Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
electrumx64.exe

Overview

General Information

Sample name:electrumx64.exe
Analysis ID:1545080
MD5:cf837466c42aa63d4e4df0352a8063ef
SHA1:461a44b862408c89f16f845b7367b51800344a41
SHA256:451070b87e0b3acf9de1f6fd858bfadbdaf23fe75cd6f56a29ec817946e70a42
Tags:exeinfostealerShellcodeRunneruser-ninjacatcher
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Tries to delay execution (extensive OutputDebugStringW loop)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • electrumx64.exe (PID: 7128 cmdline: "C:\Users\user\Desktop\electrumx64.exe" MD5: CF837466C42AA63D4E4DF0352A8063EF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: electrumx64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: electrumx64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: E:\test\nsNiuniuDUI.pdbp source: electrumx64.exe, 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp
Source: Binary string: E:\test\nsNiuniuDUI.pdb source: electrumx64.exe, electrumx64.exe, 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: electrumx64.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: http://www.leeqia.com
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF98060 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_6CF98060
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_004038AF
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_0040737E0_2_0040737E
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406EFE0_2_00406EFE
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004079A20_2_004079A2
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004049A80_2_004049A8
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF624100_2_6CF62410
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFAF6200_2_6CFAF620
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF6ECC00_2_6CF6ECC0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFDACC00_2_6CFDACC0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF86DA50_2_6CF86DA5
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01AFB90_2_6D01AFB9
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF6E8B00_2_6CF6E8B0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01EB530_2_6D01EB53
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF6CAA00_2_6CF6CAA0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFBEA700_2_6CFBEA70
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF86A070_2_6CF86A07
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF7CBD00_2_6CF7CBD0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF865720_2_6CF86572
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01C4BA0_2_6D01C4BA
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01E29F0_2_6D01E29F
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01DD4E0_2_6D01DD4E
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01FF670_2_6D01FF67
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFDB4100_2_6CFDB410
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF8755F0_2_6CF8755F
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01D7FD0_2_6D01D7FD
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF871770_2_6CF87177
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6D01F22F0_2_6D01F22F
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6D01804E appears 45 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CFA41C0 appears 144 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 004062CF appears 58 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CF7ADD4 appears 66 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CF80420 appears 50 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CF7B07D appears 370 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CF7A7A4 appears 49 times
Source: C:\Users\user\Desktop\electrumx64.exeCode function: String function: 6CF8C900 appears 63 times
Source: electrumx64.exe, 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamensNiuniuSkin.dllX vs electrumx64.exe
Source: electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamensNiuniuSkin.dllX vs electrumx64.exe
Source: electrumx64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: nsNiuniuSkin.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9921396439509954
Source: classification engineClassification label: sus29.evad.winEXE@1/5@0/0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFD31C0 GetLastError,FormatMessageW,LocalFree,0_2_6CFD31C0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFD0770 FindResourceW,LoadResource,FreeResource,SizeofResource,LockResource,FreeResource,0_2_6CFD0770
Source: C:\Users\user\Desktop\electrumx64.exeFile created: C:\Users\user\AppData\Local\Temp\nshCE55.tmpJump to behavior
Source: electrumx64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\electrumx64.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: electrumx64.exeString found in binary or memory: images/add_file.png
Source: electrumx64.exeString found in binary or memory: images/add_file@125.png
Source: electrumx64.exeString found in binary or memory: images/add_file@150.png
Source: electrumx64.exeString found in binary or memory: images/add_file@200.png
Source: electrumx64.exeString found in binary or memory: images/stop.png}TT
Source: electrumx64.exeString found in binary or memory: images/stop.png}TT
Source: electrumx64.exeString found in binary or memory: images/stop@125.png
Source: electrumx64.exeString found in binary or memory: images/stop@125.png
Source: electrumx64.exeString found in binary or memory: images/stop@150.png}Vw@
Source: electrumx64.exeString found in binary or memory: images/stop@150.png}Vw@
Source: electrumx64.exeString found in binary or memory: images/stop@200.png
Source: electrumx64.exeString found in binary or memory: images/stop@200.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help.png|ZuX
Source: electrumx64.exeString found in binary or memory: images/ticket-help2.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help2@125.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help2@150.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help2@200.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help@125.png|
Source: electrumx64.exeString found in binary or memory: images/ticket-help@150.png
Source: electrumx64.exeString found in binary or memory: images/ticket-help@200.png
Source: C:\Users\user\Desktop\electrumx64.exeFile read: C:\Users\user\Desktop\electrumx64.exeJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeFile opened: C:\Windows\SysWOW64\Msftedit.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: electrumx64.exeStatic file information: File size 47521498 > 1048576
Source: electrumx64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: E:\test\nsNiuniuDUI.pdbp source: electrumx64.exe, 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp
Source: Binary string: E:\test\nsNiuniuDUI.pdb source: electrumx64.exe, electrumx64.exe, 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF80465 push ecx; ret 0_2_6CF80478
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF7D86A push ecx; ret 0_2_6CF7D87D
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\electrumx64.exeFile created: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\electrumx64.exeFile created: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dllJump to dropped file
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF98747 _memset,BeginPaint,EndPaint,GetClientRect,GetUpdateRect,IsRectEmpty,IsIconic,DeleteDC,DeleteDC,DeleteObject,DeleteObject,KiUserCallbackDispatcher,_memset,UnionRect,_memset,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,_memset,SelectObject,SendMessageW,73A24D40,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,_memset,SelectObject,_memset,73A24D40,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,0_2_6CF98747
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFFCE60 IsIconic,GetWindowRect,CreateRoundRectRgn,SetWindowRgn,DeleteObject,0_2_6CFFCE60
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF980F0 ScreenToClient,IsIconic,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,GetTickCount,_memset,CreateWindowExW,SendMessageW,SendMessageW,IsWindowVisible,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,0_2_6CF980F0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF980F0 ScreenToClient,IsIconic,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,GetTickCount,_memset,CreateWindowExW,SendMessageW,SendMessageW,IsWindowVisible,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,0_2_6CF980F0
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF93CE0 IsIconic,0_2_6CF93CE0
Source: C:\Users\user\Desktop\electrumx64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\electrumx64.exeSection loaded: OutputDebugStringW count: 408
Source: C:\Users\user\Desktop\electrumx64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dllJump to dropped file
Source: C:\Users\user\Desktop\electrumx64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\electrumx64.exeAPI coverage: 8.5 %
Source: C:\Users\user\Desktop\electrumx64.exeFile Volume queried: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeFile Volume queried: C:\Users\user\AppData\Local\Temp\nsxCF02.tmp FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
Source: C:\Users\user\Desktop\electrumx64.exeAPI call chain: ExitProcess graph end nodegraph_0-83470
Source: C:\Users\user\Desktop\electrumx64.exeAPI call chain: ExitProcess graph end nodegraph_0-83799
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF7ADDF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CF7ADDF
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF8AB4D __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_6CF8AB4D
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF7ADDF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CF7ADDF
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF80288 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF80288
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CFA4950 cpuid 0_2_6CFA4950
Source: C:\Users\user\Desktop\electrumx64.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,0_2_6CF8AA18
Source: C:\Users\user\Desktop\electrumx64.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_6CF8604D
Source: C:\Users\user\Desktop\electrumx64.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_6CF862DE
Source: C:\Users\user\Desktop\electrumx64.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_6CF8621E
Source: C:\Users\user\Desktop\electrumx64.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_6CF86381
Source: C:\Users\user\Desktop\electrumx64.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_6CF86345
Source: C:\Users\user\Desktop\electrumx64.exeCode function: GetLocaleInfoA,0_2_6CF7FCA3
Source: C:\Users\user\Desktop\electrumx64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_6CF85E56
Source: C:\Users\user\Desktop\electrumx64.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_6CF85FF2
Source: C:\Users\user\Desktop\electrumx64.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_6CF85F4B
Source: C:\Users\user\Desktop\electrumx64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_6CF898F2
Source: C:\Users\user\Desktop\electrumx64.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_6CF899CC
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF8475D GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_6CF8475D
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF6F510 BindCallBack,GlobalFree,lstrcpynW,GlobalFree,_memset,lstrcpyW,GlobalFree,lstrcpynW,GlobalFree,IsWindow,0_2_6CF6F510
Source: C:\Users\user\Desktop\electrumx64.exeCode function: 0_2_6CF6F2D0 BindCallBackEx,lstrcpynW,GlobalFree,_memset,lstrcpyW,lstrcpyW,GlobalFree,_memset,lstrcpyW,GlobalFree,lstrcpynW,GlobalFree,IsWindow,0_2_6CF6F2D0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
Obfuscated Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Software Packing
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials25
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
electrumx64.exe3%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://www.leeqia.com0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorelectrumx64.exefalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yelectrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0electrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalse
  • URL Reputation: safe
unknown
http://www.leeqia.comelectrumx64.exe, 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmp, nsNiuniuSkin.dll.0.drfalseunknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545080
Start date and time:2024-10-30 04:15:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:electrumx64.exe
Detection:SUS
Classification:sus29.evad.winEXE@1/5@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 130
  • Number of non-executed functions: 182
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtSetInformationFile calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dllfile.exeGet hashmaliciousUnknownBrowse
    Setup_10024.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Riskware.Application.5189.31489.exeGet hashmaliciousUnknownBrowse
        LWZyUFvVh1.exeGet hashmaliciousDCRatBrowse
          sVfXReO3QI.exeGet hashmaliciousUnknownBrowse
            HolyTom980.exeGet hashmaliciousUnknownBrowse
              https://xiuxiu.dl.meitu.com/pc_channel64/xiuxiu64_pc.exeGet hashmaliciousUnknownBrowse
                ReimagePackage.exeGet hashmaliciousXmrigBrowse
                  ReimagePackage.exeGet hashmaliciousXmrigBrowse
                    SecuriteInfo.com.W32.PossibleThreat.20191.6097.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\Desktop\electrumx64.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):11264
                      Entropy (8bit):5.729426875863261
                      Encrypted:false
                      SSDEEP:192:0N2gQuUwXzioj4KALV2upWzVd7q1QDXEbBZ8KxHdGzyS/Kx:rJoiO8V2upW7vQjS/
                      MD5:BF712F32249029466FA86756F5546950
                      SHA1:75AC4DC4808AC148DDD78F6B89A51AFBD4091C2E
                      SHA-256:7851CB12FA4131F1FEE5DE390D650EF65CAC561279F1CFE70AD16CC9780210AF
                      SHA-512:13F69959B28416E0B8811C962A49309DCA3F048A165457051A28A3EB51377DCAF99A15E86D7EEE8F867A9E25ECF8C44DA370AC8F530EEAE7B5252EABA64B96F4
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Joe Sandbox View:
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: Setup_10024.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.Riskware.Application.5189.31489.exe, Detection: malicious, Browse
                      • Filename: LWZyUFvVh1.exe, Detection: malicious, Browse
                      • Filename: sVfXReO3QI.exe, Detection: malicious, Browse
                      • Filename: HolyTom980.exe, Detection: malicious, Browse
                      • Filename: , Detection: malicious, Browse
                      • Filename: ReimagePackage.exe, Detection: malicious, Browse
                      • Filename: ReimagePackage.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.W32.PossibleThreat.20191.6097.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..............]..............XP......Xd......XU......XS.....Rich............PE..L.....GO...........!................('.......0...............................`............@..........................3.......1..P............................P.......................................................0..\............................text...1........................... ..`.rdata.......0......."..............@..@.data...@....@.......&..............@....reloc..L....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\electrumx64.exe
                      File Type:Rich Text Format data, version 1, ANSI, code page 936, default language ID 1033
                      Category:dropped
                      Size (bytes):939
                      Entropy (8bit):4.311680372462902
                      Encrypted:false
                      SSDEEP:12:pXFIiYm+6sG+MxWTcL/83+SJkHLHIcEehIuTzL24epekxcwdSMK2jVw169Qf2:kh6+Mu0/rHIcZtTO4UeQvS5I21rf2
                      MD5:B43BD89270FB32D069044F093A47250D
                      SHA1:9A6733C6AC3DD0E7E26B170129CF8FCCE9AC8D07
                      SHA-256:D57DDA71C73D4C9D20A67337DA3614C41630CAF0126BDCCB7F1D8145DF7E5E97
                      SHA-512:1EE04AF87D9B3234DC512C1984D6069208656F838961613DE6902D8BD1E603A67272C6E7F6868AAB6614EE0EE9B68D5F255A767939D632778F85709406E81806
                      Malicious:false
                      Reputation:low
                      Preview:{\rtf1\ansi\ansicpg936\deff0\nouicompat\deflang1033\deflangfe2052\deftab420{\fonttbl{\f0\fnil\fcharset134 \'cb\'ce\'cc\'e5;}}..{\*\generator Riched20 10.0.20348}{\info{\horzdoc}{\*\lchars $([\'7b\'a1\'ea\'a3\'a4\'a1\'a4\'a1\'ae\'a1\'b0\'a1\'b4\'a1\'b6\'a1\'b8\'a1\'ba\'a1\'be\'a1\'b2\'a1\'bc\'a8\'94\'a9\'76\'a9\'78\'a9\'7a\'a1\'e7\'a3\'a8\'a3\'ae\'a3\'db\'a3\'fb\'a1\'ea\'a3\'a4}{\*\fchars !%),.:\'3b>?]\'7d\'a1\'e9\'a1\'a7\'a1\'e3\'a1\'a4\'a1\'a6\'a1\'a5\'a8\'44\'a1\'ac\'a1\'af\'a1\'b1\'a1\'ad\'a1\'eb\'a1\'e4\'a1\'e5?\'a1\'e6\'a1\'c3\'a1\'a2\'a1\'a3\'a1\'a8\'a1\'b5\'a1\'b7\'a1\'b9\'a1\'bb\'a1\'bf\'a1\'b3\'a1\'bd\'a8\'95\'a6\'e1\'a6\'e3\'a6\'e7\'a6\'e5\'a6\'eb\'a9\'77\'a9\'79\'a9\'7b\'a3\'a1\'a3\'a2\'a3\'a5\'a3\'a7\'a3\'a9\'a3\'ac\'a3\'ae\'a3\'ba\'a3\'bb\'a3\'bf\'a3\'dd\'a3\'e0\'a3\'fc\'a3\'fd\'a1\'ab\'a1\'e9}}..{\*\mmathPr\mnaryLim0\mdispDef1\mwrapIndent1440 }\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\f0\fs22\lang2052\par..}...
                      Process:C:\Users\user\Desktop\electrumx64.exe
                      File Type:MS Windows icon resource - 10 icons, 256x256, 32 bits/pixel, -128x-128, 32 bits/pixel
                      Category:dropped
                      Size (bytes):458870
                      Entropy (8bit):5.129021303459069
                      Encrypted:false
                      SSDEEP:3072:RQd9Jsc2/1NfYiRPcv9H/CzlftbCJ3e0hoCkaKK0N6owWIP2sDGL4dTIoNxK4LdB:ctUYWai7o9Z9p5ENM
                      MD5:E4A8817AA15F1CCB0E49DAD689C87D16
                      SHA1:3FEC80D3C40A03C7398892C3A1D1B94543C75B7C
                      SHA-256:1B7E574335CA9D80B5523ABEA0BBD7DB0CD69C17A6BFD185FCCD3940B61BF973
                      SHA-512:80DE3FC2940E0C7C8082678955BD177192D00739F7A68347A30D69B28FAEA6EE27C1909B01B843FBFE88B67D8309B51C4A05EF203C8209395A51B1D7A92BD24C
                      Malicious:false
                      Reputation:low
                      Preview:............ .( ............ .(.... ..``.... ......(..PP.... ..g......HH.... ..T...%..@@.... .(B...z..00.... ..%..6......... ............... .h...f... .... .........(............. ...... ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\electrumx64.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                      Category:dropped
                      Size (bytes):349696
                      Entropy (8bit):7.923369185635811
                      Encrypted:false
                      SSDEEP:6144:zogxY8ClCBjHY8Sb/ziRCbHa/qh5APgK3nqOSEaGijVEAbzvL39wnk9sqcnBzOsp:8qClWjy/z6CZY3fxVqV5vz9w6sHB/p
                      MD5:01A743D2E92F42035F694EB7BA16C6C4
                      SHA1:DCD0B1B9991993E406768E715D787999D80BA13E
                      SHA-256:ACF0A9F02F82E3F684CF90CD1FA3F587124CC2D1CF1D01F10017CEEFE4892C76
                      SHA-512:12BDAADBBBCBCEDA9D242AE09C5D6A2D03E6E7110BF3BB87A5B3CC2CDCFF1FE6C915147306BDEE4DFBFE6D40FA74DDE15848449F57B0CD1A80534FED8D291A62
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..b..b..b.K.b..b...b..b.K<b..b.K=b4.b.<b..b...b..b...b..b..b..b.K8b..b.K.b..b.K.b..b.K.b..bRich..b........PE..L....zue...........!..... ................... ...............................0............@..........................'.......%....... ...............*...,..8+.......................................*..H...........................................UPX0....................................UPX1..... ..........................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................................................2.02.UPX!....
