 139937 fa8d58 __chsize_nolock 59 API calls 139934->139937 139938 fb1105 139935->139938 139944 fb111c 139935->139944 139939 fa8d58 __chsize_nolock 59 API calls 139936->139939 139976 fb10b8 139937->139976 139940 fa8d24 __chsize_nolock 59 API calls 139938->139940 139941 fb1111 139939->139941 139942 fb110a 139940->139942 139943 fa8fe6 __beginthreadex 9 API calls 139941->139943 139946 fa8d58 __chsize_nolock 59 API calls 139942->139946 139943->139976 139945 fb1131 139944->139945 139948 fb114b 139944->139948 139949 fb1169 139944->139949 139944->139976 139947 fa8d24 __chsize_nolock 59 API calls 139945->139947 139946->139941 139947->139942 139948->139945 139951 fb1156 139948->139951 139950 fa8a4d __malloc_crt 59 API calls 139949->139950 139952 fb1179 139950->139952 139953 fb5e9b __write_nolock 59 API calls 139951->139953 139954 fb119c 139952->139954 139955 fb1181 139952->139955 139956 fb126a 139953->139956 139959 fb1af1 __lseeki64_nolock 61 API calls 139954->139959 139957 fa8d58 __chsize_nolock 59 API calls 139955->139957 139958 fb12e3 ReadFile 139956->139958 139963 fb1280 GetConsoleMode 139956->139963 139960 fb1186 139957->139960 139961 fb17c3 GetLastError 139958->139961 139962 fb1305 139958->139962 139959->139951 139964 fa8d24 __chsize_nolock 59 API calls 139960->139964 139965 fb17d0 139961->139965 139966 fb12c3 139961->139966 139962->139961 139971 fb12d5 139962->139971 139967 fb12e0 139963->139967 139968 fb1294 139963->139968 139964->139976 139970 fa8d58 __chsize_nolock 59 API calls 139965->139970 139973 fa8d37 __dosmaperr 59 API calls 139966->139973 139979 fb12c9 139966->139979 139967->139958 139968->139967 139969 fb129a ReadConsoleW 139968->139969 139969->139971 139972 fb12bd GetLastError 139969->139972 139974 fb17d5 139970->139974 139978 fb15a7 139971->139978 139971->139979 139981 fb133a 139971->139981 139972->139966 139973->139979 139975 fa8d24 __chsize_nolock 59 API calls 139974->139975 139975->139979 139976->139918 139977 fa2f85 _free 59 API calls 139977->139976 139978->139979 139986 fb16ad ReadFile 139978->139986 139979->139976 139979->139977 139982 fb13a6 ReadFile 139981->139982 139988 fb1427 139981->139988 139983 fb13c7 GetLastError 139982->139983 139994 fb13d1 139982->139994 139983->139994 139984 fb14e4 139990 fb1494 MultiByteToWideChar 139984->139990 139991 fb1af1 __lseeki64_nolock 61 API calls 139984->139991 139985 fb14d4 139989 fa8d58 __chsize_nolock 59 API calls 139985->139989 139987 fb16d0 GetLastError 139986->139987 139995 fb16de 139986->139995 139987->139995 139988->139979 139988->139984 139988->139985 139988->139990 139989->139979 139990->139972 139990->139979 139991->139990 139992 fb1af1 __lseeki64_nolock 61 API calls 139992->139994 139993 fb1af1 __lseeki64_nolock 61 API calls 139993->139995 139994->139981 139994->139992 139995->139978 139995->139993 139997 fb0de2 139996->139997 140000 fb0df7 139996->140000 139998 fa8d58 __chsize_nolock 59 API calls 139997->139998 139999 fb0de7 139998->139999 140001 fa8fe6 __beginthreadex 9 API calls 139999->140001 140002 fb0e2c 140000->140002 140003 fb6214 __getbuf 59 API calls 140000->140003 140009 fb0df2 140000->140009 140001->140009 140004 fa4906 __fputwc_nolock 59 API calls 140002->140004 140003->140002 140005 fb0e40 140004->140005 140006 fb0f77 __read 73 API calls 140005->140006 140007 fb0e47 140006->140007 140008 fa4906 __fputwc_nolock 59 API calls 140007->140008 140007->140009 140010 fb0e6a 140008->140010 140009->139918 140010->140009 140011 fa4906 __fputwc_nolock 59 API calls 140010->140011 140012 fb0e76 140011->140012 140012->140009 140013 fa4906 __fputwc_nolock 59 API calls 140012->140013 140014 fb0e83 140013->140014 140015 fa4906 __fputwc_nolock 59 API calls 140014->140015 140015->140009 140016->139924 140017->139912 140018->139918 140019->139924 140023 fa542a GetSystemTimeAsFileTime 140020->140023 140022 fe9529 140022->139689 140024 fa5458 __aulldiv 140023->140024 140024->140022 140026 fa5e8c __lseeki64 140025->140026 140027 fa5e9e 140026->140027 140028 fa5eb3 140026->140028 140038 fa8d58 59 API calls __getptd_noexit 140027->140038 140030 fa6e3e __lock_file 60 API calls 140028->140030 140032 fa5eb9 140030->140032 140031 fa5ea3 140039 fa8fe6 9 API calls __beginthreadex 140031->140039 140033 fa5af0 __ftell_nolock 68 API calls 140032->140033 140035 fa5ec4 140033->140035 140040 fa5ee4 LeaveCriticalSection LeaveCriticalSection _fseek 140035->140040 140037 fa5eae __lseeki64 140037->139694 140038->140031 140039->140037 140040->140037 140046->139516 140056->139506 140057->139513 140073 fe9d05 __tzset_nolock _wcscmp 140068->140073 140069 f94ab2 75 API calls 140069->140073 140070 fe9b99 140070->139599 140070->139628 140071 fe96c4 GetSystemTimeAsFileTime 140071->140073 140072 f94a8c 86 API calls 140072->140073 140073->140069 140073->140070 140073->140071 140073->140072 140444 f94d83 140445 f94dba 140444->140445 140446 f94dd8 140445->140446 140447 f94e37 140445->140447 140483 f94e35 140445->140483 140451 f94ead PostQuitMessage 140446->140451 140452 f94de5 140446->140452 140449 f94e3d 140447->140449 140450 fd09c2 140447->140450 140448 f94e1a DefWindowProcW 140486 f94e28 140448->140486 140453 f94e42 140449->140453 140454 f94e65 SetTimer RegisterWindowMessageW 140449->140454 140494 f8c460 10 API calls Mailbox 140450->140494 140451->140486 140455 fd0a35 140452->140455 140456 f94df0 140452->140456 140458 f94e49 KillTimer 140453->140458 140459 fd0965 140453->140459 140460 f94e8e CreatePopupMenu 140454->140460 140454->140486 140499 fe2cce 98 API calls _memset 140455->140499 140461 f94df8 140456->140461 140462 f94eb7 140456->140462 140489 f95ac3 Shell_NotifyIconW _memset 140458->140489 140466 fd099e MoveWindow 140459->140466 140467 fd096a 140459->140467 140460->140486 140469 f94e03 140461->140469 140474 fd0a1a 140461->140474 140492 f95b29 91 API calls _memset 140462->140492 140464 fd09e9 140495 f8c483 318 API calls Mailbox 140464->140495 140466->140486 140471 fd098d SetFocus 140467->140471 140472 fd096e 140467->140472 140475 f94e9b 140469->140475 140476 f94e0e 140469->140476 140471->140486 140472->140476 140478 fd0977 140472->140478 140473 f94e5c 140490 f834e4 DeleteObject DestroyWindow Mailbox 140473->140490 140474->140448 140498 fd8854 60 API calls Mailbox 140474->140498 140491 f95bd7 108 API calls _memset 140475->140491 140476->140448 140496 f95ac3 Shell_NotifyIconW _memset 140476->140496 140477 fd0a47 140477->140448 140477->140486 140493 f8c460 10 API calls Mailbox 140478->140493 140483->140448 140484 f94eab 140484->140486 140487 fd0a0e 140497 f959d3 95 API calls _memset 140487->140497 140489->140473 140490->140486 140491->140484 140492->140484 140493->140486 140494->140464 140495->140476 140496->140487 140497->140483 140498->140483 140499->140477 140500 f81663 140501 f81cd0 140500->140501 140502 f829e2 GetWindowLongW 140501->140502 140505 f81ce4 140502->140505 140503 f81d07 140506 f81d5f 140503->140506 140507 f81d13 140503->140507 140504 f81dd2 DefDlgProcW 140510 f81d5d 140504->140510 140505->140503 140505->140504 140520 fbbbe2 140505->140520 140511 f81d68 140506->140511 140512 f81d91 140506->140512 140509 f81e8e 140507->140509 140513 f81e4d 140507->140513 140514 f81d22 140507->140514 140612 100da7e 80 API calls 140509->140612 140517 f81f02 140511->140517 140518 f81ded 140511->140518 140519 f81d77 140511->140519 140515 f81d9f 140512->140515 140516 f81f16 140512->140516 140525 f81e58 140513->140525 140526 fbbd02 140513->140526 140521 f81d28 140514->140521 140522 fbbc74 140514->140522 140515->140517 140523 f81da6 140515->140523 140620 100c5d8 67 API calls 140516->140620 140622 100c634 142 API calls Mailbox 140517->140622 140518->140517 140533 fbbd0f 140518->140533 140565 f81e08 140518->140565 140527 fbbd1d 140519->140527 140528 f81d85 140519->140528 140593 f81ef0 140520->140593 140609 ff17a3 318 API calls 2 library calls 140520->140609 140536 f81eaa 140521->140536 140537 f81d31 140521->140537 140611 100cc25 123 API calls 140522->140611 140529 f81daf 140523->140529 140530 fbbdc1 140523->140530 140539 f81e61 140525->140539 140540 fbbcf1 140525->140540 140618 100d164 128 API calls 2 library calls 140526->140618 140553 fbbd45 140527->140553 140554 fbbd25 140527->140554 140602 f81aba 77 API calls 140528->140602 140544 fbbdb0 140529->140544 140545 f81db6 140529->140545 140626 100cf08 DefDlgProcW 140530->140626 140619 fd7256 64 API calls 140533->140619 140547 f81eac 140536->140547 140548 f81ecf 140536->140548 140555 f81d3a 140537->140555 140556 f81de3 140537->140556 140541 fbbcdb 140539->140541 140542 f81e6a 140539->140542 140617 100cfb1 CreateProcessW CloseHandle DefDlgProcW 140540->140617 140616 100cb40 6 API calls 140541->140616 140557 f81e73 140542->140557 140558 fbbcc5 140542->140558 140625 100cf37 DefDlgProcW 140544->140625 140561 fbbd9f 140545->140561 140562 f81dbf 140545->140562 140547->140510 140575 f81eb8 140547->140575 140576 f81ee5 140547->140576 140607 f81c77 DefDlgProcW GetWindowLongW 140548->140607 140550 fbbc29 140577 f829e2 GetWindowLongW 140550->140577 140550->140593 140551 fbbc6f 140551->140510 140621 100cfe6 ClientToScreen ImageList_DragMove DefDlgProcW 140553->140621 140554->140504 140554->140516 140567 f81ec3 140555->140567 140568 f81d43 140555->140568 140603 f81b41 98 API calls 140556->140603 140569 fbbcaf 140557->140569 140570 f81e7f 140557->140570 140615 100d124 GetWindowLongW DefDlgProcW 140558->140615 140624 100cf66 61 API calls 140561->140624 140573 fbbd93 140562->140573 140574 f81dc6 140562->140574 140565->140533 140580 f81e0f 140565->140580 140606 f81a59 DefDlgProcW PostMessageW PostMessageW GetWindowLongW 140567->140606 140568->140504 140581 f81d4c 140568->140581 140614 100c854 91 API calls 2 library calls 140569->140614 140582 fbbc98 140570->140582 140583 f81e86 140570->140583 140623 100cca6 84 API calls 2 library calls 140573->140623 140574->140504 140584 fbbd75 IsThemeActive DefDlgProcW 140574->140584 140605 f81a91 79 API calls 140575->140605 140587 f81ee8 140576->140587 140588 f81ef5 140576->140588 140586 fbbc45 140577->140586 140580->140504 140589 f81e12 140580->140589 140601 f8166c 7 API calls 140581->140601 140613 100de52 66 API calls 140582->140613 140583->140504 140583->140509 140584->140510 140586->140510 140586->140593 140587->140504 140587->140593 140608 100d040 GetWindowLongW GetWindowRect GetWindowRect MoveWindow 140588->140608 140595 f829e2 GetWindowLongW 140589->140595 140610 100db04 9 API calls 140593->140610 140597 f81e1d GetSysColor 140595->140597 140598 f81e38 140597->140598 140599 f81e3b SetBkColor 140597->140599 140598->140599 140604 f826a0 61 API calls 140599->140604 140601->140510 140602->140510 140603->140510 140604->140510 140605->140510 140606->140510 140607->140510 140608->140510 140609->140550 140610->140551 140611->140551 140612->140510 140613->140510 140614->140551 140615->140510 140616->140510 140617->140510 140618->140551 140619->140510 140620->140510 140621->140510 140622->140551 140623->140551 140624->140510 140625->140510 140626->140510 140627 4c1295c 140628 4c12971 140627->140628 140629 4c12984 140627->140629 140656 4c11b78 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 140628->140656 140631 4c129a5 140629->140631 140632 4c1299b RtlEnterCriticalSection 140629->140632 140643 4c12758 13 API calls 140631->140643 140632->140631 140633 4c12976 140633->140629 140636 4c1297a 140633->140636 140635 4c129ae 140638 4c129b2 140635->140638 140644 4c123d4 140635->140644 140639 4c12a14 140638->140639 140640 4c12a0a RtlLeaveCriticalSection 140638->140640 140640->140639 140641 4c129be 140641->140638 140657 4c12580 9 API calls 140641->140657 140643->140635 140645 4c123e6 