                      Process:C:\Users\user\Desktop\electrumx64.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Category:dropped
                      Size (bytes):509403
                      Entropy (8bit):7.9862763703586825
                      Encrypted:false
                      SSDEEP:12288:7pP9X8jpWqtEQQiBGqoJtvz8xVjTXfuST4TUJwMiWC6Y:7ptApWq6nYCtvz8TVUTUJfrY
                      MD5:B9FED73562A2CC77C86E8E61C05DCEFA
                      SHA1:416E6BAB8D686D15E5D5A825C71D784E08FE03B0
                      SHA-256:F60AD8F4AB4AD0B6156813DC1898A39D4D3E3401754CDB81EE2D6A8CEEA68F72
                      SHA-512:D8E9B525AA8B0D3124A68F5F9ADA18ACEC67A9758FEFA43E085B80A9AB63B1FE2A97DDB625F18D24F32A29D056F41169762A1854AB14F869644EF4CF009B78EC
                      Malicious:false
                      Reputation:low
                      Preview:PK........i..K..H.....&.......arrow_down.png}R{l.q...#.kB0%..Q......U[..aJ+.qz?.zw.>.Q.^.x.l!&D.`...F.d.yD6&.1,...2..u..I...}..o>...s..w...}..&A...m.c?.S....KO.>9.HV.4.[,.(.@&.[.`........K......a...e.N.9...b.~/.E.!..Sn...E .a.H....F.n....3.A....8.A.[O#..`.....@.`.w.+.~#.K..h.E.v..1".M..3a3'.8]=A..&.`.^...tZ].L`x:.iP.."4..#...[.|.@/&s-Sbw...$.DQ...i....z..... T2B%.X..X1.C..D.....p4..q.$#......e.X..~.Gq5........z;......-:.<@s..-..@..F.<i..%q...ttqf>'qb>..fs{..N..9...9Qc...%.u.....5...).1.. 2.V...r0gX&..3.!.V]....y.+up.?\M<n..16..."p^...I&..,.^.K..........b..=v...t.?`....66.!(a..br..5..s%+............g.Ca.V4.wT.3{#lb.eFHiJjH..kZ..._..^j.e..'M'..]O5f...C.#...z...'.OP...-.:...s....L.k.&}D.q%uA.......nhK.w.....-3.e..Bs.3_..q..-..q.-4u..y.....W.\].R..&...`c.....Y..[e%Y.qk...`8....<.58.....\....!..m.]..cr...............~.....Fn.f...d...kCR.J.$R.2c.m..kD]. ~g......;..5M...s....z..<..(........&.......W...........u....tA......?^fo.
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.997717964812734
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:electrumx64.exe
                      File size:47'521'498 bytes
                      MD5:cf837466c42aa63d4e4df0352a8063ef
                      SHA1:461a44b862408c89f16f845b7367b51800344a41
                      SHA256:451070b87e0b3acf9de1f6fd858bfadbdaf23fe75cd6f56a29ec817946e70a42
                      SHA512:ea7b575b6ccb2df7d6b4d38eab485f20a32a0e361d06cc2956260961829de8414ddf8de25c44b8b23dccf431124071a4a6681fc58c14f6b29fde0f68a5b5a29e
                      SSDEEP:786432:0xW5G8CJA5+Uy2zuJHwMseHv0mA/s7emwLTYyJdU6M3z6t99:0c5G8CJoy2aJHw+HvwMeXLVsQ9
                      TLSH:FEA733617B18D161C9C7EDF4F636A4A1082E1F3A25D40F055AF33AF600716DA392FAAD
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...z...B...8.....
                      Icon Hash:332b3b574d6d170c
                      Entrypoint:0x4038af
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:be41bf7b8cc010b614bd36bbca606973
                      Instruction
                      sub esp, 000002D4h
                      push ebx
                      push ebp
                      push esi
                      push edi
                      push 00000020h
                      xor ebp, ebp
                      pop esi
                      mov dword ptr [esp+18h], ebp
                      mov dword ptr [esp+10h], 0040A268h
                      mov dword ptr [esp+14h], ebp
                      call dword ptr [00409030h]
                      push 00008001h
                      call dword ptr [004090B4h]
                      push ebp
                      call dword ptr [004092C0h]
                      push 00000008h
                      mov dword ptr [0047EB98h], eax
                      call 00007F05F4B7C26Bh
                      push ebp
                      push 000002B4h
                      mov dword ptr [0047EAB0h], eax
                      lea eax, dword ptr [esp+38h]
                      push eax
                      push ebp
                      push 0040A264h
                      call dword ptr [00409184h]
                      push 0040A24Ch
                      push 00476AA0h
                      call 00007F05F4B7BF4Dh
                      call dword ptr [004090B0h]
                      push eax
                      mov edi, 004CF0A0h
                      push edi
                      call 00007F05F4B7BF3Bh
                      push ebp
                      call dword ptr [00409134h]
                      cmp word ptr [004CF0A0h], 0022h
                      mov dword ptr [0047EAB8h], eax
                      mov eax, edi
                      jne 00007F05F4B7983Ah
                      push 00000022h
                      pop esi
                      mov eax, 004CF0A2h
                      push esi
                      push eax
                      call 00007F05F4B7BC11h
                      push eax
                      call dword ptr [00409260h]
                      mov esi, eax
                      mov dword ptr [esp+1Ch], esi
                      jmp 00007F05F4B798C3h
                      push 00000020h
                      pop ebx
                      cmp ax, bx
                      jne 00007F05F4B7983Ah
                      add esi, 02h
                      cmp word ptr [esi], bx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [ C ] VS2010 SP1 build 40219
                      • [RES] VS2010 SP1 build 40219
                      • [LNK] VS2010 SP1 build 40219
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1340000x70ce0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x7f0000xb50000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x1340000x70ce00x70e0014f253f4202df3359620f18c937f7613False0.2939485568936877data5.130580807063862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1a50000xfd60x1000ac1f916992f27d0cc1518b8fa425559fFalse0.028564453125data0.2267346467413615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x1343580x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.19165902299020623
                      RT_ICON0x1763800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.3213208328404117
                      RT_ICON0x186ba80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.40718940508723983
                      RT_ICON0x1900500x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.47533834586466167
                      RT_ICON0x1968380x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5310998151571165
                      RT_ICON0x19bcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5862068965517241
                      RT_ICON0x19fee80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6374481327800829
                      RT_ICON0x1a24900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7429643527204502
                      RT_ICON0x1a35380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.8213114754098361
                      RT_ICON0x1a3ec00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.9281914893617021
                      RT_DIALOG0x1a43280x1eedataEnglishUnited States0.3866396761133603
                      RT_DIALOG0x1a45180xdadataEnglishUnited States0.6376146788990825
                      RT_GROUP_ICON0x1a45f80x92dataEnglishUnited States0.6986301369863014
                      RT_VERSION0x1a46900x28cPGP symmetric key encrypted data - Plaintext or unencrypted data0.4662576687116564
                      RT_MANIFEST0x1a49200x3bdXML 1.0 document, ASCII text, with very long lines (957), with no line terminatorsEnglishUnited States0.5214211076280042
                      DLLImport
                      KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                      USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                      SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                      ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                      VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 30, 2024 04:16:21.604195118 CET53650831.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:23:15:59
                      Start date:29/10/2024
                      Path:C:\Users\user\Desktop\electrumx64.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\electrumx64.exe"
                      Imagebase:0x400000
                      File size:47'521'498 bytes
                      MD5 hash:CF837466C42AA63D4E4DF0352A8063EF
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:5.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:13.6%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:53
                        execution_graph 83048 401f80 83072 401446 83048->83072 83050 401f88 83051 401446 18 API calls 83050->83051 83052 401f93 83051->83052 83053 401fa3 83052->83053 83075 40145c 83052->83075 83055 401fb3 83053->83055 83056 40145c 18 API calls 83053->83056 83057 402006 83055->83057 83058 401fbc 83055->83058 83056->83055 83060 40145c 18 API calls 83057->83060 83059 401446 18 API calls 83058->83059 83062 401fc4 83059->83062 83061 40200d 83060->83061 83063 40145c 18 API calls 83061->83063 83064 401446 18 API calls 83062->83064 83065 402016 FindWindowExW 83063->83065 83066 401fce 83064->83066 83070 402036 83065->83070 83067 401ff6 SendMessageW 83066->83067 83068 401fd8 SendMessageTimeoutW 83066->83068 83067->83070 83068->83070 83069 4030e3 83070->83069 83080 405f7d wsprintfW 83070->83080 83081 406831 83072->83081 83074 401455 83074->83050 83076 406831 18 API calls 83075->83076 83077 401488 83076->83077 83078 401497 83077->83078 83079 406064 5 API calls 83077->83079 83078->83053 83079->83078 83080->83069 83094 40683e 83081->83094 83082 406aab 83083 406ac1 83082->83083 83112 406035 lstrcpynW 83082->83112 83083->83074 83085 4068ff GetVersion 83095 40690c 83085->83095 83086 406a72 lstrlenW 83086->83094 83087 406831 10 API calls 83087->83086 83091 40697e GetSystemDirectoryW 83091->83095 83093 406991 GetWindowsDirectoryW 83093->83095 83094->83082 83094->83085 83094->83086 83094->83087 83101 405f7d wsprintfW 83094->83101 83102 406035 lstrcpynW 83094->83102 83103 406064 83094->83103 83095->83091 83095->83093 83095->83094 83096 406831 10 API calls 83095->83096 83097 406a0b lstrcatW 83095->83097 83098 4069c5 SHGetSpecialFolderLocation 83095->83098 83100 405eff RegOpenKeyExW RegQueryValueExW RegCloseKey 83095->83100 83096->83095 83097->83094 83098->83095 83099 4069dd SHGetPathFromIDListW CoTaskMemFree 83098->83099 83099->83095 83100->83095 83101->83094 83102->83094 83109 406071 83103->83109 83104 4060ed CharPrevW 83105 4060e7 83104->83105 83105->83104 83107 40610d 83105->83107 83106 4060da CharNextW 83106->83105 83106->83109 83107->83094 83109->83105 83109->83106 83110 4060c6 CharNextW 83109->83110 83111 4060d5 CharNextW 83109->83111 83113 405d32 83109->83113 83110->83109 83111->83106 83112->83083 83114 405d38 83113->83114 83115 405d4e 83114->83115 83116 405d3f CharNextW 83114->83116 83115->83109 83116->83114 83117 4054a5 83118 4055f9 83117->83118 83119 4054bd 83117->83119 83121 40560a GetDlgItem GetDlgItem 83118->83121 83126 40564a 83118->83126 83119->83118 83120 4054c9 83119->83120 83123 4054d4 SetWindowPos 83120->83123 83124 4054e7 83120->83124 83125 403d6b 19 API calls 83121->83125 83122 4056a4 83136 4055f4 83122->83136 83188 403ddb 83122->83188 83123->83124 83128 405504 83124->83128 83129 4054ec ShowWindow 83124->83129 83130 405634 SetClassLongW 83125->83130 83126->83122 83131 40139d 80 API calls 83126->83131 83132 405526 83128->83132 83133 40550c DestroyWindow 83128->83133 83129->83128 83134 40141d 80 API calls 83130->83134 83135 40567c 83131->83135 83138 40552b SetWindowLongW 83132->83138 83139 40553c 83132->83139 83137 405929 83133->83137 83134->83126 83135->83122 83142 405680 SendMessageW 83135->83142 83137->83136 83148 405939 ShowWindow 83137->83148 83138->83136 83140 4055e5 83139->83140 83141 405548 GetDlgItem 83139->83141 83206 403df6 8 API calls 83140->83206 83145 405578 83141->83145 83146 40555b SendMessageW IsWindowEnabled 83141->83146 83142->83136 83143 40141d 80 API calls 83160 4056b6 83143->83160 83144 40590a DestroyWindow EndDialog 83144->83137 83150 405585 83145->83150 83151 4055cc SendMessageW 83145->83151 83152 405598 83145->83152 83162 40557d 83145->83162 83146->83136 83146->83145 83148->83136 83149 406831 18 API calls 83149->83160 83150->83151 83150->83162 83151->83140 83155 4055a0 83152->83155 83156 4055b5 83152->83156 83154 4055b3 83154->83140 83202 40141d 83155->83202 83158 40141d 80 API calls 83156->83158 83157 403d6b 19 API calls 83157->83160 83161 4055bc 83158->83161 83160->83136 83160->83143 83160->83144 83160->83149 83160->83157 83178 40584a DestroyWindow 83160->83178 83191 403d6b 83160->83191 83161->83140 83161->83162 83205 403d44 SendMessageW 83162->83205 83164 405731 GetDlgItem 83165 405746 83164->83165 83166 40574f ShowWindow KiUserCallbackDispatcher 83164->83166 83165->83166 83194 403db1 EnableWindow 83166->83194 83168 405779 EnableWindow 83171 40578d 83168->83171 83169 405792 GetSystemMenu EnableMenuItem SendMessageW 