140644->140645 140646 4c123ef 140644->140646 140664 4c11b78 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 140645->140664 140648 4c12418 RtlEnterCriticalSection 140646->140648 140650 4c123f7 140646->140650 140651 4c12422 140646->140651 140648->140651 140649 4c123eb 140649->140646 140649->140650 140650->140641 140651->140650 140658 4c1228c 140651->140658 140654 4c12565 RtlLeaveCriticalSection 140655 4c1256f 140654->140655 140655->140641 140656->140633 140657->140638 140661 4c122a3 140658->140661 140659 4c122e4 140662 4c1230b 140659->140662 140670 4c12024 9 API calls 140659->140670 140661->140659 140661->140662 140665 4c121f4 140661->140665 140662->140654 140662->140655 140664->140649 140671 4c118f8 140665->140671 140667 4c12204 140668 4c12211 140667->140668 140680 4c12168 9 API calls 140667->140680 140668->140661 140670->140662 140674 4c11916 140671->140674 140673 4c11924 140681 4c1177c 140673->140681 140674->140673 140676 4c11932 140674->140676 140678 4c11984 140674->140678 140685 4c115d8 140674->140685 140693 4c1148c LocalAlloc 140674->140693 140676->140667 140694 4c116b4 VirtualFree 140678->140694 140680->140668 140683 4c117cf 140681->140683 140682 4c1181e 140682->140676 140683->140682 140684 4c11805 VirtualAlloc 140683->140684 140684->140682 140684->140683 140686 4c115e7 VirtualAlloc 140685->140686 140688 4c11614 140686->140688 140689 4c11637 140686->140689 140695 4c113fc LocalAlloc 140688->140695 140689->140674 140691 4c11620 140691->140689 140692 4c11624 VirtualFree 140691->140692 140692->140689 140693->140674 140694->140676 140695->140691 140696 f81066 140701 f8aaaa 140696->140701 140698 f8106c 140699 fa2f70 __cinit 68 API calls 140698->140699 140700 f81076 140699->140700 140702 f8aacb 140701->140702 140734 fa02eb 140702->140734 140706 f8ab12 140707 f91207 60 API calls 140706->140707 140708 f8ab1c 140707->140708 140709 f91207 60 API calls 140708->140709 140710 f8ab26 140709->140710 140711 f91207 60 API calls 140710->140711 140712 f8ab30 140711->140712 140713 f91207 60 API calls 140712->140713 140714 f8ab6e 140713->140714 140715 f91207 60 API calls 140714->140715 140716 f8ac39 140715->140716 140744 fa0588 140716->140744 140720 f8ac6b 140721 f91207 60 API calls 140720->140721 140722 f8ac75 140721->140722 140772 f9fe2b 140722->140772 140724 f8acbc 140725 f8accc GetStdHandle 140724->140725 140726 f8ad18 140725->140726 140727 fc2f39 140725->140727 140728 f8ad20 OleInitialize 140726->140728 140727->140726 140729 fc2f42 140727->140729 140728->140698 140779 fe70f3 65 API calls Mailbox 140729->140779 140731 fc2f49 140780 fe77c2 CreateThread 140731->140780 140733 fc2f55 CloseHandle 140733->140728 140781 fa03c4 140734->140781 140737 fa03c4 60 API calls 140738 fa032d 140737->140738 140739 f91207 60 API calls 140738->140739 140740 fa0339 140739->140740 140741 f91821 60 API calls 140740->140741 140742 f8aad1 140741->140742 140743 fa07bb 6 API calls 140742->140743 140743->140706 140745 f91207 60 API calls 140744->140745 140746 fa0598 140745->140746 140747 f91207 60 API calls 140746->140747 140748 fa05a0 140747->140748 140788 f910c3 140748->140788 140751 f910c3 60 API calls 140752 fa05b0 140751->140752 140753 f91207 60 API calls 140752->140753 140754 fa05bb 140753->140754 140755 fa0fe6 Mailbox 60 API calls 140754->140755 140756 f8ac43 140755->140756 140757 f9ff4c 140756->140757 140758 f9ff5a 140757->140758 140759 f91207 60 API calls 140758->140759 140760 f9ff65 140759->140760 140761 f91207 60 API calls 140760->140761 140762 f9ff70 140761->140762 140763 f91207 60 API calls 140762->140763 140764 f9ff7b 140763->140764 140765 f91207 60 API calls 140764->140765 140766 f9ff86 140765->140766 140767 f910c3 60 API calls 140766->140767 140768 f9ff91 140767->140768 140769 fa0fe6 Mailbox 60 API calls 140768->140769 140770 f9ff98 RegisterWindowMessageW 140769->140770 140770->140720 140773 fd620c 140772->140773 140774 f9fe3b 140772->140774 140791 fea12a 60 API calls 140773->140791 140775 fa0fe6 Mailbox 60 API calls 140774->140775 140778 f9fe43 140775->140778 140777 fd6217 140778->140724 140779->140731 140780->140733 140792 fe77a8 66 API calls 140780->140792 140782 f91207 60 API calls 140781->140782 140783 fa03cf 140782->140783 140784 f91207 60 API calls 140783->140784 140785 fa03d7 140784->140785 140786 f91207 60 API calls 140785->140786 140787 fa0323 140786->140787 140787->140737 140789 f91207 60 API calls 140788->140789 140790 f910cb 140789->140790 140790->140751 140791->140777 140793 fc2b43 140797 fd6b59 140793->140797 140795 fc2b4e 140796 fd6b59 86 API calls 140795->140796 140796->140795 140802 fd6b93 140797->140802 140804 fd6b66 140797->140804 140798 fd6b95 140809 f84818 85 API calls Mailbox 140798->140809 140799 fd6b9a 140801 f84d37 85 API calls 140799->140801 140803 fd6ba1 140801->140803 140802->140795 140805 f917e0 60 API calls 140803->140805 140804->140798 140804->140799 140804->140802 140806 fd6b8d 140804->140806 140805->140802 140808 f84aa0 60 API calls _wcsstr 140806->140808 140808->140802 140809->140799

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 965 4c15c08-4c15c48 GetModuleFileNameA RegOpenKeyExA 966 4c15c8a-4c15ccd call 4c15a30 RegQueryValueExA 965->966 967 4c15c4a-4c15c66 RegOpenKeyExA 965->967 972 4c15cf1-4c15d0b RegCloseKey 966->972 973 4c15ccf-4c15ceb RegQueryValueExA 966->973 967->966 968 4c15c68-4c15c84 RegOpenKeyExA 967->968 968->966 970 4c15d13-4c15d44 lstrcpyn GetThreadLocale GetLocaleInfoA 968->970 974 4c15e43-4c15e49 970->974 975 4c15d4a-4c15d4e 970->975 973->972 978 4c15ced 973->978 976 4c15d50-4c15d54 975->976 977 4c15d5a-4c15d71 lstrlen 975->977 976->974 976->977 979 4c15d76-4c15d7c 977->979 978->972 980 4c15d89-4c15d92 979->980 981 4c15d7e-4c15d87 979->981 980->974 983 4c15d98-4c15d9f 980->983 981->980 982 4c15d73 981->982 982->979 984 4c15da1-4c15dcb lstrcpyn LoadLibraryExA 983->984 985 4c15dcd-4c15dcf 983->985 984->985 985->974 986 4c15dd1-4c15dd5 985->986 986->974 987 4c15dd7-4c15e0b lstrcpyn LoadLibraryExA 986->987 987->974 988 4c15e0d-4c15e41 lstrcpyn LoadLibraryExA 987->988 988->974
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 04C15C23
                                        • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15C41
                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15C5F
                                        • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04C15C7D
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,04C15D0C,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04C15CC6
                                        • RegQueryValueExA.ADVAPI32(?,04C15E88,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,04C15D0C,?,80000001), ref: 04C15CE4
                                        • RegCloseKey.ADVAPI32(?,04C15D13,00000000,00000000,00000005,00000000,04C15D0C,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15D06
                                        • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 04C15D23
                                        • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105), ref: 04C15D30
                                        • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105), ref: 04C15D36
                                        • lstrlen.KERNEL32(00000000), ref: 04C15D61
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04C15DB6
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15DC6
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04C15DF2
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E02
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E2C
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E3C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                        • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                        • API String ID: 1759228003-2375825460
                                        • Opcode ID: 548ff9e1b4aeffb6376a1cf5c1ae29b0ae2b1ab45e361d8f52e38d555762f552
                                        • Instruction ID: 5be77b12f09d26f1009f2feebff60e480545d7849c5a492c0f03067816b89b15
                                        • Opcode Fuzzy Hash: 548ff9e1b4aeffb6376a1cf5c1ae29b0ae2b1ab45e361d8f52e38d555762f552
                                        • Instruction Fuzzy Hash: D8615371E042497EEB11DAE4CC85FEF77FE9F4E304F4440A1A604E6191DBB8AB54AB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F9526C
                                        • IsDebuggerPresent.KERNEL32 ref: 00F9527E
                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00F952E6
                                          • Part of subcall function 00F91821: _memmove.LIBCMT ref: 00F9185B
                                          • Part of subcall function 00F8BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F8BC07
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F95366
                                        • MessageBoxA.USER32 ref: 00FD0B2E
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00FD0B66
                                        • GetForegroundWindow.USER32 ref: 00FD0BE9
                                        • ShellExecuteW.SHELL32(00000000), ref: 00FD0BF0
                                          • Part of subcall function 00F9514C: GetSysColorBrush.USER32 ref: 00F95156
                                          • Part of subcall function 00F9514C: LoadCursorW.USER32 ref: 00F95165
                                          • Part of subcall function 00F9514C: LoadIconW.USER32 ref: 00F9517C
                                          • Part of subcall function 00F9514C: LoadIconW.USER32 ref: 00F9518E
                                          • Part of subcall function 00F9514C: LoadIconW.USER32 ref: 00F951A0
                                          • Part of subcall function 00F9514C: LoadImageW.USER32 ref: 00F951C6
                                          • Part of subcall function 00F9514C: RegisterClassExW.USER32(?), ref: 00F9521C
                                          • Part of subcall function 00F950DB: CreateWindowExW.USER32 ref: 00F95109
                                          • Part of subcall function 00F950DB: CreateWindowExW.USER32 ref: 00F9512A
                                          • Part of subcall function 00F950DB: ShowWindow.USER32(00000000), ref: 00F9513E
                                          • Part of subcall function 00F950DB: ShowWindow.USER32(00000000), ref: 00F95147
                                          • Part of subcall function 00F959D3: _memset.LIBCMT ref: 00F959F9
                                          • Part of subcall function 00F959D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F95A9E
                                        Strings
                                        • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00FD0B28
                                        • AutoIt, xrefs: 00FD0B23
                                        • runas, xrefs: 00FD0BE4
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                        • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                        • API String ID: 529118366-2030392706
                                        • Opcode ID: 98c68ab50b322c257bccdc472a7ecfeebd3c2e38a3710759db8baf4c169b6ee3
                                        • Instruction ID: 11feb68cddf6eeec4cf8ecc5bf99c01df55b1bd85a00e0b146c198ee0d512f7d
                                        • Opcode Fuzzy Hash: 98c68ab50b322c257bccdc472a7ecfeebd3c2e38a3710759db8baf4c169b6ee3
                                        • Instruction Fuzzy Hash: 965148B1E04248ABEF22ABF0DD86EED7B39BB45740F00406AF4C1A6156CB7E4545EB20
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1314 4c15d12-4c15d44 lstrcpyn GetThreadLocale GetLocaleInfoA 1316 4c15e43-4c15e49 1314->1316 1317 4c15d4a-4c15d4e 1314->1317 1318 4c15d50-4c15d54 1317->1318 1319 4c15d5a-4c15d71 lstrlen 1317->1319 1318->1316 1318->1319 1320 4c15d76-4c15d7c 1319->1320 1321 4c15d89-4c15d92 1320->1321 1322 4c15d7e-4c15d87 1320->1322 1321->1316 1324 4c15d98-4c15d9f 1321->1324 1322->1321 1323 4c15d73 1322->1323 1323->1320 1325 4c15da1-4c15dcb lstrcpyn LoadLibraryExA 1324->1325 1326 4c15dcd-4c15dcf 1324->1326 1325->1326 1326->1316 1327 4c15dd1-4c15dd5 1326->1327 1327->1316 1328 4c15dd7-4c15e0b lstrcpyn LoadLibraryExA 1327->1328 1328->1316 1329 4c15e0d-4c15e41 lstrcpyn LoadLibraryExA 1328->1329 1329->1316
                                        APIs
                                        • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 04C15D23
                                        • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105), ref: 04C15D30
                                        • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105), ref: 04C15D36
                                        • lstrlen.KERNEL32(00000000), ref: 04C15D61
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04C15DB6
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15DC6
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04C15DF2
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E02
                                        • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E2C
                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04C15E3C
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                        • String ID:
                                        • API String ID: 1599918012-0
                                        • Opcode ID: 4b89cfe6d2ad99b3820c8892dd5a81aca17e3f0bdab2e43b01d0f32107218ad3
                                        • Instruction ID: 1d28acadc63b233bd6b9066bfc30b5514996b06e3c99f1758138641e3314b215
                                        • Opcode Fuzzy Hash: 4b89cfe6d2ad99b3820c8892dd5a81aca17e3f0bdab2e43b01d0f32107218ad3
                                        • Instruction Fuzzy Hash: BA312171E042497EEF15DAE8C888BEF77BE9F4D304F044191A245E2190DBB8AB559B50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1442 f81663-f81ced call f829e2 1446 f81cf3-f81d01 1442->1446 1447 f81e95-f81e98 1442->1447 1448 fbbbce-fbbbd4 1446->1448 1449 f81d07-f81d11 1446->1449 1447->1446 1450 f81e9e-f81ea5 1447->1450 1451 fbbbe2-fbbbe7 1448->1451 1452 fbbbd6-fbbbdc 1448->1452 1453 f81d5f-f81d66 1449->1453 1454 f81d13 1449->1454 1455 f81dd5-f81dd6 DefDlgProcW 1450->1455 1456 fbbbea-fbbbec 1451->1456 1452->1449 1452->1451 1460 f81d68 1453->1460 1461 f81d91-f81d99 1453->1461 1457 f81d19-f81d1c 1454->1457 1458 fbbc80 1454->1458 1459 f81ddc-f81de0 1455->1459 1462 fbbc4e 1456->1462 1463 fbbbee-fbbbf5 1456->1463 1464 f81e4d-f81e52 1457->1464 1465 f81d22 1457->1465 1468 fbbc81-fbbc93 call 100da7e 1458->1468 1469 f81d6e-f81d75 1460->1469 1470 f81f10-f81f11 1460->1470 1466 f81d9f-f81da0 1461->1466 1467 f81f16-f81f18 1461->1467 1491 fbbc55 1462->1491 1473 fbbc08-fbbc38 call ff17a3 1463->1473 1474 fbbbf7-fbbc06 call fd7392 1463->1474 1480 f81e58-f81e5b 1464->1480 1481 fbbd02-fbbd0a call 100d164 1464->1481 1475 f81d28-f81d2b 1465->1475 1476 fbbc74-fbbc7b call 100cc25 1465->1476 1477 fbbd5c 1466->1477 1478 f81da6-f81da9 1466->1478 1483 fbbd2d-fbbd40 call 100c5d8 1467->1483 1523 f81de9-f81deb 1468->1523 1471 f81ded 1469->1471 1472 f81d77-f81d7f 1469->1472 1482 fbbd5e-fbbd70 call 100c634 1470->1482 1492 fbbd0f-fbbd18 call fd7256 1471->1492 1493 f81df3-f81dfb 1471->1493 1484 fbbd1d-fbbd23 1472->1484 1485 f81d85-f81d8f call f81aba 1472->1485 1473->1491 1535 fbbc3a-fbbc48 call f829e2 1473->1535 1474->1456 1496 f81eaa 1475->1496 1497 f81d31-f81d34 1475->1497 1476->1523 1477->1482 1487 f81daf-f81db0 1478->1487 1488 fbbdc1-fbbdcd call 100cf08 1478->1488 1500 f81e61-f81e64 1480->1500 1501 fbbcf1-fbbcfd call 100cfb1 1480->1501 1481->1459 1482->1523 1483->1523 1515 fbbd45-fbbd57 call 100cfe6 1484->1515 1516 fbbd25-fbbd26 1484->1516 1485->1459 1506 fbbdb0-fbbdbc call 100cf37 1487->1506 1507 f81db6-f81db9 1487->1507 1488->1523 1539 fbbc5d-fbbc6f call 100db04 1491->1539 1492->1459 1517 f81f09 1493->1517 1518 f81e01-f81e02 1493->1518 1509 f81eac-f81eaf 1496->1509 1510 f81ecf-f81ee0 call f81c77 1496->1510 1521 f81d3a-f81d3d 1497->1521 1522 f81de3-f81de4 call f81b41 1497->1522 1502 fbbcdb-fbbcec call 100cb40 1500->1502 1503 f81e6a-f81e6d 1500->1503 1501->1523 1502->1523 1525 f81e73-f81e79 1503->1525 1526 fbbcc5-fbbcd6 call 100d124 1503->1526 1506->1523 1530 fbbd9f-fbbdab call 100cf66 1507->1530 1531 f81dbf-f81dc0 1507->1531 1509->1523 1533 f81eb5-f81eb6 1509->1533 1510->1523 1515->1523 1540 fbbd2c 1516->1540 1541 f81dd2-f81dd4 1516->1541 1517->1470 1542 f81e08-f81e09 1518->1542 1543 f81f02 1518->1543 1545 f81ec3-f81eca call f81a59 1521->1545 1546 f81d43-f81d46 1521->1546 1522->1523 1523->1459 1547 fbbcaf-fbbcc0 call 100c854 1525->1547 1548 f81e7f-f81e80 1525->1548 1526->1459 1530->1523 1553 fbbd93-fbbd9a call 100cca6 1531->1553 1554 f81dc6-f81dcc 1531->1554 1555 f81eb8-f81ebe call f81a91 1533->1555 1556 f81ee5-f81ee6 1533->1556 1535->1462 1535->1523 1539->1523 1540->1483 1541->1455 1542->1492 1561 f81e0f-f81e10 1542->1561 1543->1517 1545->1523 1546->1541 1563 f81d4c-f81d5d call f8166c 1546->1563 1547->1523 1564 fbbc98-fbbcaa call 100de52 1548->1564 1565 f81e86-f81e88 1548->1565 1553->1523 1554->1541 1568 fbbd75-fbbd8e IsThemeActive DefDlgProcW 1554->1568 1555->1523 1573 f81ee8-f81eea 1556->1573 1574 f81ef5-f81efd call 100d040 1556->1574 1561->1541 1575 f81e12-f81e36 call f829e2 GetSysColor 1561->1575 1563->1459 1564->1523 1565->1541 1581 f81e8e-f81e90 1565->1581 1568->1523 1573->1541 1583 f81ef0 1573->1583 1574->1523 1591 f81e38 1575->1591 1592 f81e3b-f81e4b SetBkColor call f826a0 1575->1592 1581->1468 1583->1539 1591->1592 1592->1459
                                        APIs
                                          • Part of subcall function 00F829E2: GetWindowLongW.USER32(?,000000EB), ref: 00F829F3
                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F81DD6
                                        • GetSysColor.USER32 ref: 00F81E2A
                                        • SetBkColor.GDI32(?,00000000), ref: 00F81E3D
                                          • Part of subcall function 00F8166C: DefDlgProcW.USER32(?,00000020,?), ref: 00F816B4
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: ColorProc$LongWindow
                                        • String ID:
                                        • API String ID: 3744519093-0
                                        • Opcode ID: 8257176442fd6518b9f5f540b81dd774b85faae356349ef33b6f112171636b20
                                        • Instruction ID: 286866e4b09aa2f038098964faeb3356979442beff4d749015c73791055bc6e4
                                        • Opcode Fuzzy Hash: 8257176442fd6518b9f5f540b81dd774b85faae356349ef33b6f112171636b20
                                        • Instruction Fuzzy Hash: 9AA126B6505409BBE639BAAA8C88FFB3A5DFB45321F14030AF442C5185CB699D03F776
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,00FCFC86), ref: 00FE495A
                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00FE496B
                                        • FindClose.KERNEL32(00000000), ref: 00FE497B
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirst
                                        • String ID:
                                        • API String ID: 48322524-0
                                        • Opcode ID: 555ee79ca257e049acf239366d235aebbf5e85dff374d6175cd2e8a585e1f7cf
                                        • Instruction ID: 835745c749db2fd619a2b4c5343747e42e6467ed850e4380e514838b625240bc
                                        • Opcode Fuzzy Hash: 555ee79ca257e049acf239366d235aebbf5e85dff374d6175cd2e8a585e1f7cf
                                        • Instruction Fuzzy Hash: 2FE02632810516AB8220663CEC0D8EF775C9E0A339F100709F8B5D20C8EB7CAD88A7D6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1ed2dfb469cf4db7b85b95f860dda0963af055de7e62bc70e55c4922dee5aea
                                        • Instruction ID: 35c2ac58c5b4a0d4a46b91c320f5770751fb047d6018807af4f18f13d835bd93
                                        • Opcode Fuzzy Hash: c1ed2dfb469cf4db7b85b95f860dda0963af055de7e62bc70e55c4922dee5aea
                                        • Instruction Fuzzy Hash: 44228B75E082068FDB14EF54C881BFEB7B0FF45310F188169E856AB351E7B4A981EB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • timeGetTime.WINMM ref: 00F8BF57
                                          • Part of subcall function 00F852B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F852E6
                                        • Sleep.KERNEL32(0000000A,?,?), ref: 00FC36B5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: MessagePeekSleepTimetime
                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                        • API String ID: 1792118007-922114024
                                        • Opcode ID: 19bf3c7619ea2f205f9befaa84ae95563a12b9e6a4dcda0c3467259e4ada7225
                                        • Instruction ID: de0279a28d983e50c18a79fec39f444e53913bebad0f7f8df2ecda7343b2807d
                                        • Opcode Fuzzy Hash: 19bf3c7619ea2f205f9befaa84ae95563a12b9e6a4dcda0c3467259e4ada7225
                                        • Instruction Fuzzy Hash: 4EC2E470A08342DFD728EF14C995FAAB7E5BF84310F14891DF48A87291CB79E944EB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 564 4c6caa9-4c6caea 565 4c6caec-4c6caf1 564->565 565->565 566 4c6caf3-4c6cb54 call 4c167d4 call 4c14450 call 4c44d14 call 4c4411c 565->566 575 4c6cb56-4c6cb65 call 4c40b2c call 4c43878 566->575 576 4c6cb6a-4c6cb9b call 4c42d60 call 4c414bc call 4c437e0 call 4c146e0 call 4c4411c 566->576 575->576 590 4c6cc0d-4c6cc19 call 4c444f8 576->590 591 4c6cb9d-4c6cc08 call 4c414bc call 4c437e0 call 4c146e0 call 4c3ef14 call 4c40c24 call 4c414bc call 4c437e0 call 4c146e0 call 4c40b2c Sleep 576->591 596 4c6cc3b-4c6cc5c Sleep call 4c3e770 call 4c62a08 call 4c4166c 590->596 597 4c6cc1b-4c6cc36 call 4c14724 call 4c40f18 590->597 591->590 615 4c6cc63-4c6cc78 call 4c42980 call 4c14824 596->615 616 4c6cc5e call 4c3ee58 596->616 597->596 626 4c6cd11-4c6cd5d call 4c437e0 call 4c14724 call 4c437e0 call 4c14724 615->626 627 4c6cc7e-4c6cc9d call 4c41484 call 4c146e0 call 4c4411c 615->627 616->615 648 4c6cdc0-4c6cdc8 626->648 649 4c6cd5f-4c6cd7b call 4c12dc0 call 4c149c0 626->649 627->626 645 4c6cc9f-4c6cd0e call 4c408bc call 4c3894c call 4c408bc call 4c41484 call 4c146e0 call 4c3ef14 call 4c40c24 call 4c41484 call 4c146e0 call 4c40b2c 627->645 645->626 652 4c6cdcf-4c6cdfb call 4c3cc0c call 4c3ab34 GetCurrentThreadId call 4c42980 call 4c14824 648->652 653 4c6cdca call 4c3dd20 648->653 649->648 667 4c6cd7d-4c6cdb9 call 4c12dc0 call 4c40344 call 4c14450 call 4c3d668 call 4c3c748 649->667 681 4c6ce96-4c6ceb5 call 4c6b410 call 4c14420 652->681 682 4c6ce01-4c6ce20 call 4c41484 call 4c146e0 call 4c4411c 652->682 653->652 667->648 703 4c6cdbb call 4c43878 667->703 682->681 707 4c6ce22-4c6ce91 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 682->707 703->648 707->681
                                        APIs
                                        • Sleep.KERNEL32(000007D0,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CC08