83170 4057c2 SendMessageW 83169->83170 83169->83171 83170->83171 83171->83169 83195 403dc4 SendMessageW 83171->83195 83196 406035 lstrcpynW 83171->83196 83174 4057f0 lstrlenW 83175 406831 18 API calls 83174->83175 83176 405806 SetWindowTextW 83175->83176 83197 40139d 83176->83197 83178->83137 83179 405864 CreateDialogParamW 83178->83179 83179->83137 83180 405897 83179->83180 83181 403d6b 19 API calls 83180->83181 83182 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 83181->83182 83183 40139d 80 API calls 83182->83183 83184 4058e8 83183->83184 83184->83136 83185 4058f0 ShowWindow 83184->83185 83186 403ddb SendMessageW 83185->83186 83187 405908 83186->83187 83187->83137 83189 403df3 83188->83189 83190 403de4 SendMessageW 83188->83190 83189->83160 83190->83189 83192 406831 18 API calls 83191->83192 83193 403d76 SetDlgItemTextW 83192->83193 83193->83164 83194->83168 83195->83171 83196->83174 83200 4013a4 83197->83200 83198 401410 83198->83160 83200->83198 83201 4013dd MulDiv SendMessageW 83200->83201 83207 4015a0 83200->83207 83201->83200 83203 40139d 80 API calls 83202->83203 83204 401432 83203->83204 83204->83162 83205->83154 83206->83136 83208 4015fa 83207->83208 83287 40160c 83207->83287 83209 401601 83208->83209 83210 401742 83208->83210 83211 401962 83208->83211 83212 4019ca 83208->83212 83213 40176e 83208->83213 83214 401650 83208->83214 83215 4017b1 83208->83215 83216 401672 83208->83216 83217 401693 83208->83217 83218 401616 83208->83218 83219 4016d6 83208->83219 83220 401736 83208->83220 83221 401897 83208->83221 83222 4018db 83208->83222 83223 40163c 83208->83223 83224 4016bd 83208->83224 83208->83287 83229 4062cf 11 API calls 83209->83229 83235 401751 ShowWindow 83210->83235 83236 401758 83210->83236 83226 40145c 18 API calls 83211->83226 83233 40145c 18 API calls 83212->83233 83237 40145c 18 API calls 83213->83237 83259 4062cf 11 API calls 83214->83259 83227 40145c 18 API calls 83215->83227 83238 40145c 18 API calls 83216->83238 83228 401446 18 API calls 83217->83228 83232 40145c 18 API calls 83218->83232 83247 401446 18 API calls 83219->83247 83219->83287 83220->83287 83341 405f7d wsprintfW 83220->83341 83225 40145c 18 API calls 83221->83225 83230 40145c 18 API calls 83222->83230 83234 401647 PostQuitMessage 83223->83234 83223->83287 83231 4062cf 11 API calls 83224->83231 83240 40189d 83225->83240 83241 401968 GetFullPathNameW 83226->83241 83242 4017b8 83227->83242 83243 40169a 83228->83243 83229->83287 83244 4018e2 83230->83244 83245 4016c7 SetForegroundWindow 83231->83245 83246 40161c 83232->83246 83248 4019d1 SearchPathW 83233->83248 83234->83287 83235->83236 83249 401765 ShowWindow 83236->83249 83236->83287 83250 401775 83237->83250 83239 401678 83238->83239 83251 4062cf 11 API calls 83239->83251 83336 406301 FindFirstFileW 83240->83336 83253 4019a1 83241->83253 83254 40197f 83241->83254 83315 4062cf lstrlenW wvsprintfW 83242->83315 83256 4062cf 11 API calls 83243->83256 83257 40145c 18 API calls 83244->83257 83245->83287 83258 4062cf 11 API calls 83246->83258 83247->83287 83248->83220 83248->83287 83249->83287 83261 4062cf 11 API calls 83250->83261 83262 401683 83251->83262 83276 4019b8 GetShortPathNameW 83253->83276 83253->83287 83254->83253 83284 406301 2 API calls 83254->83284 83265 4016a7 83256->83265 83266 4018eb 83257->83266 83267 401627 83258->83267 83268 401664 83259->83268 83269 401785 SetFileAttributesW 83261->83269 83281 404f9e 25 API calls 83262->83281 83274 4016b1 Sleep 83265->83274 83275 4016ae 83265->83275 83277 40145c 18 API calls 83266->83277 83278 404f9e 25 API calls 83267->83278 83279 40139d 65 API calls 83268->83279 83270 40179a 83269->83270 83269->83287 83280 4062cf 11 API calls 83270->83280 83271 4018c2 83283 4062cf 11 API calls 83271->83283 83272 4018a9 83282 4062cf 11 API calls 83272->83282 83274->83287 83275->83274 83276->83287 83286 4018f5 83277->83286 83278->83287 83279->83287 83280->83287 83281->83287 83282->83287 83283->83287 83288 401991 83284->83288 83285 4017d4 83289 401864 83285->83289 83291 405d32 CharNextW 83285->83291 83311 4062cf 11 API calls 83285->83311 83290 4062cf 11 API calls 83286->83290 83287->83200 83288->83253 83340 406035 lstrcpynW 83288->83340 83289->83262 83293 40186e 83289->83293 83292 401902 MoveFileW 83290->83292 83295 4017e6 CreateDirectoryW 83291->83295 83296 401912 83292->83296 83297 40191e 83292->83297 83324 404f9e 83293->83324 83295->83285 83299 4017fe GetLastError 83295->83299 83296->83262 83301 401942 83297->83301 83304 406301 2 API calls 83297->83304 83302 401827 GetFileAttributesW 83299->83302 83303 40180b GetLastError 83299->83303 83306 4062cf 11 API calls 83301->83306 83302->83285 83307 4062cf 11 API calls 83303->83307 83308 401929 83304->83308 83310 40195c 83306->83310 83307->83285 83308->83301 83339 406c94 42 API calls 83308->83339 83309 401882 SetCurrentDirectoryW 83309->83287 83310->83287 83311->83285 83313 401936 83314 404f9e 25 API calls 83313->83314 83314->83301 83342 406113 83315->83342 83318 405d85 CharNextW CharNextW 83319 405da2 83318->83319 83322 405db4 83318->83322 83320 405daf CharNextW 83319->83320 83319->83322 83323 405dd8 83320->83323 83321 405d32 CharNextW 83321->83322 83322->83321 83322->83323 83323->83285 83325 404fb7 83324->83325 83326 401875 83324->83326 83327 404fd5 lstrlenW 83325->83327 83328 406831 18 API calls 83325->83328 83335 406035 lstrcpynW 83326->83335 83329 404fe3 lstrlenW 83327->83329 83330 404ffe 83327->83330 83328->83327 83329->83326 83331 404ff5 lstrcatW 83329->83331 83332 405011 83330->83332 83333 405004 SetWindowTextW 83330->83333 83331->83330 83332->83326 83333->83332 83335->83309 83337 4018a5 83336->83337 83338 406317 FindClose 83336->83338 83337->83271 83337->83272 83338->83337 83339->83313 83340->83253 83341->83287 83343 40613c 83342->83343 83344 40611f 83342->83344 83345 4017c9 83343->83345 83347 4061b3 83343->83347 83348 406159 83343->83348 83344->83345 83346 406129 CloseHandle 83344->83346 83345->83318 83346->83345 83347->83345 83350 4061bc lstrcatW lstrlenW WriteFile 83347->83350 83349 406162 GetFileAttributesW 83348->83349 83348->83350 83355 405e7c GetFileAttributesW CreateFileW 83349->83355 83350->83345 83352 40617e 83352->83345 83353 4061a8 SetFilePointer 83352->83353 83354 40618e WriteFile 83352->83354 83353->83347 83354->83353 83355->83352 83356 6cf64610 83359 6cf7c39c 83356->83359 83362 6cf7c30e 83359->83362 83361 6cf64626 83363 6cf7c31a __mtinitlocknum 83362->83363 83364 6cf7c32e _memset 83363->83364 83365 6cf7c35b 83363->83365 83367 6cf7c353 __mtinitlocknum 83363->83367 83395 6cf7ef1d 66 API calls __getptd_noexit 83364->83395 83375 6cf7b862 83365->83375 83367->83361 83371 6cf7c348 83396 6cf80403 11 API calls strtoxl 83371->83396 83376 6cf7b896 RtlEnterCriticalSection 83375->83376 83377 6cf7b874 83375->83377 83378 6cf7b88c 83376->83378 83377->83376 83379 6cf7b87c 83377->83379 83381 6cf7c152 83378->83381 83398 6cf821a3 83379->83398 83384 6cf7c170 _memset 83381->83384 83387 6cf7c18a 83381->83387 83382 6cf7c17a 83497 6cf7ef1d 66 API calls __getptd_noexit 83382->83497 83384->83382 83384->83387 83389 6cf7c1c5 83384->83389 83385 6cf7c17f 83498 6cf80403 11 API calls strtoxl 83385->83498 83397 6cf7c392 RtlLeaveCriticalSection RtlLeaveCriticalSection __fseeki64 83387->83397 83389->83387 83390 6cf7c2d0 _memset 83389->83390 83477 6cf82fef 83389->83477 83499 6cf7c3e3 66 API calls 4 library calls 83389->83499 83500 6cf81afd 83389->83500 83507 6cf8372c 83389->83507 83537 6cf7ef1d 66 API calls __getptd_noexit 83390->83537 83395->83371 83396->83367 83397->83367 83399 6cf821b8 83398->83399 83400 6cf821cb RtlEnterCriticalSection 83398->83400 83405 6cf820e1 83399->83405 83400->83378 83402 6cf821be 83402->83400 83432 6cf8200b 66 API calls 3 library calls 83402->83432 83406 6cf820ed __mtinitlocknum 83405->83406 83407 6cf820fd 83406->83407 83408 6cf82115 83406->83408 83433 6cf83a7f 66 API calls 2 library calls 83407->83433 83414 6cf82123 __mtinitlocknum 83408->83414 83436 6cf7edfc 83408->83436 83410 6cf82102 83434 6cf838d0 66 API calls 8 library calls 83410->83434 83414->83402 83415 6cf82109 83435 6cf81d8e GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83415->83435 83416 6cf82144 83418 6cf821a3 __lock 65 API calls 83416->83418 83417 6cf82135 83442 6cf7ef1d 66 API calls __getptd_noexit 83417->83442 83421 6cf8214b 83418->83421 83423 6cf8217e 83421->83423 83424 6cf82153 InitializeCriticalSectionAndSpinCount 83421->83424 83427 6cf7b751 _free 65 API calls 83423->83427 83425 6cf8216f 83424->83425 83426 6cf82163 83424->83426 83450 6cf8219a RtlLeaveCriticalSection _doexit 83425->83450 83443 6cf7b751 83426->83443 83427->83425 83429 6cf82169 83449 6cf7ef1d 66 API calls __getptd_noexit 83429->83449 83433->83410 83434->83415 83438 6cf7ee05 83436->83438 83439 6cf7ee3b 83438->83439 83440 6cf7ee1c Sleep 83438->83440 83451 6cf7cd40 83438->83451 83439->83416 83439->83417 83441 6cf7ee31 83440->83441 83441->83438 83441->83439 83442->83414 83444 6cf7b75c RtlFreeHeap 83443->83444 83445 6cf7b785 __dosmaperr 83443->83445 83444->83445 83446 6cf7b771 83444->83446 83445->83429 83476 6cf7ef1d 66 API calls __getptd_noexit 83446->83476 83448 6cf7b777 GetLastError 83448->83445 83449->83425 83450->83414 83452 6cf7cdbd 83451->83452 83459 6cf7cd4e 83451->83459 83474 6cf841b7 RtlDecodePointer 83452->83474 83454 6cf7cdc3 83475 6cf7ef1d 66 API calls __getptd_noexit 83454->83475 83457 6cf7cd7c RtlAllocateHeap 83457->83459 83467 6cf7cdb5 83457->83467 83459->83457 83460 6cf7cda9 83459->83460 83464 6cf7cda7 83459->83464 83465 6cf7cd59 83459->83465 83471 6cf841b7 RtlDecodePointer 83459->83471 83472 6cf7ef1d 66 API calls __getptd_noexit 83460->83472 83473 6cf7ef1d 66 API calls __getptd_noexit 83464->83473 83465->83459 83468 6cf83a7f 66 API calls 2 library calls 83465->83468 83469 6cf838d0 66 API calls 8 library calls 83465->83469 83470 6cf81d8e GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83465->83470 83467->83438 83468->83465 83469->83465 83471->83459 83472->83464 83473->83467 83474->83454 83475->83467 83476->83448 83478 6cf82ffc 83477->83478 83482 6cf83011 83477->83482 83541 6cf7ef1d 66 API calls __getptd_noexit 83478->83541 83480 6cf83001 83542 6cf80403 11 API calls strtoxl 83480->83542 83483 6cf83046 83482->83483 83489 6cf8300c 83482->83489 83538 6cf821d6 83482->83538 83485 6cf81afd _fputc 66 API calls 83483->83485 83486 6cf8305a 83485->83486 83487 6cf8372c __read 79 API calls 83486->83487 83488 6cf83061 83487->83488 83488->83489 83490 6cf81afd _fputc 66 API calls 83488->83490 83489->83389 83491 6cf83084 83490->83491 83491->83489 83492 6cf81afd _fputc 66 API calls 83491->83492 83493 6cf83090 83492->83493 83493->83489 83494 6cf81afd _fputc 66 API calls 83493->83494 83495 6cf8309d 83494->83495 83496 6cf81afd _fputc 66 API calls 83495->83496 83496->83489 83497->83385 83498->83387 83499->83389 83501 6cf81b09 83500->83501 83502 6cf81b1e 83500->83502 83543 6cf7ef1d 66 API calls __getptd_noexit 83501->83543 83502->83389 83504 6cf81b0e 83544 6cf80403 11 API calls strtoxl 83504->83544 83506 6cf81b19 83506->83389 83508 6cf83738 __mtinitlocknum 83507->83508 83509 6cf8375b 83508->83509 83510 6cf83740 83508->83510 83512 6cf83767 83509->83512 83515 6cf837a1 83509->83515 83624 6cf7ef30 66 API calls __getptd_noexit 83510->83624 83626 6cf7ef30 66 API calls __getptd_noexit 83512->83626 83513 6cf83745 83625 6cf7ef1d 66 API calls __getptd_noexit 83513->83625 83518 6cf837ae 83515->83518 83519 6cf837c3 83515->83519 83517 6cf8376c 83627 6cf7ef1d 66 API calls __getptd_noexit 83517->83627 83629 6cf7ef30 66 API calls __getptd_noexit 83518->83629 83545 6cf8909b 83519->83545 83523 6cf83774 83628 6cf80403 11 API calls strtoxl 83523->83628 83524 6cf837b3 83630 6cf7ef1d 66 API calls __getptd_noexit 83524->83630 83525 6cf837c9 83529 6cf837eb 83525->83529 83530 6cf837d7 83525->83530 83528 6cf8374d __mtinitlocknum 83528->83389 83631 6cf7ef1d 66 API calls __getptd_noexit 83529->83631 83555 6cf83175 83530->83555 83533 6cf837f0 83632 6cf7ef30 66 API calls __getptd_noexit 83533->83632 83534 6cf837e3 83633 6cf8381a RtlLeaveCriticalSection __unlock_fhandle 83534->83633 83537->83385 83539 6cf7edfc __malloc_crt 66 API calls 83538->83539 83540 6cf821eb 83539->83540 83540->83483 83541->83480 83542->83489 83543->83504 83544->83506 83546 6cf890a7 __mtinitlocknum 83545->83546 83547 6cf89101 83546->83547 83550 6cf821a3 __lock 66 API calls 83546->83550 83548 6cf89123 __mtinitlocknum 83547->83548 83549 6cf89106 RtlEnterCriticalSection 83547->83549 83548->83525 83549->83548 83551 6cf890d3 83550->83551 83552 6cf890dc InitializeCriticalSectionAndSpinCount 83551->83552 83553 6cf890ef 83551->83553 83552->83553 83634 6cf89131 RtlLeaveCriticalSection _doexit 83553->83634 83556 6cf831ac 83555->83556 83557 6cf83191 83555->83557 83559 6cf831bb 83556->83559 83562 6cf831da 83556->83562 83635 6cf7ef30 66 API calls __getptd_noexit 83557->83635 83637 6cf7ef30 66 API calls __getptd_noexit 83559->83637 83560 6cf83196 83636 6cf7ef1d 66 API