                                        • Sleep.KERNEL32(00000064,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CC3D
                                        • GetCurrentThreadId.KERNEL32(00000064,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CDD9
                                          • Part of subcall function 04C408BC: CloseHandle.KERNEL32(00000000), ref: 04C409C9
                                          • Part of subcall function 04C408BC: GetCurrentProcessId.KERNEL32 ref: 04C40986
                                          • Part of subcall function 04C408BC: OpenProcess.KERNEL32(00000001,00000000,?,00000000), ref: 04C409A0
                                          • Part of subcall function 04C40B2C: Sleep.KERNEL32(00000002,00000000,04C40B9D,?,00000001), ref: 04C40B7D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep$CurrentProcess$CloseHandleOpenThread
                                        • String ID: .a3x$6.2.1$Yes$autoit3.exe$c.txt$c:\debugg$c:\temp\just_test.txt$c:\temp\test_ok$cc.txt$debug 0 $mutex0$mutex1$script.a3x$test$u.txt$uu.txt$vbc.exe
                                        • API String ID: 2094150352-1200978658
                                        • Opcode ID: 186a7a3d0b35dcab69922cdefb3d2dc18d361f04a0faf1cf9975983a696863ab
                                        • Instruction ID: bfd60b58c1145a68aaa1f420da5894b0b6dbbb89d5a7652925e46e8357689179
                                        • Opcode Fuzzy Hash: 186a7a3d0b35dcab69922cdefb3d2dc18d361f04a0faf1cf9975983a696863ab
                                        • Instruction Fuzzy Hash: 27B14178A001488FFB01FBA4D580ACDB7B7EF86358F148155D491AB2A5DB34FD05EBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 733 4c6cae4-4c6cae7 734 4c6caec-4c6caf1 733->734 734->734 735 4c6caf3-4c6cb54 call 4c167d4 call 4c14450 call 4c44d14 call 4c4411c 734->735 744 4c6cb56-4c6cb65 call 4c40b2c call 4c43878 735->744 745 4c6cb6a-4c6cb9b call 4c42d60 call 4c414bc call 4c437e0 call 4c146e0 call 4c4411c 735->745 744->745 759 4c6cc0d-4c6cc19 call 4c444f8 745->759 760 4c6cb9d-4c6cc08 call 4c414bc call 4c437e0 call 4c146e0 call 4c3ef14 call 4c40c24 call 4c414bc call 4c437e0 call 4c146e0 call 4c40b2c Sleep 745->760 765 4c6cc3b-4c6cc47 Sleep call 4c3e770 call 4c62a08 759->765 766 4c6cc1b-4c6cc36 call 4c14724 call 4c40f18 759->766 760->759 778 4c6cc4c-4c6cc5c call 4c4166c 765->778 766->765 784 4c6cc63-4c6cc78 call 4c42980 call 4c14824 778->784 785 4c6cc5e call 4c3ee58 778->785 795 4c6cd11-4c6cd5d call 4c437e0 call 4c14724 call 4c437e0 call 4c14724 784->795 796 4c6cc7e-4c6cc9d call 4c41484 call 4c146e0 call 4c4411c 784->796 785->784 817 4c6cdc0-4c6cdc8 795->817 818 4c6cd5f-4c6cd7b call 4c12dc0 call 4c149c0 795->818 796->795 814 4c6cc9f-4c6cd0e call 4c408bc call 4c3894c call 4c408bc call 4c41484 call 4c146e0 call 4c3ef14 call 4c40c24 call 4c41484 call 4c146e0 call 4c40b2c 796->814 814->795 821 4c6cdcf-4c6cdfb call 4c3cc0c call 4c3ab34 GetCurrentThreadId call 4c42980 call 4c14824 817->821 822 4c6cdca call 4c3dd20 817->822 818->817 836 4c6cd7d-4c6cdb9 call 4c12dc0 call 4c40344 call 4c14450 call 4c3d668 call 4c3c748 818->836 850 4c6ce96-4c6ceb5 call 4c6b410 call 4c14420 821->850 851 4c6ce01-4c6ce20 call 4c41484 call 4c146e0 call 4c4411c 821->851 822->821 836->817 872 4c6cdbb call 4c43878 836->872 851->850 876 4c6ce22-4c6ce91 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 call 4c41484 call 4c146e0 call 4c3ef14 851->876 872->817 876->850
                                        APIs
                                        • Sleep.KERNEL32(000007D0,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CC08
                                        • Sleep.KERNEL32(00000064,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CC3D
                                        • GetCurrentThreadId.KERNEL32(00000064,00000000,04C6CEB6,?,00000000,00000000), ref: 04C6CDD9
                                          • Part of subcall function 04C408BC: CloseHandle.KERNEL32(00000000), ref: 04C409C9
                                          • Part of subcall function 04C408BC: GetCurrentProcessId.KERNEL32 ref: 04C40986
                                          • Part of subcall function 04C408BC: OpenProcess.KERNEL32(00000001,00000000,?,00000000), ref: 04C409A0
                                          • Part of subcall function 04C40B2C: Sleep.KERNEL32(00000002,00000000,04C40B9D,?,00000001), ref: 04C40B7D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep$CurrentProcess$CloseHandleOpenThread
                                        • String ID: .a3x$6.2.1$Yes$autoit3.exe$c.txt$c:\debugg$c:\temp\just_test.txt$c:\temp\test_ok$cc.txt$debug 0 $mutex0$mutex1$script.a3x$test$u.txt$uu.txt$vbc.exe
                                        • API String ID: 2094150352-1200978658
                                        • Opcode ID: f0e429d7d2c64f52057639f721f40d60b102ce9094cd12bef494a957d1b0788d
                                        • Instruction ID: 2f11f181509cc2c23e2390bf8d1af777e3ab8241657d07cd94150299617998d0
                                        • Opcode Fuzzy Hash: f0e429d7d2c64f52057639f721f40d60b102ce9094cd12bef494a957d1b0788d
                                        • Instruction Fuzzy Hash: 5EA10D78A002488BFB04FBA4D580ACDB7B7EF8534CF148065E451AB255DB34FD45EBA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 902 f82ba9-f82bbf call fa0fe6 905 f82bc5-f82be0 call f8112a 902->905 906 f82e06 902->906 910 fbc3fd-fbc401 905->910 911 f82be6-f82bf9 call f81307 905->911 908 f82e0d 906->908 912 f82e14 908->912 914 f82bfb-f82c18 910->914 915 fbc407 910->915 911->914 920 f82e1b 912->920 917 f82c1a 914->917 918 f82c1f-f82c30 914->918 919 fbc40d-fbc413 915->919 917->918 918->908 921 f82c36-f82c3c 918->921 919->914 922 fbc419-fbc41c 919->922 927 f82e23 920->927 921->912 923 f82c42-f82c52 921->923 922->919 924 fbc41e 922->924 925 f82c58-f82c6d 923->925 926 fbc423-fbc428 923->926 924->914 925->920 930 f82c73-f82c77 925->930 928 fbc45a-fbc472 call f829e2 926->928 929 fbc42a-fbc42c 926->929 927->910 943 fbc486-fbc4d6 GetWindowRect GetClientRect GetSystemMetrics * 2 928->943 944 fbc474-fbc47f 928->944 932 fbc431 929->932 930->927 931 f82c7d-f82c80 930->931 934 f82caf-f82cb3 931->934 935 f82c82-f82cac SystemParametersInfoW GetSystemMetrics 931->935 936 fbc43f-fbc44a 932->936 937 fbc433-fbc43d call f81377 932->937 940 f82cfb-f82d56 SetRect AdjustWindowRectEx CreateWindowExW 934->940 941 f82cb5-f82ce8 SystemParametersInfoW GetSystemMetrics 934->941 935->934 942 fbc453 936->942 937->942 949 f82d5c-f82dbf SetWindowLongW GetClientRect GetStockObject SendMessageW call f82714 940->949 950 fbc42e 940->950 941->940 947 f82cea-f82cf8 GetSystemMetrics 941->947 942->928 945 fbc4d8-fbc4e0 GetSystemMetrics 943->945 946 fbc4e3 943->946 944->943 945->946 952 fbc4eb-fbc4ef 946->952 947->940 956 f82dc1-f82dd2 SetTimer 949->956 957 f82dd7-f82df5 call f83336 949->957 950->932 954 fbc44c-fbc44e call 100b3c7 952->954 955 fbc4f5-fbc4f9 952->955 954->942 955->954 958 fbc4ff-fbc503 call f82e2b 955->958 956->957 957->952 963 f82dfb-f82e03 957->963 964 fbc508 958->964 964->964
                                        APIs
                                        • SystemParametersInfoW.USER32 ref: 00F82C8C
                                        • GetSystemMetrics.USER32 ref: 00F82C94
                                        • SystemParametersInfoW.USER32 ref: 00F82CBF
                                        • GetSystemMetrics.USER32 ref: 00F82CC7
                                        • GetSystemMetrics.USER32 ref: 00F82CEC
                                        • SetRect.USER32 ref: 00F82D09
                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F82D19
                                        • CreateWindowExW.USER32 ref: 00F82D4C
                                        • SetWindowLongW.USER32 ref: 00F82D60
                                        • GetClientRect.USER32 ref: 00F82D7E
                                        • GetStockObject.GDI32(00000011), ref: 00F82D9A
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F82DA5
                                          • Part of subcall function 00F82714: GetCursorPos.USER32(?), ref: 00F82727
                                          • Part of subcall function 00F82714: ScreenToClient.USER32(010477B0,?), ref: 00F82744
                                          • Part of subcall function 00F82714: GetAsyncKeyState.USER32 ref: 00F82769
                                          • Part of subcall function 00F82714: GetAsyncKeyState.USER32 ref: 00F82777
                                        • SetTimer.USER32(00000000,00000000,00000028,00F813C7), ref: 00F82DCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                        • String ID: AutoIt v3 GUI
                                        • API String ID: 1458621304-248962490
                                        • Opcode ID: f308356b34e0ad4204296fcea531d7c5e3af2a847869faed706db38f6175879c
                                        • Instruction ID: 1213755a587b6f02dfe8dc85a44789440611f11500e82607a5afb7234891bc99
                                        • Opcode Fuzzy Hash: f308356b34e0ad4204296fcea531d7c5e3af2a847869faed706db38f6175879c
                                        • Instruction Fuzzy Hash: FDB17075A0020ADFDB24DF68D985BEE7BB4FB08320F104129FA55E7284DB79A941DF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1054 f92fc5-f930ea call fb1b70 call f91207 call fa00cf call fa08c1 call f91900 call f94c94 call f91207 call f919e1 RegOpenKeyExW 1071 f930f0-f9310d call f91cb6 * 2 1054->1071 1072 fd01a3-fd01be RegQueryValueExW 1054->1072 1073 fd0235-fd0241 RegCloseKey 1072->1073 1074 fd01c0-fd01ff call fa0fe6 call f9433f RegQueryValueExW 1072->1074 1073->1071 1078 fd0247-fd024b 1073->1078 1087 fd021d-fd0223 1074->1087 1088 fd0201-fd021b call f91821 1074->1088 1080 fd0250-fd0276 call f91609 * 2 1078->1080 1095 fd0278-fd0286 call f91609 1080->1095 1096 fd029b-fd02a8 call fa2e2c 1080->1096 1092 fd0225-fd0232 call fa105c * 2 1087->1092 1093 fd0233 1087->1093 1088->1087 1092->1093 1093->1073 1095->1096 1107 fd0288-fd0299 call fa2fbd 1095->1107 1105 fd02ce-fd0308 call f91a36 call f94c94 call f91cb6 call f91609 1096->1105 1106 fd02aa-fd02bb call fa2e2c 1096->1106 1105->1071 1114 fd030e-fd030f 1105->1114 1106->1105 1115 fd02bd-fd02cd call fa2fbd 1106->1115 1107->1114 1114->1080 1115->1105
                                        APIs
                                          • Part of subcall function 00FA00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00F93094), ref: 00FA00ED
                                          • Part of subcall function 00FA08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F9309F), ref: 00FA08E3
                                        • RegOpenKeyExW.KERNEL32 ref: 00F930E2
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FD01BA
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00FD01FB
                                        • RegCloseKey.ADVAPI32(?), ref: 00FD0239
                                        • _wcscat.LIBCMT ref: 00FD0292
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                        • API String ID: 2673923337-2727554177
                                        • Opcode ID: f06dd75144e22323c7af71c9e1441503c23216da9b3a2bd4583e5de7f1a014f0
                                        • Instruction ID: 3d0d23f61a550ea54c793b09606c8e58a80c347111d98d4d6e700b4008cee71e
                                        • Opcode Fuzzy Hash: f06dd75144e22323c7af71c9e1441503c23216da9b3a2bd4583e5de7f1a014f0
                                        • Instruction Fuzzy Hash: 3971EFB15053019FD720EFA5EE8196BBBE8FF44310F40892FF484872A4EB399944DB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32 ref: 00F95156
                                        • LoadCursorW.USER32 ref: 00F95165
                                        • LoadIconW.USER32 ref: 00F9517C
                                        • LoadIconW.USER32 ref: 00F9518E
                                        • LoadIconW.USER32 ref: 00F951A0
                                        • LoadImageW.USER32 ref: 00F951C6
                                        • RegisterClassExW.USER32(?), ref: 00F9521C
                                          • Part of subcall function 00F83411: GetSysColorBrush.USER32 ref: 00F83444
                                          • Part of subcall function 00F83411: RegisterClassExW.USER32(00000030), ref: 00F8346E
                                          • Part of subcall function 00F83411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F8347F
                                          • Part of subcall function 00F83411: InitCommonControlsEx.COMCTL32(?), ref: 00F8349C
                                          • Part of subcall function 00F83411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F834AC
                                          • Part of subcall function 00F83411: LoadIconW.USER32 ref: 00F834C2
                                          • Part of subcall function 00F83411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F834D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                        • String ID: #$0$AutoIt v3
                                        • API String ID: 423443420-4155596026
                                        • Opcode ID: aa293240495fcaa1a08a0dc04fed4025941ca38d4812c05512f24e655c8e0842
                                        • Instruction ID: 9bb9a2653d472509d65606e3c462edd95dd1856a2629e45415d0a0f0e9ec6537
                                        • Opcode Fuzzy Hash: aa293240495fcaa1a08a0dc04fed4025941ca38d4812c05512f24e655c8e0842
                                        • Instruction Fuzzy Hash: 472168B9D00308AFEB219FA4EF89B9D7BB4FB08710F00011AF584A6298C7BB55409F80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1131 f94d83-f94dd1 1133 f94e31-f94e33 1131->1133 1134 f94dd3-f94dd6 1131->1134 1133->1134 1135 f94e35 1133->1135 1136 f94dd8-f94ddf 1134->1136 1137 f94e37 1134->1137 1138 f94e1a-f94e22 DefWindowProcW 1135->1138 1141 f94ead-f94eb5 PostQuitMessage 1136->1141 1142 f94de5-f94dea 1136->1142 1139 f94e3d-f94e40 1137->1139 1140 fd09c2-fd09f0 call f8c460 call f8c483 1137->1140 1148 f94e28-f94e2e 1138->1148 1143 f94e42-f94e43 1139->1143 1144 f94e65-f94e8c SetTimer RegisterWindowMessageW 1139->1144 1178 fd09f5-fd09fc 1140->1178 1149 f94e61-f94e63 1141->1149 1145 fd0a35-fd0a49 call fe2cce 1142->1145 1146 f94df0-f94df2 1142->1146 1150 f94e49-f94e5c KillTimer call f95ac3 call f834e4 1143->1150 1151 fd0965-fd0968 1143->1151 1144->1149 1152 f94e8e-f94e99 CreatePopupMenu 1144->1152 1145->1149 1172 fd0a4f 1145->1172 1153 f94df8-f94dfd 1146->1153 1154 f94eb7-f94ec6 call f95b29 1146->1154 1149->1148 1150->1149 1158 fd099e-fd09bd MoveWindow 1151->1158 1159 fd096a-fd096c 1151->1159 1152->1149 1161 fd0a1a-fd0a21 1153->1161 1162 f94e03-f94e08 1153->1162 1154->1149 1158->1149 1166 fd098d-fd0999 SetFocus 1159->1166 1167 fd096e-fd0971 1159->1167 1161->1138 1169 fd0a27-fd0a30 call fd8854 1161->1169 1170 f94e9b-f94eab call f95bd7 1162->1170 1171 f94e0e-f94e14 1162->1171 1166->1149 1167->1171 1174 fd0977-fd0988 call f8c460 1167->1174 1169->1138 1170->1149 1171->1138 1171->1178 1172->1138 1174->1149 1178->1138 1179 fd0a02-fd0a15 call f95ac3 call f959d3 1178->1179 1179->1138
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00F94E22
                                        • KillTimer.USER32 ref: 00F94E4C
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F94E6F
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F94E7A
                                        • CreatePopupMenu.USER32 ref: 00F94E8E
                                        • PostQuitMessage.USER32 ref: 00F94EAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                        • String ID: TaskbarCreated
                                        • API String ID: 129472671-2362178303
                                        • Opcode ID: a0300cf5617056b9b46de76ad091957c0916bf5735887a17917e86f603de0e61
                                        • Instruction ID: 1a5ca69c347b91a8ec55ccb6984f44d1450e2a112dfe4ed702bec9084c60b12b
                                        • Opcode Fuzzy Hash: a0300cf5617056b9b46de76ad091957c0916bf5735887a17917e86f603de0e61
                                        • Instruction Fuzzy Hash: 7E4159B2A40209ABFF317F24DD89F7E3655F764310F04061AF58191289CB7EAC42B762
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1188 4c44d14-4c44d83 GetModuleHandleA LoadLibraryA
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,04C6CB40,00000000,04C6CEB6,?,00000000,00000000), ref: 04C44D1F
                                        • LoadLibraryA.KERNEL32(Urlmon.dll,?,04C6CB40,00000000,04C6CEB6,?,00000000,00000000), ref: 04C44D4B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: HandleLibraryLoadModule
                                        • String ID: Advapi32.dll$LoadLibraryA$Shell32.dll$Urlmon.dll$kernel32.dll$ntdll.dll$user32.dll
                                        • API String ID: 4133054770-1140356178
                                        • Opcode ID: 36942063a2ccd7f22c4b142434cf900b3e0eadb0de46b3a3497418f37352bec3
                                        • Instruction ID: b96fa9e01c0d4ea1843cf7907211e11f97f624dbe59bafc3ff472e2c33978374
                                        • Opcode Fuzzy Hash: 36942063a2ccd7f22c4b142434cf900b3e0eadb0de46b3a3497418f37352bec3
                                        • Instruction Fuzzy Hash: 07F0BDB86807A0BFA7059FA4DA8A7243EB5FB45B013204265FD01CA264DB755820EF16
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1397 f950db-f9514b CreateWindowExW * 2 ShowWindow * 2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Window$CreateShow
                                        • String ID: AutoIt v3$edit
                                        • API String ID: 1584632944-3779509399
                                        • Opcode ID: a86ed17e958a94dda0b4f38166ba903e56d5cb052d49cb29e84beb4cdbe2e334
                                        • Instruction ID: aa971f491d55a9a0785063190189e06daf99c496b1d1b1e6693dadcf10e25a7e
                                        • Opcode Fuzzy Hash: a86ed17e958a94dda0b4f38166ba903e56d5cb052d49cb29e84beb4cdbe2e334
                                        • Instruction Fuzzy Hash: F2F0FEB59412947FEA311627AE8CE373E7DE7C6F50F00011EB980A6158C77E1891DBB0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1398 fe9b16-fe9b9b call f94a8c call fe9cf1 1403 fe9b9d 1398->1403 1404 fe9ba5-fe9c5c call f94ab2 * 4 call f94a8c call fa593c * 2 call f94ab2 call fe96c4 call fe8f0e 1398->1404 1405 fe9b9f-fe9ba0 1403->1405 1427 fe9c5e-fe9c6e call fa2f85 * 2 1404->1427 1428 fe9c73-fe9c77 1404->1428 1407 fe9ce8-fe9cee 1405->1407 1427->1405 1429 fe9cd8-fe9cde call fa2f85 1428->1429 1430 fe9c79-fe9ccb call fe90c1 1428->1430 1439 fe9ce0-fe9ce6 1429->1439 1435 fe9cd0-fe9cd6 call fa2f85 1430->1435 1435->1439 1439->1407
                                        APIs
                                          • Part of subcall function 00F94A8C: _fseek.LIBCMT ref: 00F94AA4
                                          • Part of subcall function 00FE9CF1: _wcscmp.LIBCMT ref: 00FE9DE1
                                          • Part of subcall function 00FE9CF1: _wcscmp.LIBCMT ref: 00FE9DF4
                                        • _free.LIBCMT ref: 00FE9C5F
                                        • _free.LIBCMT ref: 00FE9C66
                                        • _free.LIBCMT ref: 00FE9CD1
                                          • Part of subcall function 00FA2F85: HeapFree.KERNEL32(00000000,00000000), ref: 00FA2F99
                                          • Part of subcall function 00FA2F85: GetLastError.KERNEL32(00000000,?,00FA9C54,00000000,00FA8D5D,00FA59C3), ref: 00FA2FAB
                                        • _free.LIBCMT ref: 00FE9CD9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                        • String ID: >>>AUTOIT SCRIPT<<<
                                        • API String ID: 1552873950-2806939583
                                        • Opcode ID: ca51d0826612d8b729ab54a3d6d6b1d4699378c3dbc7ee4d7a4b93d00429a4e0
                                        • Instruction ID: 64612c0f1d0c6cffec56ff036b2a542e32ff1860a4c6a9c0ea83f2cc0be57c89
                                        • Opcode Fuzzy Hash: ca51d0826612d8b729ab54a3d6d6b1d4699378c3dbc7ee4d7a4b93d00429a4e0
                                        • Instruction Fuzzy Hash: 70514CB1E04259AFDF24DF65DC41AAEBBB9FF48304F10009EB649A3341DB755A809F58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                        • String ID:
                                        • API String ID: 1559183368-0
                                        • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                        • Instruction ID: b5ff16a7b1390fa6ba3fcc66730c62015f4fb9c236b9de8f4b61d6cd8d9ae233
                                        • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                        • Instruction Fuzzy Hash: 8551B3B1E00B09DBDB248FA9D88066E77B5AF42B30F648729F835A62D0D7749D50AB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyExW.KERNEL32 ref: 00F812A8
                                        • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00F812C9
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F812EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID: Control Panel\Mouse
                                        • API String ID: 3677997916-824357125
                                        • Opcode ID: 2085299fd290091559d7b04c892a05b5953b0f04d2bb8af3fe93fdbc8e7831c2
                                        • Instruction ID: 261f69db8cf98f0119e33db8f746501cb243d02e6f9193872ba440c21a5f9340
                                        • Opcode Fuzzy Hash: 2085299fd290091559d7b04c892a05b5953b0f04d2bb8af3fe93fdbc8e7831c2
                                        • Instruction Fuzzy Hash: 37115A71910208BFDB219FA5D884EEFBBBCFF04750F004659F845D7104D2319E81A7A0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00F94B85
                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,00F927AF,?,00000001), ref: 00F94B97
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-3689287502
                                        • Opcode ID: 61a8afb20c2a54d3fbd1733bb8ded787779f7487b588aae8924732300bab0a20
                                        • Instruction ID: 128ded8baf278425451aec9fe0b32875ea1ec19d118b743afb35bae678b3b385
                                        • Opcode Fuzzy Hash: 61a8afb20c2a54d3fbd1733bb8ded787779f7487b588aae8924732300bab0a20
                                        • Instruction Fuzzy Hash: 5BD01270910716CFE7305F31D818B0676D4AF54355F11882DE4C5D6508D67CE4C0D710
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00F949C2: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,00F927AF,?,00000001), ref: 00F949F4
                                        • _free.LIBCMT ref: 00FCFB04
                                        • _free.LIBCMT ref: 00FCFB4B