calls __getptd_noexit 83560->83636 83564 6cf831f8 83562->83564 83578 6cf8320c 83562->83578 83563 6cf831c0 83638 6cf7ef1d 66 API calls __getptd_noexit 83563->83638 83640 6cf7ef30 66 API calls __getptd_noexit 83564->83640 83568 6cf83262 83642 6cf7ef30 66 API calls __getptd_noexit 83568->83642 83569 6cf831c7 83639 6cf80403 11 API calls strtoxl 83569->83639 83571 6cf831fd 83641 6cf7ef1d 66 API calls __getptd_noexit 83571->83641 83573 6cf83267 83643 6cf7ef1d 66 API calls __getptd_noexit 83573->83643 83575 6cf8319e 83575->83534 83577 6cf83204 83644 6cf80403 11 API calls strtoxl 83577->83644 83578->83568 83578->83575 83579 6cf83241 83578->83579 83580 6cf8327b 83578->83580 83579->83568 83587 6cf8324c ReadFile 83579->83587 83582 6cf7edfc __malloc_crt 66 API calls 83580->83582 83584 6cf83291 83582->83584 83590 6cf832b9 83584->83590 83591 6cf8329b 83584->83591 83585 6cf836ef GetLastError 83588 6cf836fc 83585->83588 83589 6cf83576 83585->83589 83586 6cf83377 83586->83585 83595 6cf8338b 83586->83595 83587->83585 83587->83586 83653 6cf7ef1d 66 API calls __getptd_noexit 83588->83653 83603 6cf834fb 83589->83603 83651 6cf7ef43 66 API calls 3 library calls 83589->83651 83647 6cf825d6 68 API calls 3 library calls 83590->83647 83645 6cf7ef1d 66 API calls __getptd_noexit 83591->83645 83595->83603 83605 6cf833a7 83595->83605 83607 6cf835bb 83595->83607 83596 6cf83701 83654 6cf7ef30 66 API calls __getptd_noexit 83596->83654 83597 6cf832a0 83646 6cf7ef30 66 API calls __getptd_noexit 83597->83646 83599 6cf832c7 83599->83587 83602 6cf7b751 _free 66 API calls 83602->83575 83603->83575 83603->83602 83604 6cf8340b ReadFile 83608 6cf83429 GetLastError 83604->83608 83617 6cf83433 83604->83617 83605->83604 83611 6cf83488 83605->83611 83606 6cf83630 ReadFile 83610 6cf8364f GetLastError 83606->83610 83615 6cf83659 83606->83615 83607->83603 83607->83606 83608->83605 83608->83617 83609 6cf8354c MultiByteToWideChar 83609->83603 83612 6cf83570 GetLastError 83609->83612 83610->83607 83610->83615 83611->83603 83613 6cf83503 83611->83613 83614 6cf834f6 83611->83614 83621 6cf834c0 83611->83621 83612->83589 83620 6cf8353a 83613->83620 83613->83621 83649 6cf7ef1d 66 API calls __getptd_noexit 83614->83649 83615->83607 83652 6cf825d6 68 API calls 3 library calls 83615->83652 83617->83605 83648 6cf825d6 68 API calls 3 library calls 83617->83648 83650 6cf825d6 68 API calls 3 library calls 83620->83650 83621->83609 83623 6cf83549 83623->83609 83624->83513 83625->83528 83626->83517 83627->83523 83628->83528 83629->83524 83630->83523 83631->83533 83632->83534 83633->83528 83634->83547 83635->83560 83636->83575 83637->83563 83638->83569 83639->83575 83640->83571 83641->83577 83642->83573 83643->83577 83644->83575 83645->83597 83646->83575 83647->83599 83648->83617 83649->83603 83650->83623 83651->83603 83652->83615 83653->83596 83654->83603 83655 6cfc5e70 83660 6cf7c861 83655->83660 83658 6cfc5eba 83661 6cf7c86b 83660->83661 83662 6cf7cd40 _malloc 66 API calls 83661->83662 83663 6cf7c885 83661->83663 83668 6cf7c887 std::exception::exception 83661->83668 83673 6cf841b7 RtlDecodePointer 83661->83673 83662->83661 83663->83658 83672 6cfc5ef0 66 API calls 2 library calls 83663->83672 83665 6cf7c8c5 83675 6cf7b373 66 API calls std::exception::operator= 83665->83675 83667 6cf7c8cf 83676 6cf7d3d1 RaiseException 83667->83676 83668->83665 83674 6cf7bfff 76 API calls _Error_objects 83668->83674 83671 6cf7c8e0 83672->83658 83673->83661 83674->83665 83675->83667 83676->83671 83677 6cf7cb3b 83678 6cf7cb46 83677->83678 83679 6cf7cb4b 83677->83679 83691 6cf8475d GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 83678->83691 83683 6cf7ca45 83679->83683 83682 6cf7cb59 83684 6cf7ca51 __mtinitlocknum 83683->83684 83685 6cf7caee __mtinitlocknum 83684->83685 83689 6cf7ca9e ___DllMainCRTStartup 83684->83689 83692 6cf7c8e1 83684->83692 83685->83682 83687 6cf7cace 83687->83685 83688 6cf7c8e1 __CRT_INIT@12 149 API calls 83687->83688 83688->83685 83689->83685 83689->83687 83690 6cf7c8e1 __CRT_INIT@12 149 API calls 83689->83690 83690->83687 83691->83679 83693 6cf7c8ed __mtinitlocknum 83692->83693 83694 6cf7c8f5 83693->83694 83695 6cf7c96f 83693->83695 83744 6cf81c95 HeapCreate 83694->83744 83697 6cf7c975 83695->83697 83698 6cf7c9d0 83695->83698 83704 6cf7c993 83697->83704 83711 6cf7c8fe __mtinitlocknum 83697->83711 83754 6cf81ffc 66 API calls _doexit 83697->83754 83699 6cf7c9d5 83698->83699 83700 6cf7ca2e 83698->83700 83759 6cf81191 TlsGetValue RtlDecodePointer TlsSetValue 83699->83759 83700->83711 83762 6cf81478 79 API calls __freefls@4 83700->83762 83701 6cf7c8fa 83703 6cf7c905 83701->83703 83701->83711 83745 6cf814e6 86 API calls 5 library calls 83703->83745 83709 6cf7c9a7 83704->83709 83755 6cf81aaa 67 API calls _free 83704->83755 83706 6cf7c9da 83760 6cf7ee41 66 API calls __calloc_crt 83706->83760 83758 6cf7c9ba 70 API calls __mtterm 83709->83758 83711->83689 83713 6cf7c90a __RTC_Initialize 83716 6cf7c90e 83713->83716 83721 6cf7c91a GetCommandLineA 83713->83721 83715 6cf7c9e6 83715->83711 83718 6cf7c9f2 RtlDecodePointer 83715->83718 83746 6cf81cb3 HeapDestroy 83716->83746 83717 6cf7c99d 83756 6cf811c5 70 API calls _free 83717->83756 83726 6cf7ca07 83718->83726 83747 6cf84510 71 API calls 2 library calls 83721->83747 83722 6cf7c913 83722->83711 83723 6cf7c9a2 83757 6cf81cb3 HeapDestroy 83723->83757 83728 6cf7ca22 83726->83728 83729 6cf7ca0b 83726->83729 83727 6cf7c92a 83748 6cf81865 73 API calls __calloc_crt 83727->83748 83730 6cf7b751 _free 66 API calls 83728->83730 83761 6cf81202 66 API calls 4 library calls 83729->83761 83730->83722 83733 6cf7c934 83735 6cf7c938 83733->83735 83750 6cf84455 95 API calls 3 library calls 83733->83750 83734 6cf7ca12 GetCurrentThreadId 83734->83711 83749 6cf811c5 70 API calls _free 83735->83749 83738 6cf7c944 83743 6cf7c958 83738->83743 83751 6cf841df 94 API calls 6 library calls 83738->83751 83741 6cf7c94d 83741->83743 83752 6cf81e0f 77 API calls 4 library calls 83741->83752 83743->83722 83753 6cf81aaa 67 API calls _free 83743->83753 83744->83701 83745->83713 83746->83722 83747->83727 83748->83733 83749->83716 83750->83738 83751->83741 83752->83743 83753->83735 83754->83704 83755->83717 83756->83723 83757->83709 83758->83711 83759->83706 83760->83715 83761->83734 83762->83711 83763 4038af #17 SetErrorMode OleInitialize 83836 406328 GetModuleHandleA 83763->83836 83767 40391d GetCommandLineW 83841 406035 lstrcpynW 83767->83841 83769 40392f GetModuleHandleW 83770 403947 83769->83770 83771 405d32 CharNextW 83770->83771 83772 403956 CharNextW 83771->83772 83777 403968 83772->83777 83773 403a02 83774 403a21 GetTempPathW 83773->83774 83842 4037f8 83774->83842 83776 403a37 83778 403a3b GetWindowsDirectoryW lstrcatW 83776->83778 83779 403a5f DeleteFileW 83776->83779 83777->83773 83780 405d32 CharNextW 83777->83780 83794 403a04 83777->83794 83781 4037f8 11 API calls 83778->83781 83850 4035b3 GetTickCount GetModuleFileNameW 83779->83850 83780->83777 83784 403a57 83781->83784 83783 403a73 83785 403af8 83783->83785 83786 403add 83783->83786 83788 405d32 CharNextW 83783->83788 83784->83779 83784->83785 83952 403885 84 API calls 83785->83952 83878 405958 83786->83878 83800 403a8a 83788->83800 83790 403afd OleUninitialize 83792 403bfa 83790->83792 83793 403b0d 83790->83793 83796 403c7d 83792->83796 83798 406328 3 API calls 83792->83798 83953 405ccc MessageBoxIndirectW 83793->83953 83935 406035 lstrcpynW 83794->83935 83802 403c09 83798->83802 83799 403b1b ExitProcess 83803 403b23 lstrcatW lstrcmpiW 83800->83803 83804 403ab5 83800->83804 83805 406328 3 API calls 83802->83805 83803->83785 83807 403b3f CreateDirectoryW SetCurrentDirectoryW 83803->83807 83936 4067aa 83804->83936 83808 403c12 83805->83808 83810 403b62 83807->83810 83811 403b57 83807->83811 83814 406328 3 API calls 83808->83814 83955 406035 lstrcpynW 83810->83955 83954 406035 lstrcpynW 83811->83954 83816 403c1b 83814->83816 83815 403b70 83956 406035 lstrcpynW 83815->83956 83820 403c69 ExitWindowsEx 83816->83820 83823 403c29 GetCurrentProcess 83816->83823 83818 403ad2 83951 406035 lstrcpynW 83818->83951 83820->83796 83822 403c76 83820->83822 83824 40141d 80 API calls 83822->83824 83826 403c39 83823->83826 83824->83796 83825 406831 18 API calls 83827 403b98 DeleteFileW 83825->83827 83826->83820 83828 403ba5 CopyFileW 83827->83828 83833 403b7f 83827->83833 83828->83833 83829 403bee 83959 406c94 42 API calls 83829->83959 83832 406831 18 API calls 83832->83833 83833->83825 83833->83829 83833->83832 83835 403bd9 CloseHandle 83833->83835 83957 406c94 42 API calls 83833->83957 83958 405c6b CreateProcessW CloseHandle 83833->83958 83835->83833 83837 406340 LoadLibraryA 83836->83837 83838 40634b GetProcAddress 83836->83838 83837->83838 83839 4038f2 SHGetFileInfoW 83837->83839 83838->83839 83840 406035 lstrcpynW 83839->83840 83840->83767 83841->83769 83843 406064 5 API calls 83842->83843 83844 403804 83843->83844 83845 40380e 83844->83845 83960 40674e lstrlenW CharPrevW 83844->83960 83845->83776 83967 405e7c GetFileAttributesW CreateFileW 83850->83967 83852 4035f3 83853 403603 83852->83853 83968 406035 lstrcpynW 83852->83968 83853->83783 83855 403619 83969 40677d lstrlenW 83855->83969 83859 40362a GetFileSize 83860 403641 83859->83860 83875 403726 83859->83875 83860->83853 83866 4037e9 83860->83866 83874 4032d2 6 API calls 83860->83874 83860->83875 83974 403336 ReadFile 83860->83974 83862 40372f 83862->83853 83864 40376b GlobalAlloc 83862->83864 83987 403368 SetFilePointer 83862->83987 83988 403368 SetFilePointer 83864->83988 83869 4032d2 6 API calls 83866->83869 83868 40374c 83871 403336 ReadFile 83868->83871 83869->83853 83870 403786 83989 40337f 83870->83989 83873 403757 83871->83873 83873->83853 83873->83864 83874->83860 83976 4032d2 83875->83976 83879 406328 3 API calls 83878->83879 83880 40596c 83879->83880 83881 405972 83880->83881 83882 405984 83880->83882 84021 405f7d wsprintfW 83881->84021 84022 405eff RegOpenKeyExW RegQueryValueExW RegCloseKey 83882->84022 83884 4059b5 83886 4059d4 lstrcatW 83884->83886 84023 405eff RegOpenKeyExW RegQueryValueExW RegCloseKey 83884->84023 83887 405982 83886->83887 84012 403ec1 83887->84012 83891 4067aa 18 API calls 83935->83774 84029 406035 lstrcpynW 83936->84029 83938 4067bb 83939 405d85 4 API calls 83938->83939 83940 4067c1 83939->83940 83941 406064 5 API calls 83940->83941 83948 403ac3 83940->83948 83947 4067d1 83941->83947 83942 406809 lstrlenW 83943 406810 83942->83943 83942->83947 83944 40674e 3 API calls 83943->83944 83946 406816 GetFileAttributesW 83944->83946 83945 406301 2 API calls 83945->83947 83946->83948 83947->83942 83947->83945 83947->83948 83949 40677d 2 API calls 83947->83949 83948->83785 83950 406035 lstrcpynW 83948->83950 83949->83942 83950->83818 83951->83786 83952->83790 83953->83799 83954->83810 83955->83815 83956->83833 83957->83833 83958->83833 83959->83785 83961 403816 CreateDirectoryW 83960->83961 83962 40676b lstrcatW 83960->83962 83963 405eab 83961->83963 83962->83961 83964 405eb8 GetTickCount GetTempFileNameW 83963->83964 83965 40382a 83964->83965 83966 405eee 83964->83966 83965->83776 83966->83964 83966->83965 83967->83852 83968->83855 83970 40678c 83969->83970 83971 406792 CharPrevW 83970->83971 83972 40361f 83970->83972 83971->83970 83971->83972 83973 406035 lstrcpynW 83972->83973 83973->83859 83975 403357 83974->83975 83975->83860 83977 4032f3 83976->83977 83978 4032db 83976->83978 83981 403303 GetTickCount 83977->83981 83982 4032fb 83977->83982 83979 4032e4 DestroyWindow 83978->83979 83980 4032eb 83978->83980 83979->83980 83980->83862 83984 403311 CreateDialogParamW ShowWindow 83981->83984 83985 403334 83981->83985 84010 40635e DispatchMessageW PeekMessageW 83982->84010 83984->83985 83985->83862 83986 403301 83986->83862 83987->83868 83988->83870 83991 40339a 83989->83991 83990 4033c7 83991->83990 84011 403368 SetFilePointer 83991->84011 84010->83986 84011->83990 84013 403ed5 84012->84013 84028 405f7d wsprintfW 84013->84028 84015 403f49 84016 406831 18 API calls 84015->84016 84017 403f55 SetWindowTextW 84016->84017 84018 403f70 84017->84018 84019 403f8b 84018->84019 84020 406831 18 API calls 84018->84020 84019->83891 84020->84018 84021->83887 84022->83884 84023->83886 84028->84015 84029->83938 84030 4023f0 84031 402403 84030->84031 84045 4024da 84030->84045 84032 40145c 18 API calls 84031->84032 84034 40240a 84032->84034 84033 404f9e 25 API calls 84035 4024f1 84033->84035 84036 40145c 18 API calls 84034->84036 84037 402413 84036->84037 84038 402429 LoadLibraryExW 84037->84038 84039 40241b GetModuleHandleW 84037->84039 84040 40243e 84038->84040 84041 4024ce 84038->84041 84039->84038 84039->84040 84065 406391 GlobalAlloc WideCharToMultiByte 84040->84065 84043 404f9e 25 API calls 84041->84043 84043->84045 84044 402449 84046 40248c 84044->84046 84047 40244f 84044->84047 84045->84033 84050 404f9e 25 API calls 84046->84050 84048 402457 84047->84048 84049 40246e 84047->84049 84309 401435 25 API calls 84048->84309 