                                          • Part of subcall function 00F929BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F92ADF
                                        Strings
                                        • Bad directive syntax error, xrefs: 00FCFB33
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                        • String ID: Bad directive syntax error
                                        • API String ID: 2861923089-2118420937
                                        • Opcode ID: 8397e06de5501b15366f901692c5175d434543330a585d3dbca5091563795967
                                        • Instruction ID: c862a476604a102c62567542a26bdf7b3b65883f4ee1241a1edc087d50da7af1
                                        • Opcode Fuzzy Hash: 8397e06de5501b15366f901692c5175d434543330a585d3dbca5091563795967
                                        • Instruction Fuzzy Hash: 57915E7190021AAFDF14EFA4CD52EEDB7B5BF05310F14452EF416AB291DB38AA09EB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00F94AB2: __fread_nolock.LIBCMT ref: 00F94AD0
                                        • _wcscmp.LIBCMT ref: 00FE9DE1
                                        • _wcscmp.LIBCMT ref: 00FE9DF4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _wcscmp$__fread_nolock
                                        • String ID: FILE
                                        • API String ID: 4029003684-3121273764
                                        • Opcode ID: c8b2c4d37eaf5d6b3ecef47a5c0ce99b62a866c7111fcc28e88a483a1b873f22
                                        • Instruction ID: 24d1466bba5667ba6e34cddda1a8871df6327f6b2bd78b70e8bfd20b26f9f0f0
                                        • Opcode Fuzzy Hash: c8b2c4d37eaf5d6b3ecef47a5c0ce99b62a866c7111fcc28e88a483a1b873f22
                                        • Instruction Fuzzy Hash: C6412972A04249BADF20DEA1CC45FEF77FDDF45710F00406AFA00A7280D6B9A9059775
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • _memset.LIBCMT ref: 00FD032B
                                        • GetOpenFileNameW.COMDLG32(?), ref: 00FD0375
                                          • Part of subcall function 00FA0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F92A58,?,00008000), ref: 00FA02A4
                                          • Part of subcall function 00FA09C5: GetLongPathNameW.KERNELBASE ref: 00FA09E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Name$Path$FileFullLongOpen_memset
                                        • String ID: X
                                        • API String ID: 3777226403-3081909835
                                        • Opcode ID: 398d2c738d4c950d4ea39c79ecdad039e2171f9fcd989bc9b069b5bcc04bf2b9
                                        • Instruction ID: 5fff0bb39be450801ec4cb24f504bc512b6077a036f3235e545eabdfb70cc547
                                        • Opcode Fuzzy Hash: 398d2c738d4c950d4ea39c79ecdad039e2171f9fcd989bc9b069b5bcc04bf2b9
                                        • Instruction Fuzzy Hash: 9A218E71A00288ABDF55DF94DC45BEE7BFCAF49314F00405AE444A7241DBB95A88AFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa2909fd95c901343248958fe80133b4098e6cee443327c94ecfe8f4d3219780
                                        • Instruction ID: 4ca468a2dd024ece618d198aaf6a93004d3ec28e33cfa8e0a2e73d4c7c01fd89
                                        • Opcode Fuzzy Hash: aa2909fd95c901343248958fe80133b4098e6cee443327c94ecfe8f4d3219780
                                        • Instruction Fuzzy Hash: E8F15B71A083059FC714DF28C880A6ABBE5FF88314F14896EF9999B361D734E945DF82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 3e4ef987079a1db2f14741667d86f14ab5ceeff7a22adc2afef66eb28d75443c
                                        • Instruction ID: f4856e57c897046cc2a4fc5ca8947d994a682ab86c2cfc325fd3cb644a06b67c
                                        • Opcode Fuzzy Hash: 3e4ef987079a1db2f14741667d86f14ab5ceeff7a22adc2afef66eb28d75443c
                                        • Instruction Fuzzy Hash: AA61DE71A0020AEBEF048F25D981BAA7BB5FF44310F15C169EC59CF298EB35D960EB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FA07EC
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FA07F4
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FA07FF
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FA080A
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FA0812
                                          • Part of subcall function 00FA07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FA081A
                                          • Part of subcall function 00F9FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F8AC6B), ref: 00F9FFA7
                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F8AD08
                                        • OleInitialize.OLE32(00000000), ref: 00F8AD85
                                        • CloseHandle.KERNEL32(00000000), ref: 00FC2F56
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                        • String ID:
                                        • API String ID: 1986988660-0
                                        • Opcode ID: 1b537386923b040a25e4f3664813f2ca8cd0cc790617d2cb8829e61f901202e5
                                        • Instruction ID: 944160752e32a7b82efddac3181d58bb973ff2056aa3cb63a477a9eee82a7d02
                                        • Opcode Fuzzy Hash: 1b537386923b040a25e4f3664813f2ca8cd0cc790617d2cb8829e61f901202e5
                                        • Instruction Fuzzy Hash: F881DFF89012808FD3A8EF39EAC56257FE4FB88314350896AD5C8C7259EB3E5408CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • __FF_MSGBANNER.LIBCMT ref: 00FA5953
                                          • Part of subcall function 00FAA39B: __NMSG_WRITE.LIBCMT ref: 00FAA3C2
                                          • Part of subcall function 00FAA39B: __NMSG_WRITE.LIBCMT ref: 00FAA3CC
                                        • __NMSG_WRITE.LIBCMT ref: 00FA595A
                                          • Part of subcall function 00FAA3F8: GetModuleFileNameW.KERNEL32(00000000,010453BA,00000104,00000004,00000001,00FA1003), ref: 00FAA48A
                                          • Part of subcall function 00FAA3F8: ___crtMessageBoxW.LIBCMT ref: 00FAA538
                                          • Part of subcall function 00FA32CF: ___crtCorExitProcess.LIBCMT ref: 00FA32D5
                                          • Part of subcall function 00FA32CF: ExitProcess.KERNEL32 ref: 00FA32DE
                                          • Part of subcall function 00FA8D58: __getptd_noexit.LIBCMT ref: 00FA8D58
                                        • RtlAllocateHeap.NTDLL(00810000,00000000,00000001,?,00000004,?,?,00FA1003,?), ref: 00FA597F
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                        • String ID:
                                        • API String ID: 1372826849-0
                                        • Opcode ID: 7e32db691f33be780b8ea3ebf5667c0bf7d2af73665e9ab7ceec1cc9d825e31f
                                        • Instruction ID: 4f1ddaf89e3e672fb0b3a4dbbbfc87dcd40271c8ce3478b09712e6882a2d5175
                                        • Opcode Fuzzy Hash: 7e32db691f33be780b8ea3ebf5667c0bf7d2af73665e9ab7ceec1cc9d825e31f
                                        • Instruction Fuzzy Hash: 0901D2F6601B06DFE62526649C42B6F32588F47BB0F110026F954AE1C1DEB98D41A761
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: EA06
                                        • API String ID: 4104443479-3962188686
                                        • Opcode ID: 156bd1ac9003e494aa819fbe59f075bbc13d255daa9d187ddc1b98a1e39984fe
                                        • Instruction ID: cbc868a43d99988540c6935a16dbf777e5a2ac09404814d647cb1baa662e9feb
                                        • Opcode Fuzzy Hash: 156bd1ac9003e494aa819fbe59f075bbc13d255daa9d187ddc1b98a1e39984fe
                                        • Instruction Fuzzy Hash: AC417D32E041585BFF219B648C51FBF7BA28B66310F584075E882EB386C525AD86B3E1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetFileAttributesA.KERNELBASE(00000000,?,?,?,?,04C414D2,?,04C3740F,00000000,04C37470,?,00000000,00000000,00000000,00000000,00000000), ref: 04C4453A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID: GetFileAttributesA
                                        • API String ID: 3188754299-811605020
                                        • Opcode ID: 2cf51bd3d925b0aad2ece4a6ad78bfd3055152e9afc09b5bf9e0db700c7f5cac
                                        • Instruction ID: b903c30cd6fa94a119bf99280de3da77bb2fd9d4ddd81b6218a2be444219f4fb
                                        • Opcode Fuzzy Hash: 2cf51bd3d925b0aad2ece4a6ad78bfd3055152e9afc09b5bf9e0db700c7f5cac
                                        • Instruction Fuzzy Hash: 69F0C230640304AFEF08DBB9DE96B6977ADEB85314B710574F400D3160D674BE10FA18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateDirectoryA.KERNELBASE(00000000,00000000,?,?,?,?,04C43FAE,00000000,04C43FC6,?,?,?,?,04C414DD,?,04C3740F), ref: 04C43F4C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateDirectory
                                        • String ID: CreateDirectoryA
                                        • API String ID: 4241100979-2169353901
                                        • Opcode ID: 44a4b9cb0f352a44d273e61032dea90cd03118cdd0d7df722977cf5c61999f90
                                        • Instruction ID: bdef9cacc7a32e4ecf037ef93d54fd175bdb7ef13e947b460ef8fee2a4310ea5
                                        • Opcode Fuzzy Hash: 44a4b9cb0f352a44d273e61032dea90cd03118cdd0d7df722977cf5c61999f90
                                        • Instruction Fuzzy Hash: C3F08270754384BFF705DBA9DD52919B7FDE789710B9104B0F800C3620D675BE10EA24
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • TerminateProcess.KERNELBASE(00000000,00000000,?,?,04C4388E,04C3CC91,00000000,00000000,00000002,00000000,00000000,04C3CCA7,?,00000000), ref: 04C43DB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessTerminate
                                        • String ID: TerminateProcess
                                        • API String ID: 560597551-2873147277
                                        • Opcode ID: c9e05715f58a147fae003d01d7fd072c52f4a3259df274845c70d745f98f0659
                                        • Instruction ID: 8c3417f2b34e265cbc532bdfda44c29a3d749aac5057de8c3fb07fcd8bf9f9de
                                        • Opcode Fuzzy Hash: c9e05715f58a147fae003d01d7fd072c52f4a3259df274845c70d745f98f0659
                                        • Instruction Fuzzy Hash: 54C08CB23112B03BA70092E9AC88CE32E9CEA881A13000121BA24C3220C9688C1097E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000100,?,00000000,00000000,00020119,?), ref: 04C415D9
                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,?,00000100,?,00000000,00000000,00020119,?), ref: 04C415FE
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID:
                                        • API String ID: 3356406503-0
                                        • Opcode ID: bbecdcead5a17d38fc9b6fd7c59932135343a28e35962e4c140357568adfc206
                                        • Instruction ID: b704fecf19a7e4a85216a911af2a5585d83f6e832a8bd2c2352cfdee329ff6a9
                                        • Opcode Fuzzy Hash: bbecdcead5a17d38fc9b6fd7c59932135343a28e35962e4c140357568adfc206
                                        • Instruction Fuzzy Hash: F4115671A0021CABEB14DA98CC41FDFB3BDEF49314F004165E619D7250DB70AA44ABA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F94327