84068 6cf70be0 84049->84068 84081 6f952a4f 84049->84081 84123 6cf70560 84049->84123 84144 6cf717b0 84049->84144 84191 6cf70180 84049->84191 84240 6cf6f510 84049->84240 84264 6f95199f 84049->84264 84275 6cf70460 84049->84275 84283 6cf712d0 84049->84283 84051 402496 84050->84051 84053 4062cf 11 API calls 84051->84053 84054 40245f 84053->84054 84054->84035 84055 4024c0 FreeLibrary 84054->84055 84055->84035 84066 4063c9 GlobalFree 84065->84066 84067 4063bc GetProcAddress 84065->84067 84066->84044 84067->84066 84069 6cf70c33 84068->84069 84079 6cf70d05 84068->84079 84070 6cf70c3d lstrcpynW GlobalFree 84069->84070 84069->84079 84074 6cf70c6a _memset 84070->84074 84071 6cf70d07 IsWindow 84072 6cf70d7b UpdateWindow 84071->84072 84080 6cf70d1a std::bad_exception::~bad_exception codecvt 84071->84080 84310 6cf7addf 84072->84310 84076 6cf70cc5 84074->84076 84077 6cf70ca2 lstrcpyW GlobalFree 84074->84077 84074->84079 84075 6cf70d8f 84075->84054 84078 6cf70cd7 lstrcpynW GlobalFree 84076->84078 84076->84079 84077->84076 84078->84079 84079->84071 84080->84072 84082 6f952a7f 84081->84082 84319 6f951c1b 84082->84319 84084 6f952a86 84085 6f952b9c 84084->84085 84086 6f952a97 84084->84086 84087 6f952a9e 84084->84087 84085->84054 84379 6f9523c1 GlobalAlloc 84086->84379 84360 6f9528a3 84087->84360 84090 6f952a9d 84090->84087 84092 6f952ac3 84093 6f952ae4 84092->84093 84094 6f952b02 84092->84094 84382 6f952445 11 API calls 84093->84382 84099 6f952b44 84094->84099 84100 6f952b08 84094->84100 84095 6f952ab4 84098 6f952aba 84095->84098 84104 6f952ac5 84095->84104 84096 6f952acd 84096->84092 84381 6f951507 GlobalFree 84096->84381 84098->84092 84373 6f95124c 84098->84373 84389 6f952445 11 API calls 84099->84389 84387 6f951904 GlobalAlloc lstrcpyW wsprintfW 84100->84387 84103 6f952aea 84383 6f951904 GlobalAlloc lstrcpyW wsprintfW 84103->84383 84380 6f9525b2 GlobalAlloc GlobalSize 84104->84380 84107 6f952b36 84114 6f952b8b 84107->84114 84390 6f95240b GlobalFree 84107->84390 84110 6f952b1e 84388 6f952445 11 API calls 84110->84388 84111 6f952af0 84384 6f9515e0 84111->84384 84112 6f952acb 84112->84092 84114->84085 84116 6f952b95 GlobalFree 84114->84116 84116->84085 84119 6f952b57 84120 6f952b77 84119->84120 84121 6f952b70 FreeLibrary 84119->84121 84120->84114 84391 6f951880 GlobalAlloc lstrcpynW wsprintfW 84120->84391 84121->84120 84410 6cf8b7d0 IsWindow 84123->84410 84131 6cf705ff 84132 6cf7064b 84131->84132 84133 6cf70619 lstrcpynW GlobalFree 84131->84133 84134 6cf7066b KiUserCallbackDispatcher 84132->84134 84135 6cf706f8 84132->84135 84133->84132 84134->84135 84140 6cf706b1 84134->84140 84136 6cf8c980 codecvt 66 API calls 84135->84136 84137 6cf70703 84136->84137 84139 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84137->84139 84141 6cf70710 84139->84141 84142 6cf706e5 KiUserCallbackDispatcher 84140->84142 84143 6cf706d3 TranslateMessage DispatchMessageW 84140->84143 84435 6cfa0780 84140->84435 84141->84054 84142->84135 84142->84140 84143->84142 84145 6cf717fc 84144->84145 84148 6cf719a6 codecvt 84144->84148 84146 6cf71806 lstrcpynW GlobalFree 84145->84146 84145->84148 84147 6cf71837 _memset 84146->84147 84151 6cf7188f 84147->84151 84152 6cf71872 lstrcpyW GlobalFree 84147->84152 84149 6cf719dd codecvt 84148->84149 84150 6cf719c9 84148->84150 84157 6cf71a1e codecvt 84149->84157 84163 6cf719f1 std::_DebugHeapString::_DebugHeapString 84149->84163 84497 6cf749e0 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 84150->84497 84492 6cf8c900 84151->84492 84152->84151 84155 6cf719a1 84156 6cf71b02 84155->84156 84158 6cf8c980 codecvt 66 API calls 84156->84158 84169 6cf71a5f 84157->84169 84170 6cf71a7d codecvt 84157->84170 84173 6cf71a32 std::_DebugHeapString::_DebugHeapString 84157->84173 84161 6cf71b0d 84158->84161 84159 6cf718e5 84164 6cf8c900 69 API calls 84159->84164 84160 6cf718a3 _memset 84160->84159 84162 6cf718c8 lstrcpyW GlobalFree 84160->84162 84166 6cf8c980 codecvt 66 API calls 84161->84166 84162->84159 84498 6cf748c0 GlobalAlloc lstrcpynW 84163->84498 84165 6cf718f9 IsWindow 84164->84165 84165->84156 84186 6cf71911 std::bad_exception::~bad_exception codecvt std::_DebugHeapString::_DebugHeapString 84165->84186 84171 6cf71b18 84166->84171 84168 6cf71a0e 84172 6cf8c980 codecvt 66 API calls 84168->84172 84499 6cf749e0 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 84169->84499 84177 6cf71a91 84170->84177 84178 6cf71aac codecvt 84170->84178 84174 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84171->84174 84172->84155 84503 6cf748c0 GlobalAlloc lstrcpynW 84173->84503 84175 6cf71b24 84174->84175 84175->84054 84500 6cf749e0 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 84177->84500 84178->84173 84182 6cf71ac0 84178->84182 84501 6d01954e 67 API calls 7 library calls 84182->84501 84183 6cf7197e codecvt 84183->84148 84188 6cf71992 84183->84188 84185 6cf71ad4 84185->84173 84187 6cf71adb 84185->84187 84186->84156 84495 6cf8cf70 77 API calls 84186->84495 84502 6cf749e0 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 84187->84502 84496 6cf749e0 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 84188->84496 84192 6cf701d3 84191->84192 84504 6cf70100 84192->84504 84194 6cf701d8 CoInitialize 84195 6cf701f3 _memset 84194->84195 84196 6cf7022b 84195->84196 84197 6cf70211 lstrcpyW GlobalFree 84195->84197 84516 6cf97510 84196->84516 84197->84196 84199 6cf70237 84201 6cf7024f 84199->84201 84606 6cf97580 90 API calls 3 library calls 84199->84606 84521 6cf6e640 84201->84521 84203 6cf70289 84529 6cfa19d0 84203->84529 84241 6cf6f604 84240->84241 84242 6cf6f53a 84240->84242 84244 6cf6f606 IsWindow 84241->84244 84242->84241 84243 6cf6f544 lstrcpynW GlobalFree 84242->84243 84245 6cf6f571 _memset 84243->84245 84248 6cf6f61b codecvt 84244->84248 84260 6cf6f6b6 84244->84260 84245->84241 84249 6cf6f5c5 84245->84249 84250 6cf6f5a1 lstrcpyW GlobalFree 84245->84250 84246 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84247 6cf6f6c8 84246->84247 84247->84054 84251 6cf6f62a 84248->84251 84256 6cf6f68a codecvt 84248->84256 84249->84241 84253 6cf6f5d7 lstrcpynW GlobalFree 84249->84253 84250->84249 84252 6cf8c900 69 API calls 84251->84252 84254 6cf6f63e 84252->84254 84253->84241 85228 6cf6ce50 77 API calls 3 library calls 84254->85228 84258 6cf8c900 69 API calls 84256->84258 84256->84260 84257 6cf6f656 84259 6cf8c980 codecvt 66 API calls 84257->84259 84258->84260 84261 6cf6f663 84259->84261 84260->84246 84262 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84261->84262 84263 6cf6f670 84262->84263 84263->84054 84265 6f9515a3 3 API calls 84264->84265 84266 6f9519c5 84265->84266 84267 6f9515a3 3 API calls 84266->84267 84268 6f9519cd 84267->84268 84269 6f9515a3 3 API calls 84268->84269 84272 6f951a0d __alldvrm 84268->84272 84270 6f9519f2 84269->84270 84271 6f9519fb GlobalFree 84270->84271 84271->84272 84273 6f9515e0 2 API calls 84272->84273 84274 6f951a90 GlobalFree GlobalFree 84273->84274 84274->84054 84276 6cf704ad 84275->84276 84279 6cf704e8 _memset 84275->84279 84277 6cf704b7 lstrcpynW GlobalFree 84276->84277 84276->84279 84277->84279 84278 6cf70532 SetWindowTextW 84281 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84278->84281 84279->84278 84280 6cf70510 lstrcpyW GlobalFree 84279->84280 84280->84278 84282 6cf7054d 84281->84282 84282->84054 84284 6cf7131c 84283->84284 84285 6cf7153a 84283->84285 84284->84285 84286 6cf71326 lstrcpynW GlobalFree 84284->84286 84287 6cf71357 _memset 84286->84287 84288 6cf713af 84287->84288 84289 6cf71392 lstrcpyW GlobalFree 84287->84289 84290 6cf8c900 69 API calls 84288->84290 84289->84288 84292 6cf713c3 _memset 84290->84292 84291 6cf71405 84294 6cf8c900 69 API calls 84291->84294 84292->84291 84293 6cf713e8 lstrcpyW GlobalFree 84292->84293 84293->84291 84295 6cf71419 _memset 84294->84295 84296 6cf7145b 84295->84296 84297 6cf7143e lstrcpyW GlobalFree 84295->84297 84298 6cf8c900 69 API calls 84296->84298 84297->84296 84299 6cf7146f IsWindow 84298->84299 84304 6cf71487 std::bad_exception::~bad_exception codecvt std::_DebugHeapString::_DebugHeapString 84299->84304 84300 6cf8c980 codecvt 66 API calls 84301 6cf71514 84300->84301 84302 6cf8c980 codecvt 66 API calls 84301->84302 84303 6cf7151f 84302->84303 84305 6cf8c980 codecvt 66 API calls 84303->84305 84304->84300 84306 6cf7152a 84305->84306 84307 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84306->84307 84308 6cf71536 84307->84308 84308->84054 84309->84054 84311 6cf7ade7 84310->84311 84312 6cf7ade9 IsDebuggerPresent 84310->84312 84311->84075 84318 6cf88175 84312->84318 84315 6cf7fe54 SetUnhandledExceptionFilter UnhandledExceptionFilter 84316 6cf7fe71 __call_reportfault 84315->84316 84317 6cf7fe79 GetCurrentProcess TerminateProcess 84315->84317 84316->84317 84317->84075 84318->84315 84392 6f951581 GlobalAlloc 84319->84392 84321 6f951c3f 84393 6f951581 GlobalAlloc 84321->84393 84323 6f951c4a 84394 6f9515a3 84323->84394 84325 6f951e60 GlobalFree GlobalFree GlobalFree 84327 6f951e7d 84325->84327 84335 6f951ec7 84325->84335 84326 6f951c52 84326->84325 84328 6f951d04 GlobalAlloc 84326->84328 84333 6f951d55 lstrcpyW 84326->84333 84334 6f951d7a GlobalFree 84326->84334 84338 6f951d5f lstrcpyW 84326->84338 84350 6f95216c lstrcpyW 84326->84350 84351 6f951dbc 84326->84351 84352 6f952019 GlobalFree 84326->84352 84401 6f951581 GlobalAlloc 84326->84401 84402 6f951592 GlobalAlloc lstrcpyW 84326->84402 84332 6f9521ad 84327->84332 84327->84335 84340 6f951e99 84327->84340 84328->84326 84329 6f9521ed GetModuleHandleW 84330 6f95220f lstrcmpiW 84329->84330 84331 6f9521fe LoadLibraryW 84329->84331 84336 6f952221 lstrcmpiW 84330->84336 84337 6f95222d 84330->84337 84331->84330 84331->84335 84332->84329 84332->84335 84333->84338 84334->84326 84335->84084 84336->84337 84339 6f952296 84336->84339 84337->84339 84344 6f952257 lstrlenW 84337->84344 84338->84326 84404 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 84339->84404 84340->84335 84400 6f951592 GlobalAlloc lstrcpyW 84340->84400 84342 6f9522a8 84342->84335 84346 6f9522b8 lstrcpyW lstrcatW 84342->84346 84347 6f952264 84344->84347 84348 6f952282 84344->84348 84405 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 84346->84405 84347->84348 84357 6f952276 lstrcatW 84347->84357 84403 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 84348->84403 84350->84326 84351->84326 84399 6f9518df GlobalSize GlobalAlloc 84351->84399 84352->84326 84354 6f9522f2 84354->84335 84359 6f952302 lstrcatW 84354->84359 84357->84348 84358 6f95228e 84358->84335 84359->84335 84365 6f9528bb 84360->84365 84362 6f9515a3 3 API calls 84362->84365 84364 6f952a18 GlobalFree 84364->84365 84366 6f952a49 84364->84366 84365->84362 84365->84364 84367 6f9529d0 GlobalAlloc WideCharToMultiByte 84365->84367 84368 6f95297b GlobalAlloc lstrcpynW 84365->84368 84369 6f952957 lstrlenW 84365->84369 84407 6f951628 GlobalAlloc lstrcpyW 84365->84407 84408 6f951592 GlobalAlloc lstrcpyW 84365->84408 84366->84092 84366->84095 84366->84096 84367->84365 84368->84365 84370 6f9529b0 GlobalAlloc CLSIDFromString GlobalFree 84368->84370 84369->84364 84371 6f952966 84369->84371 84370->84364 84371->84364 84409 6f952554 VirtualAlloc 84371->84409 84375 6f95125e 84373->84375 84374 6f951303 GetDiskFreeSpaceExW 84376 6f951321 84374->84376 84375->84374 84377 6f951412 GetLastError 84376->84377 84378 6f95141d 84376->84378 84377->84378 84378->84092 84379->84090 84380->84112 84382->84103 84383->84111 84385 6f951623 GlobalFree 84384->84385 84386 6f9515e9 GlobalAlloc lstrcpynW 84384->84386 84385->84107 84386->84385 84387->84110 84388->84107 84389->84107 84390->84119 84391->84114 84392->84321 84393->84323 84395 6f9515dd 84394->84395 84396 6f9515ac 84394->84396 84395->84326 84396->84395 84406 6f951581 GlobalAlloc 84396->84406 84398 6f9515ba lstrcpyW GlobalFree 84398->84326 84399->84351 84400->84335 84401->84326 84402->84326 84403->84358 84404->84342 84405->84354 84406->84398 84407->84365 84408->84365 84409->84371 84411 6cf705b0 84410->84411 84412 6cf8b7ec ShowWindow 84410->84412 84414 6cf8cd50 84411->84414 84412->84411 84415 6cf8cdee 84414->84415 84416 6cf8cd91 84414->84416 84417 6cf8c940 69 API calls 84415->84417 84418 6cf8c940 69 API calls 84416->84418 84427 6cf8cde9 84417->84427 84419 6cf8cda3 84418->84419 84447 6cf8c9e0 84419->84447 84421 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84424 6cf705da 84421->84424 84422 6cf8cdb9 84423 6cf8c940 69 API calls 84422->84423 84425 6cf8cdc8 84423->84425 84428 6cf8c980 84424->84428 84426 6cf8c980 codecvt 66 API calls 84425->84426 84426->84427 84427->84421 84429 6cf8c994 84428->84429 84431 6cf705e5 84428->84431 84430 6cf7b751 _free 66 API calls 84429->84430 84430->84431 84432 6cf8c940 84431->84432 84483 6cf8cad0 84432->84483 84434 6cf8c96b 84434->84131 84436 6cfa0794 84435->84436 84437 6cfa07b4 GetParent 84436->84437 84438 6cfa0875 codecvt 84436->84438 84442 6cfa07cc codecvt 84437->84442 84439 6cfa0834 84438->84439 84440 6cfa08cd 84438->84440 84439->84140 84491 6cf97d60 110 API calls codecvt 84440->84491 84442->84439 84444 6cfa085c GetParent 84442->84444 84445 6cfa083b 84442->84445 84443 6cfa08ee 84443->84439 84444->84442 84490 6cf97d60 110 API calls codecvt 84445->84490 84448 6cf8c9f2 _wcslen std::_DebugHeapString::_DebugHeapString 84447->84448 84449 6cf8ca0b 84448->84449 84450 6cf8ca85 84448->84450 84451 6cf8ca18 84449->84451 84452 6cf8ca56 84449->84452 84453 6cf7b751 _free 66 API calls 84450->84453 84456 6cf8ca25 _wcscat _wcscpy 84450->84456 84454 6cf7cd40 _malloc 66 API calls 84451->84454 84457 6cf87e16 84452->84457 84453->84456 84454->84456 84456->84422 84458 6cf87e2c 84457->84458 84459 6cf87e21 84457->84459 84460 6cf87e34 84458->84460 84470 6cf87e41 84458->84470 84461 6cf7cd40 _malloc 66 API calls 84459->84461 84463 6cf7b751 _free 66 API calls 84460->84463 84462 6cf87e29 84461->84462 84462->84456 84477 6cf87e3c __dosmaperr 84463->84477 84464 6cf87e79 84479 6cf841b7 RtlDecodePointer 84464->84479 84465 6cf87e49 RtlReAllocateHeap 84465->84470 84465->84477 84467 6cf87e7f 84480 6cf7ef1d 66 API calls __getptd_noexit 84467->84480 84469 6cf87ea9 84482 6cf7ef1d 66 API calls __getptd_noexit 84469->84482 84470->84464 84470->84465 84470->84469 84474 6cf87e91 84470->84474 84478 6cf841b7 RtlDecodePointer 84470->84478 84473 6cf87eae GetLastError 84473->84477 84481 6cf7ef1d 66 API calls __getptd_noexit 84474->84481 84476 6cf87e96 GetLastError 84476->84477 84477->84456 84478->84470 84479->84467 84480->84477 84481->84476 84482->84473 84484 6cf8cadf _wcslen 84483->84484 84485 6cf8cb0f 84484->84485 84486 6cf8cb37 std::_DebugHeapString::_DebugHeapString 84484->84486 84487 6cf7b751 _free 66 API calls 84485->84487 84488 6cf8cb27 _wcsncpy 84485->84488 84486->84488 84489 6cf87e16 __realloc_crt 69 API calls 84486->84489 84487->84488 84488->84434 84489->84488 84490->84444 84491->84443 84493 6cf8cad0 69 API calls 84492->84493 84494 6cf8c92b 84493->84494 84494->84160 84495->84183 84496->84155 84497->84155 84498->84168 84499->84155 84500->84155 84501->84185 84502->84155 84503->84156 84607 6cfa21a0 MulDiv 84504->84607 84506 6cf70111 84608 6cfa21e0 11 API calls 84506->84608 84508 6cf7011b 84509 6cf70126 LoadLibraryA 84508->84509 84510 6cf7011f 84508->84510 84511 6cf7016d 84509->84511 84512 6cf70138 GetProcAddress 84509->84512 84510->84194 84511->84194 84513 6cf70159 FreeLibrary 84512->84513 84514 6cf70148 FreeLibrary 84512->84514 84513->84194 84514->84194 84609 6cf8cc60 84516->84609 84518 6cf97533 84518->84199 84519 6cf97522 codecvt std::_DebugHeapString::_DebugHeapString 84519->84518 84615 6cf8ce90 69 API calls std::_DebugHeapString::_DebugHeapString 84519->84615 84522 6cf6e6c3 84521->84522 84523 6cf6e66c 84521->84523 84522->84203 84524 6cf7c861 std::locale::facet::_Facet_Register 77 API calls 84523->84524 84525 6cf6e684 84524->84525 84526 6cf6e6ad 84525->84526 84620 6cfa1920 87 API calls _Error_objects 84525->84620 84526->84203 84528 6cf6e699 84528->84203 84530 6cfa19fd 84529->84530 84531 6cfa1a51 84529->84531 84532 6cfa1a2a 84530->84532 84533 6cfa1a08 84530->84533 84534 6cfa1a5e FindResourceW 84531->84534 84621 6cfcf2c0 84532->84621 84703 6cfcefe0 87 API calls 3 library calls 84533->84703 84537 6cfa1a7b 84534->84537 84543 6cfa1a1a 84534->84543 84539 6cfa1a87 LoadResource 84537->84539 84538 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 84543->84538 84606->84201 84607->84506 84608->84508 84610 6cf8cc7d 84609->84610 84611 6cf8cc6d 84609->84611 84616 6cf8cbd0 84610->84616 84613 6cf8cad0 69 API calls 84611->84613 84614 6cf8cc7b 84613->84614 84614->84519 84615->84518 84617 6cf8cbef 84616->84617 84618 6cf8cbe4 84616->84618 84617->84614 84619 6cf7b751 _free 66 API calls 84618->84619 84619->84617 84620->84528 84720 6cfcf970 84621->84720 84703->84543 85228->84257 85229 401cb2 85230 40145c 18 API calls 85229->85230 85231 401c54 85230->85231 85232 4062cf 11 API calls 85231->85232 85235 401c64 85231->85235 85233 401c59 85232->85233 85236 406cc7 85233->85236 85237 4067aa 18 API calls 85236->85237 85238 406cda 85237->85238 85239 406ce3 DeleteFileW 85238->85239 85240 406cfa 85238->85240 85279 406eda 85239->85279 85241 406e77 85240->85241 85283 406035 lstrcpynW 85240->85283 85247 406301 2 API calls 85241->85247 85267 406e84 85241->85267 85241->85279 85243 406d25 85244 406d39 85243->85244 85245 406d2f lstrcatW 85243->85245 85248 40677d 2 API calls 85244->85248 85246 406d3f 85245->85246 85250 406d4f lstrcatW 85246->85250 85252 406d57 lstrlenW FindFirstFileW 85246->85252 85249 406e90 85247->85249 85248->85246 85253 40674e 3 API calls 85249->85253 85249->85279 85250->85252 85251 4062cf 11 API calls 85251->85279 85254 406e67 85252->85254 85269 406d7e 85252->85269 85255 406e9a 85253->85255 85254->85241 85257 4062cf 11 API calls 85255->85257 85256 405d32 CharNextW 85256->85269 85258 406ea5 85257->85258 85259 405e5c 2 API calls 85258->85259 85261 406ead RemoveDirectoryW 85259->85261 85264 406ef0 85261->85264 85265 406eb9 85261->85265 85262 406e44 FindNextFileW 85263 406e5c FindClose 85262->85263 85262->85269 85263->85254 85266 404f9e 25 API calls 85264->85266 85265->85267 85268 406ebf 85265->85268 85266->85279 85267->85251 85271 4062cf 11 API calls 85268->85271 85269->85256 85269->85262 85270 4062cf 11 API calls 85269->85270 85272 406cc7 72 API calls 85269->85272 85280 404f9e 25 API calls 85269->85280 85281 404f9e 25 API calls 85269->85281 85284 406035 lstrcpynW 85269->85284 85285 405e5c GetFileAttributesW 85269->85285 85288 406c94 42 API calls 85269->85288 85270->85269 85273 406ec9 85271->85273 85272->85269 85275 404f9e 25 API calls 85273->85275 85276 406ed3 85275->85276 85289 406c94 42 API calls 85276->85289 85279->85235 85280->85262 85281->85269 85283->85243 85284->85269 85286 405e79 DeleteFileW 85285->85286 85287 405e6b SetFileAttributesW 85285->85287 85286->85269 85287->85286 85288->85269 85289->85279 85290 6cfe0247 85291 6cf8c980 codecvt 66 API calls 85290->85291 85292 6cfe026e 85291->85292 85293 401eb9 85294 401f24 85293->85294 85295 401ec6 85293->85295 85297 401f53 GlobalAlloc 85294->85297 85298 401f28 85294->85298 85296 401ed5 85295->85296 85301 401ef7 85295->85301 85299 4062cf 11 API calls 85296->85299 85300 406831 18 API calls 85297->85300 85302 4062cf 11 API calls 85298->85302 85307 401f36 85298->85307 85309 401ee2 85299->85309 85308 401f46 85300->85308 85315 406035 lstrcpynW 85301->85315 85302->85307 85304 402708 85305 402387 GlobalFree 85305->85304 85317 406035 lstrcpynW 85307->85317 85308->85304 85308->85305 85309->85304 85311 406831 18 API calls 85309->85311 85310 401f06 85316 406035 lstrcpynW 85310->85316 85311->85309 85313 401f15 85318 406035 lstrcpynW 85313->85318 85315->85310 85316->85313 85317->85308 85318->85304 85319 6f952728 85320 6f952773 85319->85320 85321 6f952738 VirtualProtect 85319->85321 85321->85320 85322 4019fd 85323 40145c 18 API calls 85322->85323 85324 401a04 85323->85324 85325 405eab 2 API calls 85324->85325 85326 401a0b 85325->85326 85327 6cfd2d00 85371 6cfd2c80 85327->85371 85331 6cfd2d33 85339 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85331->85339 85332 6cfd2d9b 85335 6cfd2da7 85332->85335 85336 6cfd2dd1 85332->85336 85334 6cfd2de6 SetWindowPos 85337 6cfd2dcc 85334->85337 85335->85334 85338 6cfd2db3 85335->85338 85336->85337 85348 6cfd3200 207 API calls 85336->85348 85407 6cf8be80 85337->85407 85344 6cfd2dbc 85338->85344 85345 6cfd2e06 GetWindowRect 85338->85345 85349 6cfd318a 85339->85349 85340 6cfd2f20 85340->85337 85350 6cfd2f30 GetWindowRect 85340->85350 85341 6cfd2fc0 85341->85337 85352 6cfd2fdc ShowWindow 85341->85352 85367 6cfd3000 85341->85367 85342 6cfd30a2 85342->85337 85383 6cfd3200 85342->85383 85343 6cfd30e2 85343->85337 85355 6cfd3115 85343->85355 85356 6cfd30f4 ShowWindow 85343->85356 85344->85337 85351 6cfd2c80 77 API calls 85344->85351 85346 6cfd2e58 SetWindowPos 85345->85346 85347 6cfd2e25 SetWindowPos 85345->85347 85354 6cfd2e97 85346->85354 85347->85354 85348->85337 85357 6cfd2f7c SetWindowPos 85350->85357 85358 6cfd2f49 SetWindowPos 85350->85358 85359 6cfd3161 85351->85359 85352->85337 85360 6cfd2ee2 85354->85360 85361 6cfd2ea2 85354->85361 85355->85337 85362 6cfd3121 ShowWindow 85355->85362 85356->85337 85357->85337 85358->85337 85414 6cfd4d20 67 API calls 85359->85414 85360->85337 85366 6cfd2efc ShowWindow 85360->85366 85361->85337 85364 6cfd2eba ShowWindow 85361->85364 85362->85337 85364->85337 85365 6cfd3054 85365->85337 85369 6cfd3075 ShowWindow 85365->85369 85366->85337 85367->85337 85367->85365 85368 6cfd3200 207 API calls 85367->85368 85368->85365 85369->85337 85372 6cfd2caf 85371->85372 85373 6cfd2cd9 85371->85373 85415 6cfd4ba0 77 API calls 85372->85415 85377 6cfd4bd0 85373->85377 85375 6cfd2ccf 85416 6cf7bfff 76 API calls _Error_objects 85375->85416 85378 6cfd4be5 85377->85378 85382 6cfd2d23 85378->85382 85417 6cfd6510 77 API calls 85378->85417 85380 6cfd4c52 85418 6cfd58e0 67 API calls 85380->85418 85382->85331 85382->85332 85382->85334 85382->85337 85382->85340 85382->85341 85382->85342 85382->85343 85384 6cfd3227 85383->85384 85402 6cfd3236 85383->85402 85385 6cfd323b GetWindowRect 85384->85385 85384->85402 85387 6cfd3257 _memset codecvt 85385->85387 85386 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85388 6cfd35d4 85386->85388 85389 6cfd334b 85387->85389 85387->85402 85424 6cfd31c0 GetLastError FormatMessageW LocalFree 85387->85424 85388->85337 85391 6cfd3361 SelectObject GetLastError 85389->85391 85425 6cfd31c0 GetLastError FormatMessageW LocalFree 85389->85425 85393 6cfd337c 85391->85393 85394 6cfd3381 85391->85394 85419 6cfd31c0 GetLastError FormatMessageW LocalFree 85393->85419 85396 6cfd349a _memset 85394->85396 85397 6cfd3393 std::_DebugHeapString::_DebugHeapString 85394->85397 85427 6cfd35e0 5 API calls codecvt 85396->85427 85420 6cf9f890 85397->85420 85400 6cfd34c3 MoveWindow UpdateLayeredWindow SelectObject DeleteObject DeleteDC 85400->85402 85401 6cfd33de 85401->85402 85403 6cfd33f2 85401->85403 85402->85386 85426 6cfbad50 43 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 85403->85426 85406 6cfd3495 85406->85400 85408 6cf8bec2 85407->85408 85409 6cf8be96 85407->85409 85408->85409 85410 6cf8bee0 85408->85410 85411 6cf8bf24 85409->85411 85658 6cf63be0 85409->85658 85410->85411 85703 6cf8b770 IsWindow 85410->85703 85411->85331 85414->85337 85415->85375 85416->85373 85417->85380 85418->85382 85419->85394 85421 6cf9f8a5 85420->85421 85423 6cf9f8cd codecvt 85421->85423 85428 6cf9f920 85421->85428 85423->85401 85424->85389 85425->85391 85426->85406 85427->85400 85429 6cf9f92f 85428->85429 85455 6cf9f939 85428->85455 85430 6cf9f94d lstrlenW 85429->85430 85431 6cf9f9a7 85429->85431 85429->85455 85430->85431 85432 6cf9f95b 85430->85432 85459 6cfbabc0 85431->85459 85475 6cf7e9db 79 API calls __isdigit_l 85432->85475 85435 6cf9f967 85436 6cf9f99f 85435->85436 85476 6d0185fc 85435->85476 85438 6cf8cc60 69 API calls 85436->85438 85441 6cf9f9eb codecvt _memmove 85436->85441 85436->85455 85438->85441 85443 6cf9faab codecvt 85441->85443 85445 6cf9fb10 codecvt 85441->85445 85441->85455 85442 6cf9fae0 85482 6cf8d9c0 77 API calls 3 library calls 85442->85482 85443->85442 85480 6cfbaae0 67 API calls codecvt 85443->85480 85444 6cf9fb4d 85486 6cf8d9c0 77 API calls 3 library calls 85444->85486 85445->85444 85484 6cfbaae0 67 API calls codecvt 85445->85484 85449 6cf9facf 85481 6cf8dbb0 66 API calls codecvt 85449->85481 85451 6cf9faf2 85451->85455 85483 6cfbaae0 67 API calls codecvt 85451->85483 85452 6cf9fb38 85485 6cf8dbb0 66 API calls codecvt 85452->85485 85454 6cf9fb63 85454->85455 85487 6cfbaae0 67 API calls codecvt 85454->85487 85455->85423 85460 6cfbabf8 85459->85460 85472 6cfbabf1 85459->85472 85461 6cf8c900 69 API calls 85460->85461 85463 6cfbac09 85461->85463 85462 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85464 6cfbacbe 85462->85464 85465 6cfbac53 std::_DebugHeapString::_DebugHeapString 85463->85465 85466 6cf6e640 95 API calls 85463->85466 85464->85436 85488 6cfb9b30 85465->85488 85467 6cfbac1f 85466->85467 85470 6cf8cc60 69 API calls 85467->85470 85469 6cfbac88 85471 6cf8c980 codecvt 66 API calls 85469->85471 85473 6cfbac32 codecvt 85470->85473 85471->85472 85472->85462 85473->85465 85474 6cf8cc60 69 API calls 85473->85474 85474->85465 85475->85435 85643 6d01843a 85476->85643 85479 6cfbacd0 133 API calls 85479->85436 85480->85449 85481->85442 85482->85451 85483->85455 85484->85452 85485->85444 85486->85454 85487->85455 85544 6cfb9b6a codecvt std::_DebugHeapString::_DebugHeapString _memmove 85488->85544 85489 6cfb9faf FindResourceW 85491 6cfb9fd8 LoadResource 85489->85491 85557 6cfb9d95 85489->85557 85490 6cf8c940 69 API calls 85490->85544 85492 6cfb9ffb FreeResource 85491->85492 85493 6cfba00a SizeofResource 85491->85493 85492->85557 85493->85544 85493->85557 85494 6cfba14f 85527 6cfba155 _Error_objects 85494->85527 85558 6cfa4530 85494->85558 85495 6cfba081 CreateFileW 85496 6cfba0b1 GetFileSize 85495->85496 85505 6cfba0ac codecvt 85495->85505 85499 6cfba0ce codecvt 85496->85499 