                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 00FD0717
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: b3e1f97c74ec4bfacfa2277888681eaaebb4aeefcbb938c2efb086661fdd8c97
                                        • Instruction ID: 2158fedffd30157b30c2aa3c75b18b6c8e927d184f4309e51e38c000262b53af
                                        • Opcode Fuzzy Hash: b3e1f97c74ec4bfacfa2277888681eaaebb4aeefcbb938c2efb086661fdd8c97
                                        • Instruction Fuzzy Hash: 5A019670184309BEF7201E24CC86F667A9CEB11778F50C315FAE45A1D0C6B56C86AB14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00FA593C: __FF_MSGBANNER.LIBCMT ref: 00FA5953
                                          • Part of subcall function 00FA593C: __NMSG_WRITE.LIBCMT ref: 00FA595A
                                          • Part of subcall function 00FA593C: RtlAllocateHeap.NTDLL(00810000,00000000,00000001,?,00000004,?,?,00FA1003,?), ref: 00FA597F
                                        • std::exception::exception.LIBCMT ref: 00FA101C
                                        • __CxxThrowException@8.LIBCMT ref: 00FA1031
                                          • Part of subcall function 00FA87CB: RaiseException.KERNEL32(?,?,?,0103CAF8,?,?,?,?,?,00FA1036,?,0103CAF8,?,00000001), ref: 00FA8820
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                        • String ID:
                                        • API String ID: 3902256705-0
                                        • Opcode ID: ebc4790d7b167f886017afb3bb6a603d057e3732e1cd95b807e48bf394d0f917
                                        • Instruction ID: 6a94b7850c0e0c746f1b371a8782b838e875cfd83e4120ee9d17d38599fa3171
                                        • Opcode Fuzzy Hash: ebc4790d7b167f886017afb3bb6a603d057e3732e1cd95b807e48bf394d0f917
                                        • Instruction Fuzzy Hash: 45F0CDF590421DA6C724BA58EC169DE77ACAF03370F504459F854E6191DF758A41E2E0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: __lock_file_memset
                                        • String ID:
                                        • API String ID: 26237723-0
                                        • Opcode ID: ef3827cc3cb34ae1b178109b7832d2e05113807e71f4cda6b2ff9b89905809c8
                                        • Instruction ID: b5c077db9d6b0b118abdcc9879e18f6a13d8b99d26b09363064e76eb0efcfc9e
                                        • Opcode Fuzzy Hash: ef3827cc3cb34ae1b178109b7832d2e05113807e71f4cda6b2ff9b89905809c8
                                        • Instruction Fuzzy Hash: CA0144F1C01649EBCF11AF668C0199E7B61AF82BA0F188115F8246B161D7798A22FF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00FA8D58: __getptd_noexit.LIBCMT ref: 00FA8D58
                                        • __lock_file.LIBCMT ref: 00FA560B
                                          • Part of subcall function 00FA6E3E: __lock.LIBCMT ref: 00FA6E61
                                        • __fclose_nolock.LIBCMT ref: 00FA5616
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                        • String ID:
                                        • API String ID: 2800547568-0
                                        • Opcode ID: 1f661b5c2760fe837f85fe7d4cb9f55f7fb1738b1c3c206deac579ba0cfd6b23
                                        • Instruction ID: 9dafeaafe99bc6d842d0258e173d50e0b335683c705133270314a0d6706f8d28
                                        • Opcode Fuzzy Hash: 1f661b5c2760fe837f85fe7d4cb9f55f7fb1738b1c3c206deac579ba0cfd6b23
                                        • Instruction Fuzzy Hash: 9AF0B4F2C01B059ED710AB798C0276E77A16F837B4F198209E424AB1C1CFBC8902BF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • InitializeCriticalSectionEx.KERNELBASE(00FA1003,?,?,?,00FA9F3B,00000000,00000FA0,00000000,0103CE28,00000008,00FA9E52,00FA1003,00FA1003,?,00FA9CAC,0000000D), ref: 00FAA074
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00FA1003,?,?,00FA9F3B,00000000,00000FA0,00000000,0103CE28,00000008,00FA9E52,00FA1003,00FA1003,?,00FA9CAC,0000000D), ref: 00FAA07E
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: CriticalInitializeSection$CountSpin
                                        • String ID:
                                        • API String ID: 4156364057-0
                                        • Opcode ID: 09bdb2995f41c5f2f48d59284ff5c89f1554462717d89c1a0c3df1b67e11998c
                                        • Instruction ID: a2eb7769cd91ad10f3b588321c2dba3fce19498cfd0ac3467e0b2eb603da1da1
                                        • Opcode Fuzzy Hash: 09bdb2995f41c5f2f48d59284ff5c89f1554462717d89c1a0c3df1b67e11998c
                                        • Instruction Fuzzy Hash: E3D06776054148BFCF129FA4ED448AA3BAAFB49625B448420F99C89024D737A565AB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000001,?,?,?,04C1196B), ref: 04C11607
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,04C1196B), ref: 04C1162E
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Virtual$AllocFree
                                        • String ID:
                                        • API String ID: 2087232378-0
                                        • Opcode ID: 03ef1aa8a137d35345f9ffab434c919246b30922a1f460d755134f724fe9ef98
                                        • Instruction ID: d7b1bf78506161c3216c6ac65ef3a0f23fad023b9f700a3cb6e6709209a51b7d
                                        • Opcode Fuzzy Hash: 03ef1aa8a137d35345f9ffab434c919246b30922a1f460d755134f724fe9ef98
                                        • Instruction Fuzzy Hash: FFF0E972B0062017E72059690C80B525586CB4F790F1C4070FB4DEF2DCD9569C01B291
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3176a5c7a709d5fe656d431487d0204af59b89193d8033162ab05aa9da4ce8de
                                        • Instruction ID: 3e4024e45d965c94064918427d80ecdf42bd9b834bf0f1dde04ddc6fec7949db
                                        • Opcode Fuzzy Hash: 3176a5c7a709d5fe656d431487d0204af59b89193d8033162ab05aa9da4ce8de
                                        • Instruction Fuzzy Hash: A561CF71A04206DFEB10EF54C981FBAB7E5EF44310F11806EE9169B291E774ED81EB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b111838eadede47fd666715e1fe4fade75d1c31453159e46848eb59f6294c06c
                                        • Instruction ID: 204e649a585da9b54ce2043181d1226233d452cdefb37692b5f91bc893c9808e
                                        • Opcode Fuzzy Hash: b111838eadede47fd666715e1fe4fade75d1c31453159e46848eb59f6294c06c
                                        • Instruction Fuzzy Hash: 205191316006059BDF14FB68CD92FAE77A6AF85710F148168F806AB392DB34FD05EB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointerEx.KERNELBASE(00000000,?,00000001,00000000,00000000), ref: 00F941B2
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: d821d3c15067d42824cd1bd909b563056c0cfd9af69e9e676b8a6fc509f844d4
                                        • Instruction ID: fb389e1c948313c70867ede2279d63d71d61c8fc92bce0e18d09f0718c9a358a
                                        • Opcode Fuzzy Hash: d821d3c15067d42824cd1bd909b563056c0cfd9af69e9e676b8a6fc509f844d4
                                        • Instruction Fuzzy Hash: 83316D71A00616AFDF19CF6CC880A5DB7B1FF64320F148629E81593714D770BDE19B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction ID: 43483e0d1aa23de5ea41c992fd024f6bad7d9f260e6a3450d2efbbe4734ceb4c
                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction Fuzzy Hash: 0831D5B1A001099FC718DF18E4C0A69F7B6FF4A310B648AA5E409DB251EB31EDC1EBC0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: dadf8f43cdada64298a3000cb958b0b98be56e0cdb92613cde0bf49dfe09801f
                                        • Instruction ID: 362ab0cbddb60b572e5146fbeb3ff5ea717e24ba5e24fbc9da1982c95e070c6f
                                        • Opcode Fuzzy Hash: dadf8f43cdada64298a3000cb958b0b98be56e0cdb92613cde0bf49dfe09801f
                                        • Instruction Fuzzy Hash: F7411A74904341CFDB14DF14C898B5ABBE1BF45358F0989ACE8898B362C336EC85DB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00F94B29: FreeLibrary.KERNEL32(00000000,?), ref: 00F94B63
                                          • Part of subcall function 00FA547B: __wfsopen.LIBCMT ref: 00FA5486
                                        • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,00F927AF,?,00000001), ref: 00F949F4
                                          • Part of subcall function 00F94ADE: FreeLibrary.KERNEL32(00000000), ref: 00F94B18
                                          • Part of subcall function 00F948B0: _memmove.LIBCMT ref: 00F948FA
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Library$Free$Load__wfsopen_memmove
                                        • String ID:
                                        • API String ID: 1396898556-0
                                        • Opcode ID: dcd6778232eaa57e27b467af51adcbf9fcdfd7ba65acd6c81c406db9088b5424
                                        • Instruction ID: a48650b81ae7a242a74f93f9f9bd6fdf77d311fb5a86d6e7f1c283ff9f9ed409
                                        • Opcode Fuzzy Hash: dcd6778232eaa57e27b467af51adcbf9fcdfd7ba65acd6c81c406db9088b5424
                                        • Instruction Fuzzy Hash: 4411E732650205ABEF10FF70CC12FAE77A99F60711F10442DF581A6181EE7DAE16B7A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 2bee598b4b5a45be84cfcde0aeb12fb8172f03fe8d281f49b2da4252e0e97af2
                                        • Instruction ID: 18924d975037676749ceb8b2af9a8b0b236cd226ab930c4c59bb699bcfe44cb9
                                        • Opcode Fuzzy Hash: 2bee598b4b5a45be84cfcde0aeb12fb8172f03fe8d281f49b2da4252e0e97af2
                                        • Instruction Fuzzy Hash: 4D2157B4908341CFCB14EF10C844B5ABBE4BF84314F05896CF88A97322C335E845EB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadFile.KERNELBASE(00000000,?,00010000,00000000,00000000), ref: 00F94276
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 28f5fb346bcb966aa61661f540988c0e1268c49a50bad6210aa515d06056b5fb
                                        • Instruction ID: 6cbfcae3ce1e06b66fa9bf1b8a14e0e0aed8de594fb7da78b7a3105c22592347
                                        • Opcode Fuzzy Hash: 28f5fb346bcb966aa61661f540988c0e1268c49a50bad6210aa515d06056b5fb
                                        • Instruction Fuzzy Hash: EF112B316007019FEB20CF55C480F62B7E5FB54720F10892DE9AA86640D775F8469B60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: _fseek
                                        • String ID:
                                        • API String ID: 2937370855-0
                                        • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                        • Instruction ID: 509ca678fcb11e352ca30edc566164f6be2c1d7579124fa489e22f91e62bad87
                                        • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                        • Instruction Fuzzy Hash: 8AF08CB6500208BFDF108F54DC00DEB7B7EEB85720F044198F9045A210D232EA219BB0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FreeLibrary.KERNEL32(?,?,?,00F927AF,?,00000001), ref: 00F94A63
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 71bdcc8de72f3c4bff1c7e4cae30ef743abde014b4436324e21a5902ce5ee440
                                        • Instruction ID: 00d30a88fec916780e7e7b6fb724fd389466d513ee9c13245a4153a726e7005f
                                        • Opcode Fuzzy Hash: 71bdcc8de72f3c4bff1c7e4cae30ef743abde014b4436324e21a5902ce5ee440