85496->85505 85497 6cfba032 LockResource 85497->85544 85503 6cfba0e1 ReadFile CloseHandle 85499->85503 85500 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85502 6cfba487 85500->85502 85501 6cfba05f FreeResource 85501->85544 85502->85469 85503->85505 85505->85494 85506 6cf8ce30 std::_DebugHeapString::_DebugHeapString 69 API calls 85506->85544 85507 6cfb9ba3 codecvt std::_DebugHeapString::_DebugHeapString 85508 6cfb9bcf CreateFileW 85507->85508 85515 6cfb9c3e ReadFile CloseHandle 85507->85515 85507->85544 85567 6cf8ce60 69 API calls std::_DebugHeapString::_DebugHeapString 85507->85567 85509 6cfb9bfc GetFileSize 85508->85509 85510 6cfb9be5 85508->85510 85509->85507 85511 6cfb9c14 85509->85511 85512 6cf8c980 codecvt 66 API calls 85510->85512 85513 6cf8c980 codecvt 66 API calls 85511->85513 85514 6cfb9bf7 85512->85514 85513->85514 85514->85557 85515->85507 85517 6cfb9c86 codecvt 85515->85517 85521 6cf8c980 codecvt 66 API calls 85517->85521 85521->85514 85523 6cfa1250 2 API calls 85523->85544 85524 6cfb9d74 85525 6cf8c980 codecvt 66 API calls 85524->85525 85528 6cfb9d83 85525->85528 85526 6cf8c900 69 API calls 85526->85544 85527->85500 85531 6cf8c980 codecvt 66 API calls 85528->85531 85529 6cf8d200 69 API calls 85529->85544 85530 6cfdf420 88 API calls 85530->85544 85531->85557 85532 6cfdf440 85 API calls 85532->85544 85533 6cfb9dfd 85534 6cf8c980 codecvt 66 API calls 85533->85534 85536 6cfb9e0c 85534->85536 85535 6cfb9e41 85537 6cf8c980 codecvt 66 API calls 85535->85537 85539 6cf8c980 codecvt 66 API calls 85536->85539 85538 6cfb9e50 85537->85538 85540 6cf8c980 codecvt 66 API calls 85538->85540 85542 6cfb9e1b 85539->85542 85543 6cfb9e5f 85540->85543 85541 6cfdf520 94 API calls 85541->85544 85545 6cf8c980 codecvt 66 API calls 85542->85545 85546 6cf8c980 codecvt 66 API calls 85543->85546 85544->85489 85544->85490 85544->85497 85544->85501 85544->85506 85544->85507 85544->85523 85544->85524 85544->85526 85544->85529 85544->85530 85544->85532 85544->85533 85544->85535 85544->85541 85547 6cf8c980 66 API calls codecvt 85544->85547 85548 6cfdf540 67 API calls 85544->85548 85549 6cfb9eca codecvt 85544->85549 85544->85557 85545->85557 85546->85557 85547->85544 85548->85544 85550 6cfb9f01 85549->85550 85551 6cfdf540 67 API calls 85549->85551 85552 6cf8c980 codecvt 66 API calls 85550->85552 85551->85550 85553 6cfb9f13 85552->85553 85554 6cf8c980 codecvt 66 API calls 85553->85554 85555 6cfb9f22 85554->85555 85556 6cf8c980 codecvt 66 API calls 85555->85556 85556->85557 85557->85494 85557->85495 85559 6cfa4557 85558->85559 85568 6cfa41d0 85559->85568 85567->85507 85571 6cfa4320 85568->85571 85602 6cfada00 85571->85602 85603 6cfada0d __write_nolock 85602->85603 85622 6cfa48d0 85603->85622 85623 6cfa4930 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 85622->85623 85624 6cfa48ff 85623->85624 85625 6cfacc60 85624->85625 85629 6cfacc79 85625->85629 85647 6d01844c 85643->85647 85644 6d018452 85654 6cf7ef1d 66 API calls __getptd_noexit 85644->85654 85646 6d01847b 85652 6d018497 wcstoxl 85646->85652 85656 6cf88e16 GetStringTypeW 85646->85656 85647->85644 85647->85646 85648 6d018457 85655 6cf80403 11 API calls strtoxl 85648->85655 85651 6cf9f984 85651->85479 85652->85651 85657 6cf7ef1d 66 API calls __getptd_noexit 85652->85657 85654->85648 85655->85651 85656->85646 85657->85651 85659 6cf63c3c 85658->85659 85660 6cf63c0b 85658->85660 85661 6cf63c15 85659->85661 85662 6cf63c41 85659->85662 85660->85661 85691 6cf63d52 std::bad_exception::~bad_exception 85660->85691 85714 6cf8c0d0 PostMessageW 85661->85714 85663 6cf63c4d 85662->85663 85664 6cf63d4a 85662->85664 85667 6cf63c5a GetCursorPos GetClientRect ScreenToClient 85663->85667 85663->85691 85672 6cf63d77 85664->85672 85673 6cf63e45 85664->85673 85664->85691 85670 6cf63ccc 85667->85670 85669 6cf63c23 85674 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85669->85674 85680 6cf63d25 InvalidateRect 85670->85680 85681 6cf63cda GetWindowRect SetWindowPos 85670->85681 85671 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85677 6cf63f93 85671->85677 85678 6cf63d85 GetClientRect GetCursorPos ScreenToClient 85672->85678 85672->85691 85675 6cf63e8f 85673->85675 85676 6cf63e4a 85673->85676 85679 6cf63c36 85674->85679 85675->85669 85689 6cf63e9b 85675->85689 85682 6cf63e57 85676->85682 85676->85691 85677->85411 85683 6cf63e02 85678->85683 85679->85411 85680->85691 85681->85680 85684 6cf94b80 475 API calls 85682->85684 85685 6cf63e2f InvalidateRect 85683->85685 85686 6cf63e0c codecvt 85683->85686 85688 6cf63e62 73A1A570 85684->85688 85685->85691 85715 6cf70720 153 API calls 2 library calls 85686->85715 85687 6cf63f00 85687->85691 85697 6cf63f2f 85687->85697 85716 6cf6dec0 142 API calls 4 library calls 85688->85716 85689->85687 85689->85691 85694 6cf63ed6 85689->85694 85704 6cf94b80 85691->85704 85692 6cf63e78 85695 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85692->85695 85699 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85694->85699 85698 6cf63e89 85695->85698 85696 6cf63e2c 85696->85685 85700 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85697->85700 85698->85411 85701 6cf63efa 85699->85701 85702 6cf63f4a 85700->85702 85701->85411 85702->85411 85703->85411 85705 6cf94ba6 85704->85705 85706 6cf94bda 85704->85706 85705->85706 85717 6cf94710 85705->85717 85707 6cf63f85 85706->85707 85757 6cf63610 85706->85757 85707->85671 85714->85669 85715->85696 85716->85692 85718 6cf9474e codecvt 85717->85718 85824 6cf973c0 85718->85824 85758 6cf636b8 85757->85758 85759 6cf63649 85757->85759 85769 6cf6368d 85758->85769 87580 6cf9c9e0 GetClientRect UnionRect InvalidateRect 85758->87580 85760 6cf8c900 69 API calls 85759->85760 85765 6cf6365b 85760->85765 85761 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85763 6cf63755 85761->85763 85763->85707 85772 6cf980f0 85763->85772 85764 6cf636c7 codecvt 85766 6cf636ce KiUserCallbackDispatcher 85764->85766 85767 6cf8c980 codecvt 66 API calls 85765->85767 85768 6cf8c900 69 API calls 85766->85768 85767->85769 85770 6cf636e7 85768->85770 85769->85761 85771 6cf8c980 codecvt 66 API calls 85770->85771 85771->85769 85776 6cf98137 codecvt 85772->85776 85782 6cf98130 85772->85782 85773 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 85774 6cf94f59 85773->85774 85774->85707 85823 6cf8c100 CallWindowProcW 85774->85823 85775 6cf982cf 85777 6cf98334 85775->85777 85780 6cf9c6c0 85775->85780 85779 6cf9828c 85776->85779 85790 6cf981b3 85776->85790 85778 6cf98383 85777->85778 85777->85782 85793 6cf9a35f 85777->85793 85778->85782 85783 6cf983c9 85778->85783 85784 6cf9a6e5 85778->85784 85779->85775 85779->85782 85785 6cf982d1 IsIconic 85779->85785 85781 6cf9c6c8 SendMessageW 85780->85781 85780->85782 85786 6cf9a895 85781->85786 85782->85773 85789 6cf99e19 85783->85789 85813 6cf983d9 codecvt 85783->85813 85787 6cf9a71a 85784->85787 85788 6cf9a6f4 SendMessageW 85784->85788 85785->85775 85785->85782 85786->85782 85787->85782 85791 6cf9a72f GetCursorPos GetWindowRect IsIconic 85787->85791 85788->85787 85789->85782 85792 6cf99e2d GetClientRect SaveDC 85789->85792 85790->85782 85796 6cf98236 ScreenToClient 85790->85796 85794 6cf9a7a1 GetActiveWindow 85791->85794 85795 6cf9a897 SendMessageW 85791->85795 85799 6cf99e97 85792->85799 85793->85782 85797 6cf9a3d3 GetTickCount 85793->85797 85810 6cf9a490 codecvt 85793->85810 85794->85795 85798 6cf9a7b9 PtInRect 85794->85798 85795->85782 85796->85782 87583 6cf98060 GetKeyState GetKeyState GetKeyState GetKeyState GetKeyState 85797->87583 85798->85795 85801 6cf9a7dc SendMessageW 85798->85801 85802 6cf99f73 RestoreDC 85799->85802 85803 6cf99ea3 GetWindow 85799->85803 85806 6cf9a879 SendMessageW 85801->85806 85807 6cf9a81f ScreenToClient SendMessageW 85801->85807 85802->85782 85804 6cf99ebe 85803->85804 85804->85802 85808 6cf99ecb GetWindowRect MapWindowPoints SetWindowOrgEx SendMessageW GetWindow 85804->85808 85805 6cf9a460 85805->85810 85806->85786 85807->85786 85808->85804 85809 6cf8c510 codecvt 66 API calls 85822 6cf9847b std::bad_exception::~bad_exception codecvt 85809->85822 85811 6cf9a4c6 85810->85811 85814 6cf9a4ea _memset std::_DebugHeapString::_DebugHeapString 85810->85814 85812 6cf8c980 codecvt 66 API calls 85811->85812 85812->85782 85813->85782 85813->85809 85815 6cf9a5c4 CreateWindowExW SendMessageW 85814->85815 85816 6cf9a667 IsWindowVisible 85814->85816 85820 6cf9a64c SendMessageW 85815->85820 85817 6cf9a6cc 85816->85817 85818 6cf9a67e SendMessageW SendMessageW 85816->85818 85819 6cf8c980 codecvt 66 API calls 85817->85819 85818->85817 85819->85782 85820->85816 85821 6cf8c980 66 API calls codecvt 85821->85822 85822->85782 85822->85821 85823->85707 85915 6cf8d720 85824->85915 85826 6cf973d7 85919 6cf9f460 85826->85919 85916 6cf8d735 codecvt 85915->85916 85917 6cf8d7b7 _memset codecvt 85915->85917 85916->85917 85918 6cf8c980 codecvt 66 API calls 85916->85918 85917->85826 85918->85916 85929 6cf9f475 codecvt 85919->85929 85930 6cf9f52c codecvt 85919->85930 85920 6cf9f5e0 85922 6cf8d700 codecvt 66 API calls 85920->85922 85921 6cf9f51d 85984 6cf8d700 85921->85984 85924 6cf973e1 85922->85924 85931 6cf9fb90 85924->85931 85925 6cf9f58d DeleteObject 85925->85930 85926 6cf9f4ca DeleteObject 85926->85929 85927 6cf8c980 codecvt 66 API calls 85927->85929 85928 6cf8c980 codecvt 66 API calls 85928->85930 85929->85921 85929->85926 85929->85927 85930->85920 85930->85925 85930->85928 85932 6cf9fc0e codecvt 85931->85932 85933 6cf9fba1 codecvt 85931->85933 85935 6cf9fc7b 85932->85935 85988 6cfbaae0 67 API calls codecvt 85932->85988 85934 6cf9fc02 85933->85934 85987 6cfbaae0 67 API calls codecvt 85933->85987 85936 6cf8d700 codecvt 66 API calls 85934->85936 85937 6cf8d700 codecvt 66 API calls 85935->85937 85938 6cf973eb 85936->85938 85937->85938 85941 6cfa0b70 85938->85941 85947 6cfa0b85 codecvt 85941->85947 85948 6cfa0c23 codecvt 85941->85948 85942 6cfa0c14 85944 6cf8d700 codecvt 66 API calls 85942->85944 85943 6cfa0cbe 85945 6cf8d700 codecvt 66 API calls 85943->85945 85946 6cf973f5 85944->85946 85945->85946 85951 6cfa0160 85946->85951 85947->85942 85950 6cf8c980 codecvt 66 API calls 85947->85950 85948->85943 85949 6cf8c980 codecvt 66 API calls 85948->85949 85949->85948 85950->85947 85957 6cfa0219 codecvt 85951->85957 85960 6cfa0175 codecvt 85951->85960 85952 6cfa020a 85954 6cf8d700 codecvt 66 API calls 85952->85954 85953 6cfa02ba 85955 6cf8d700 codecvt 66 API calls 85953->85955 85956 6cf973ff 85954->85956 85955->85956 85961 6cfa02d0 85956->85961 85957->85953 85958 6cf8c980 codecvt 66 API calls 85957->85958 85958->85957 85959 6cf8c980 codecvt 66 API calls 85959->85960 85960->85952 85960->85959 85985 6cf8d720 codecvt 66 API calls 85984->85985 85986 6cf8d716 85985->85986 85986->85924 85987->85933 85988->85932 87581 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87580->87581 87582 6cf9ca54 87581->87582 87582->85764 87583->85805 87584 6cfe36c0 87585 6cf7c861 std::locale::facet::_Facet_Register 77 API calls 87584->87585 87586 6cfe36ef 87585->87586 87588 6cfe370a 87586->87588 87589 6cfe3740 66 API calls _memset 87586->87589 87589->87588 87590 6cf98747 87591 6cf987cf GetClientRect GetUpdateRect 87590->87591 87592 6cf98756 _memset 87590->87592 87593 6cf9884c 87591->87593 87648 6cf98845 87591->87648 87594 6cf98770 BeginPaint 87592->87594 87600 6cf9886a 87593->87600 87670 6cf9d940 87593->87670 87682 6cfbcdc0 87594->87682 87596 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87599 6cf9c75a 87596->87599 87598 6cf987ab EndPaint 87598->87648 87601 6cf988c4 IsRectEmpty 87600->87601 87606 6cf98cd8 _memset 87600->87606 87602 6cf98cd3 KiUserCallbackDispatcher 87601->87602 87603 6cf988e6 IsIconic 87601->87603 87602->87606 87603->87602 87604 6cf98901 87603->87604 87607 6cf98adb 87604->87607 87608 6cf9891d 87604->87608 87605 6cf98e8e UnionRect 87613 6cf98eca _memset 87605->87613 87606->87605 87606->87613 87610 6cf8c510 codecvt 66 API calls 87607->87610 87611 6cf9895c DeleteDC 87608->87611 87612 6cf9896f 87608->87612 87609 6cf98f9d BeginPaint 87614 6cf99cab SaveDC 87609->87614 87615 6cf98fcf SelectObject SaveDC 87609->87615 87624 6cf989d5 codecvt 87610->87624 87611->87612 87616 6cf9897e DeleteDC 87612->87616 87617 6cf98991 87612->87617 87613->87609 87627 6cf99cfc codecvt 87614->87627 87622 6cf99023 87615->87622 87616->87617 87618 6cf989a0 DeleteObject 87617->87618 87619 6cf989b3 87617->87619 87618->87619 87621 6cf989c2 DeleteObject 87619->87621 87619->87624 87620 6cf990f9 codecvt 87626 6cf99406 codecvt 87620->87626 87634 6cf9914d IsWindow 87620->87634 87683 6cf9dd30 8 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 87620->87683 87621->87624 87676 6cfc9d00 87622->87676 87623 6cf99d7a RestoreDC 87625 6cf99d94 EndPaint 87623->87625 87624->87602 87632 6cf9de00 79 API calls 87624->87632 87628 6cf99dbb 87625->87628 87629 6cf99484 RestoreDC 87626->87629 87627->87623 87640 6cf9c9e0 8 API calls 87628->87640 87641 6cf99de4 87628->87641 87630 6cf994b3 GetWindowRect 87629->87630 87631 6cf99b82 