                                        • Instruction Fuzzy Hash: 65F01C72545701CFDB349F64D490C16BBF0AF64329314892EE1D683614C73AA984EB44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: __fread_nolock
                                        • String ID:
                                        • API String ID: 2638373210-0
                                        • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                        • Instruction ID: 924745f4bcdb3d1d70f33833a35d93bd576cf9d25e3a74c917ddb7e1666675b9
                                        • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                        • Instruction Fuzzy Hash: 03F0F87240020DFFDF05CF90C941EAABB79FB15324F208589F9198A252D736EA21EB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(02820408,?,00000105), ref: 04C15992
                                          • Part of subcall function 04C15C08: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 04C15C23
                                          • Part of subcall function 04C15C08: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15C41
                                          • Part of subcall function 04C15C08: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15C5F
                                          • Part of subcall function 04C15C08: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04C15C7D
                                          • Part of subcall function 04C15C08: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,04C15D0C,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04C15CC6
                                          • Part of subcall function 04C15C08: RegQueryValueExA.ADVAPI32(?,04C15E88,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,04C15D0C,?,80000001), ref: 04C15CE4
                                          • Part of subcall function 04C15C08: RegCloseKey.ADVAPI32(?,04C15D13,00000000,00000000,00000005,00000000,04C15D0C,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04C15D06
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Open$FileModuleNameQueryValue$Close
                                        • String ID:
                                        • API String ID: 2796650324-0
                                        • Opcode ID: aca5e066b41eed28f3f5e6cb050fd2c26d221325605f938b2c0a29fe1b907219
                                        • Instruction ID: 1191787f1253f89e95922f83b24d511a161bcb797b77a8e2a70b7ea396d99905
                                        • Opcode Fuzzy Hash: aca5e066b41eed28f3f5e6cb050fd2c26d221325605f938b2c0a29fe1b907219
                                        • Instruction Fuzzy Hash: D2E09279A003109FDB10EE5CC8C0A4737D9AF49764F044551ED64CF38AD370EA20A7E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetLongPathNameW.KERNELBASE ref: 00FA09E4
                                          • Part of subcall function 00F91821: _memmove.LIBCMT ref: 00F9185B
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: LongNamePath_memmove
                                        • String ID:
                                        • API String ID: 2514874351-0
                                        • Opcode ID: 09455233de6966aa0d7f914cf5e6dea0d484c703b6eeb30861004c17835c63d5
                                        • Instruction ID: de68ba63177005f0662ec13c187f7a7f7bac066abd3b5f3294e2dff987c550ab
                                        • Opcode Fuzzy Hash: 09455233de6966aa0d7f914cf5e6dea0d484c703b6eeb30861004c17835c63d5
                                        • Instruction Fuzzy Hash: 91E0863290012857CB2195989C15FEA77DDEB89690F0441B6FC49D7208D9699C819691
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000000,00000001), ref: 00F942BF
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: df796d50d7b32afa1620a8631a582268b1db0dd8e674b1744f3b225a8dfacfaf
                                        • Instruction ID: 65adb589d3be808e7a27334e5c6eb6642943d848f6880d0ce5089015001f9ac5
                                        • Opcode Fuzzy Hash: df796d50d7b32afa1620a8631a582268b1db0dd8e674b1744f3b225a8dfacfaf
                                        • Instruction Fuzzy Hash: 4DD0C77464020CBFE710CB80DC46FA9777CE705710F100194FD4466294D6B67D508795
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00FA3447: __lock.LIBCMT ref: 00FA3449
                                        • __onexit_nolock.LIBCMT ref: 00FA2E90
                                          • Part of subcall function 00FA2EB8: RtlDecodePointer.NTDLL(?,00000000,00000000,?,?,00FA2E95,00FBB7EA,0103CB50), ref: 00FA2ECB
                                          • Part of subcall function 00FA2EB8: DecodePointer.KERNEL32(?,?,00FA2E95,00FBB7EA,0103CB50), ref: 00FA2ED6
                                          • Part of subcall function 00FA2EB8: __realloc_crt.LIBCMT ref: 00FA2F17
                                          • Part of subcall function 00FA2EB8: __realloc_crt.LIBCMT ref: 00FA2F2B
                                          • Part of subcall function 00FA2EB8: EncodePointer.KERNEL32(00000000,?,?,00FA2E95,00FBB7EA,0103CB50), ref: 00FA2F3D
                                          • Part of subcall function 00FA2EB8: EncodePointer.KERNEL32(00FBB7EA,?,?,00FA2E95,00FBB7EA,0103CB50), ref: 00FA2F4B
                                          • Part of subcall function 00FA2EB8: EncodePointer.KERNEL32(00000004,?,?,00FA2E95,00FBB7EA,0103CB50), ref: 00FA2F57
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: Pointer$Encode$Decode__realloc_crt$__lock__onexit_nolock
                                        • String ID:
                                        • API String ID: 3536590627-0
                                        • Opcode ID: bc27270d14a2dd2acda1d4184bd920be62b888d0e8a8a80efaa30ac88bdf63a4
                                        • Instruction ID: 9c510292e6b94605ceafe5105658f84bb706e59d746c27684363c4799feba436
                                        • Opcode Fuzzy Hash: bc27270d14a2dd2acda1d4184bd920be62b888d0e8a8a80efaa30ac88bdf63a4
                                        • Instruction Fuzzy Hash: DFD012F1D11209ABDB50FBA8CD0275D76706F467A2F508145F414A6292CBBC0A427B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: __wfsopen
                                        • String ID:
                                        • API String ID: 197181222-0
                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction ID: ecb25863353c257ef2f5256f7bbbba63acae7a5e8e2053e31f01ed0505059652
                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction Fuzzy Hash: 71B092BA44020CB7CE012A82EC03A593F299B45A68F408020FF0C1C162A677A6A0A689
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 04C11815
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 0231151bf38f8bef7f8fe188f5e3c452f2a8227aaf336e2768ddf5cc5785c6f7
                                        • Instruction ID: a340304d51ebeeb72496ac93ad6342847c68ffc5646135ba8808d1c0626a2e07
                                        • Opcode Fuzzy Hash: 0231151bf38f8bef7f8fe188f5e3c452f2a8227aaf336e2768ddf5cc5785c6f7
                                        • Instruction Fuzzy Hash: BB21CEB4604246DFD750CF2CC880A5AB7E5FF89350B188969FA98CB364E734E944DB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CloseHandle.KERNEL32(00000000), ref: 04C40B01
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: a228e4d5ec545dc3f51101f77d45d1133f32f9fe8ca6f64929c6fb44c8b24628
                                        • Instruction ID: 0b900ce6b3f29721f4ccc19f51ffb64561cdb446128f73e5b1fa151b1acd75eb
                                        • Opcode Fuzzy Hash: a228e4d5ec545dc3f51101f77d45d1133f32f9fe8ca6f64929c6fb44c8b24628
                                        • Instruction Fuzzy Hash: 5E018471A803047FF721EAA98C82FAE77ADDB86B18F610175F610E61E0D6707E00B659
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 04C40A98: CloseHandle.KERNEL32(00000000), ref: 04C40B01
                                        • Sleep.KERNEL32(00000002,00000000,04C40B9D,?,00000001), ref: 04C40B7D
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandleSleep
                                        • String ID:
                                        • API String ID: 252777609-0
                                        • Opcode ID: 34abaa3013cd14e0257cb6f50663f895546a6d4d122833e1824075ad521af683
                                        • Instruction ID: 891e27d75c194d646467b60439264d4ebb97d72c840728aa989d59873d00b13c
                                        • Opcode Fuzzy Hash: 34abaa3013cd14e0257cb6f50663f895546a6d4d122833e1824075ad521af683
                                        • Instruction Fuzzy Hash: BBF0A430A40608AFE704EBA5D941A9DB7FAEF46318F9144B1D504E36A0DB30BF00FA18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CloseHandle.KERNELBASE(?), ref: 00F942EF
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.413534380.0000000000F81000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F80000, based on PE: true
                                        • Associated: 0000000B.00000002.413530160.0000000000F80000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001010000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413551396.0000000001036000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413562101.0000000001040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000B.00000002.413566992.0000000001049000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_f80000_Autoit3.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: 1ac064dab53d6690fc97a85fa01cea1232acc0baee8f97d2ac3f73ed91a086e9
                                        • Instruction ID: 8d569898a99cc13a8e78340b9b16f255b8b8d21b4359bb8074257aed5c50a9c4
                                        • Opcode Fuzzy Hash: 1ac064dab53d6690fc97a85fa01cea1232acc0baee8f97d2ac3f73ed91a086e9
                                        • Instruction Fuzzy Hash: 5FE0B675804B01CFD7314F1AE804812FBF8FFE13713214A2EE0E692664E3B0689ADB60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • Sleep.KERNEL32(00000002,04C44265,00000000,04C44280), ref: 04C437D9
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414101277.0000000004C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C11000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_4c11000_Autoit3.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: a6e43d64add5d8e39e435505db0193cf2a06b70e52d0dcf0324c1b46c5e6b6a6
                                        • Instruction ID: 272ba4273d5394084ed0c50012c00bdbb2b49db9d334c834902587b3e7e24467
                                        • Opcode Fuzzy Hash: a6e43d64add5d8e39e435505db0193cf2a06b70e52d0dcf0324c1b46c5e6b6a6
                                        • Instruction Fuzzy Hash:
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.414017443.0000000003823000.00000040.00000020.00020000.00000000.sdmp, Offset: 03823000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_3823000_Autoit3.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: daf07dfe0449386a21cd617d80c280d79caee84e403b1fdd0f7a77803a7c3103
                                        • Instruction ID: 68ab1bed45d92fce699f8254b79d51630e84826072105574927b0c0050e52b82
                                        • Opcode Fuzzy Hash: daf07dfe0449386a21cd617d80c280d79caee84e403b1fdd0f7a77803a7c3103
                                        • Instruction Fuzzy Hash: 0A31083A1446A5ABDF20CAE88C04BA7FF58BF07278F5802D5E4A6D68C0DB3095D0C769
                                        Uniqueness

                                        Uniqueness Score: -1.00%