73A24D40 87629->87631 87650 6cf994fc codecvt 87630->87650 87633 6cf99bdd SelectObject 87631->87633 87635 6cf98c74 87632->87635 87637 6cf99c0c 87633->87637 87638 6cf99ca6 87633->87638 87634->87620 87639 6cf99196 IsWindowVisible 87634->87639 87636 6cf98cb5 87635->87636 87642 6cf98c96 87635->87642 87643 6cfd3200 207 API calls 87636->87643 87637->87638 87645 6cf99c21 SelectObject GetStockObject SelectObject Rectangle SelectObject 87637->87645 87638->87625 87639->87620 87640->87641 87644 6cf9de00 79 API calls 87641->87644 87641->87648 87646 6cf9c9e0 8 API calls 87642->87646 87643->87602 87644->87648 87645->87638 87646->87648 87648->87596 87649 6cf991d4 IntersectRect 87649->87620 87665 6cf99216 _memset 87649->87665 87651 6cf99762 87650->87651 87652 6cf99767 _memset 87650->87652 87653 6cf9962a _memset 87650->87653 87651->87633 87655 6cf998a4 87651->87655 87652->87651 87654 6cfb8e50 9 API calls 87652->87654 87658 6cf996aa SelectObject 87653->87658 87656 6cf997ec 87654->87656 87659 6cfbcbb0 193 API calls 87656->87659 87657 6cf9929c SelectObject SendMessageW 87657->87665 87684 6cfb8e50 GetClipBox CreateRectRgnIndirect CreateRectRgnIndirect ExtSelectClipRgn 87658->87684 87661 6cf99825 87659->87661 87694 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87661->87694 87662 6cf99388 73A24D40 SelectObject DeleteObject DeleteDC 87662->87620 87665->87657 87665->87662 87671 6cf9d984 87670->87671 87672 6cf9d957 87670->87672 87674 6cf9da4e 87671->87674 87675 6cf9d1d0 83 API calls 87671->87675 87672->87671 87673 6cf9d95f InvalidateRect 87672->87673 87673->87674 87674->87600 87675->87674 87677 6cfc9d0f 87676->87677 87678 6cfc9d13 IntersectRect 87676->87678 87677->87620 87678->87677 87679 6cfc9d38 87678->87679 87695 6cfc9d70 87679->87695 87720 6cfcd9e0 IntersectRect 87679->87720 87682->87598 87683->87649 87685 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87684->87685 87686 6cf99715 87685->87686 87687 6cfbcbb0 87686->87687 87688 6cfbcbd2 87687->87688 87691 6cfbcbc6 87687->87691 87689 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87688->87689 87690 6cf9974d 87689->87690 87693 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87690->87693 87691->87688 88057 6cfb9010 87691->88057 87693->87651 87694->87651 87696 6cfc9e25 87695->87696 87697 6cfc9da8 87695->87697 87698 6cfc9e82 87696->87698 87701 6cfc9f88 87696->87701 87700 6cf9d110 78 API calls 87697->87700 87896 6cfb8ef0 12 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 87698->87896 87702 6cfc9dd1 87700->87702 87789 6cfca220 87701->87789 87894 6cfa25e0 MulDiv MulDiv 87702->87894 87704 6cfc9dd8 87706 6cf9d110 78 API calls 87704->87706 87708 6cfc9e1e 87706->87708 87707 6cfc9fc4 87860 6cfe28c0 87707->87860 87878 6cfa3990 87707->87878 87895 6cfa23d0 7 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 87708->87895 87710 6cfc9f83 87712 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87710->87712 87711 6cfc9ee5 87897 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87711->87897 87714 6cfca02b 87712->87714 87714->87677 87721 6cfcda49 87720->87721 87722 6cfcda42 87720->87722 87723 6cfb8e50 9 API calls 87721->87723 87724 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87722->87724 87725 6cfcda79 87723->87725 87726 6cfce1c3 87724->87726 87727 6cfc9d70 319 API calls 87725->87727 87726->87677 87737 6cfcda93 codecvt 87727->87737 87728 6cfce192 88056 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87728->88056 87730 6cfcdd22 87733 6cfcdfec 87730->87733 87734 6cfce00d IntersectRect 87730->87734 87735 6cfce097 87730->87735 87731 6cfcdbd5 IntersectRect 87732 6cfcdd2c 87731->87732 87755 6cfcdbef codecvt 87731->87755 87736 6cfb8e50 9 API calls 87732->87736 88052 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87733->88052 87734->87735 87744 6cfce03f 87734->87744 87735->87728 87739 6cfce0ea 87735->87739 87740 6cfce10b IntersectRect 87735->87740 87760 6cfcdd59 codecvt 87736->87760 87737->87730 87737->87731 88054 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87739->88054 87740->87728 87745 6cfce13d 87740->87745 87744->87735 87746 6cfce076 87744->87746 87745->87728 87748 6cfce174 87745->87748 88053 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87746->88053 87747 6cfcdeff 88051 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87747->88051 88055 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87748->88055 87751 6cfcdc3b 88042 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87751->88042 87754 6cfcddbd 88044 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87754->88044 87755->87730 87755->87751 87759 6cfcdc82 IntersectRect 87755->87759 87763 6cfcdcbe IntersectRect 87755->87763 87757 6cfcddd0 88045 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87757->88045 87759->87755 87760->87747 87760->87754 87761 6cfcde1f IntersectRect 87760->87761 87761->87760 87762 6cfcde37 87761->87762 87764 6cfcde58 IntersectRect 87762->87764 87765 6cfcdf07 IntersectRect 87762->87765 87763->87755 87766 6cfcdcde 87763->87766 87769 6cfcde87 87764->87769 87770 6cfcdf2d 87765->87770 87766->87730 87772 6cfcdd01 87766->87772 88041 6cfb8fd0 SelectClipRgn 87769->88041 87788 6cfc9d00 326 API calls 87770->87788 88043 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87772->88043 87774 6cfcde99 87787 6cfc9d00 326 API calls 87774->87787 87775 6cfcdf54 87775->87747 87776 6cfcdf5b 87775->87776 88049 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87776->88049 87777 6cfcdebe 87779 6cfcdec5 87777->87779 87780 6cfcdef2 87777->87780 88046 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87779->88046 88048 6cfb8ff0 SelectClipRgn 87780->88048 87781 6cfcdf6e 88050 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87781->88050 87785 6cfcded8 88047 6cfb8e10 SelectClipRgn DeleteObject DeleteObject 87785->88047 87787->87777 87788->87775 87791 6cfca235 codecvt std::_DebugHeapString::_DebugHeapString 87789->87791 87790 6cfc9fb0 87793 6cfe2e30 87790->87793 87830 6cfa33b0 87790->87830 87791->87790 87898 6cfc6b20 87791->87898 87794 6cfe2e72 codecvt 87793->87794 87795 6cf959a0 66 API calls 87794->87795 87798 6cfe332f 87794->87798 87796 6cfe2e9b std::_DebugHeapString::_DebugHeapString 87795->87796 87943 6cf95a40 97 API calls 7 library calls 87796->87943 87799 6cfe33e7 IsWindowEnabled 87798->87799 87801 6cfe33f2 87799->87801 87800 6cfe2ece std::_DebugHeapString::_DebugHeapString 87804 6cf9f890 153 API calls 87800->87804 87802 6cfe341e codecvt std::_DebugHeapString::_DebugHeapString 87801->87802 87803 6cfe346c 87801->87803 87811 6cfc6b20 202 API calls 87802->87811 87816 6cfe3459 codecvt std::_DebugHeapString::_DebugHeapString 87802->87816 87805 6cfe34cb 87803->87805 87809 6cfe347d codecvt std::_DebugHeapString::_DebugHeapString 87803->87809 87820 6cfe2f05 codecvt std::_DebugHeapString::_DebugHeapString 87804->87820 87808 6cfe34dc codecvt std::_DebugHeapString::_DebugHeapString 87805->87808 87812 6cfe3527 codecvt std::_DebugHeapString::_DebugHeapString 87805->87812 87806 6cfe331a 87944 6cf96e10 66 API calls codecvt 87806->87944 87815 6cfc6b20 202 API calls 87808->87815 87808->87816 87813 6cfc6b20 202 API calls 87809->87813 87809->87816 87810 6cfe3462 87814 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87810->87814 87811->87816 87812->87816 87819 6cfc6b20 202 API calls 87812->87819 87813->87816 87817 6cfe35ce 87814->87817 87815->87816 87816->87810 87818 6cfc6b20 202 API calls 87816->87818 87817->87707 87818->87810 87819->87816 87820->87806 87821 6cfe3070 std::_DebugHeapString::_DebugHeapString 87820->87821 87823 6cf8d410 105 API calls 87820->87823 87822 6cfe3197 std::_DebugHeapString::_DebugHeapString 87821->87822 87825 6cf8d410 105 API calls 87821->87825 87824 6cfe3259 std::_DebugHeapString::_DebugHeapString 87822->87824 87826 6cf8d410 105 API calls 87822->87826 87823->87821 87824->87806 87827 6cf8d410 105 API calls 87824->87827 87828 6cfe312e std::_DebugHeapString::_DebugHeapString 87825->87828 87826->87824 87827->87806 87829 6cf8d410 105 API calls 87828->87829 87829->87822 87831 6cfa33ed 87830->87831 87832 6cfa38f5 87831->87832 87835 6cfa33f8 codecvt 87831->87835 87833 6cfe2e30 229 API calls 87832->87833 87834 6cfa385a 87833->87834 87837 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87834->87837 87836 6cfa3805 codecvt 87835->87836 87839 6cf959a0 66 API calls 87835->87839 87841 6cfa382e std::_DebugHeapString::_DebugHeapString 87836->87841 87843 6cfa3861 codecvt std::_DebugHeapString::_DebugHeapString 87836->87843 87838 6cfa391a 87837->87838 87838->87707 87840 6cfa3432 std::_DebugHeapString::_DebugHeapString 87839->87840 87945 6cf95a40 97 API calls 7 library calls 87840->87945 87845 6cfc6b20 202 API calls 87841->87845 87842 6cfa3851 codecvt std::_DebugHeapString::_DebugHeapString 87842->87834 87846 6cfc6b20 202 API calls 87842->87846 87843->87842 87847 6cfc6b20 202 API calls 87843->87847 87845->87842 87846->87834 87847->87842 87848 6cfa3465 std::_DebugHeapString::_DebugHeapString 87849 6cf9f890 153 API calls 87848->87849 87851 6cfa349c codecvt std::_DebugHeapString::_DebugHeapString 87849->87851 87852 6cf8d410 105 API calls 87851->87852 87853 6cfa3607 std::_DebugHeapString::_DebugHeapString 87851->87853 87857 6cfa37f0 87851->87857 87852->87853 87854 6cfa372e std::_DebugHeapString::_DebugHeapString 87853->87854 87855 6cf8d410 105 API calls 87853->87855 87856 6cf8d410 105 API calls 87854->87856 87854->87857 87858 6cfa36c5 std::_DebugHeapString::_DebugHeapString 87855->87858 87856->87857 87946 6cf96e10 66 API calls codecvt 87857->87946 87859 6cf8d410 105 API calls 87858->87859 87859->87854 87861 6cfe2907 codecvt 87860->87861 87862 6cfe2a37 87861->87862 87863 6cfe2a20 87861->87863 87866 6cf9d110 78 API calls 87862->87866 87864 6cf8c980 codecvt 66 API calls 87863->87864 87865 6cfe2a32 87864->87865 87868 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87865->87868 87867 6cfe2a78 87866->87867 87947 6cfa2480 87867->87947 87870 6cfe2d22 87868->87870 87870->87710 87871 6cfe2a7f 87879 6cfa3c93 87878->87879 87884 6cfa39d6 codecvt 87878->87884 87880 6cfe28c0 172 API calls 87879->87880 87881 6cfa3ad5 87880->87881 87882 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87881->87882 87883 6cfa3cb7 87882->87883 87883->87710 87885 6cfa3ada 87884->87885 87886 6cfa3ac3 87884->87886 87888 6cfa3bec std::_DebugHeapString::_DebugHeapString 87885->87888 87889 6cfa3b5b std::_DebugHeapString::_DebugHeapString 87885->87889 87887 6cf8c980 codecvt 66 API calls 87886->87887 87887->87881 87891 6cfbddd0 96 API calls 87888->87891 88040 6cfbea70 151 API calls 5 library calls 87889->88040 87892 6cfa3be4 87891->87892 87893 6cf8c980 codecvt 66 API calls 87892->87893 87893->87881 87894->87704 87895->87696 87896->87711 87897->87710 87901 6cfbcd70 87898->87901 87902 6cfbcd7a 87901->87902 87906 6cfbcd80 87901->87906 87902->87906 87907 6cf9fcd0 87902->87907 87906->87790 87908 6cf8c900 69 API calls 87907->87908 87909 6cf9fd12 87908->87909 87910 6cf8c900 69 API calls 87909->87910 87911 6cf9fd2a 87910->87911 87930 6cf8cc90 87911->87930 87913 6cf9fe1b 87914 6cf8c980 codecvt 66 API calls 87913->87914 87915 6cf9fe33 87914->87915 87916 6cf8c980 codecvt 66 API calls 87915->87916 87917 6cf9fd47 codecvt std::_DebugHeapString::_DebugHeapString 87917->87913 87919 6cf7c861 std::locale::facet::_Facet_Register 77 API calls 87917->87919 87921 6cf9fd97 87919->87921 87923 6cf9fdb8 87921->87923 87925 6cf959a0 66 API calls 87921->87925 87941 6cf95a40 97 API calls 7 library calls 87923->87941 87925->87923 87931 6cf8c940 69 API calls 87930->87931 87932 6cf8ccdd std::_DebugHeapString::_DebugHeapString 87931->87932 87933 6cf8c9e0 std::_DebugHeapString::_DebugHeapString 69 API calls 87932->87933 87934 6cf8ccf8 87933->87934 87935 6cf8c940 69 API calls 87934->87935 87936 6cf8cd07 87935->87936 87937 6cf8c980 codecvt 66 API calls 87936->87937 87938 6cf8cd25 87937->87938 87939 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 87938->87939 87940 6cf8cd3d 87939->87940 87940->87917 87943->87800 87944->87798 87945->87848 87946->87836 87948 6cfa2330 2 API calls 87947->87948 87949 6cfa249d 87948->87949 87950 6cfa2330 2 API calls 87949->87950 87951 6cfa24b5 87950->87951 87952 6cfa2330 2 API calls 87951->87952 87953 6cfa24c6 87952->87953 87954 6cfa2330 2 API calls 87953->87954 87955 6cfa24da 87954->87955 87955->87871 88040->87892 88041->87774 88042->87722 88043->87722 88044->87757 88045->87722 88046->87785 88047->87722 88048->87747 88049->87781 88050->87722 88051->87730 88052->87722 88053->87722 88054->87722 88055->87722 88056->87722 88059 6cfb9028 codecvt 88057->88059 88058 6cfb902f 88060 6cf7addf __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 5 API calls 88058->88060 88059->88058 88061 6cfb904c std::_DebugHeapString::_DebugHeapString 88059->88061 88063 6cfb906e std::_DebugHeapString::_DebugHeapString 88059->88063 88062 6cfb918d 88060->88062 88064 6cf9f890 153 API calls 88061->88064 88062->87688 88065 6cf9f890 153 API calls 88063->88065 88066 6cfb9069 88064->88066 88065->88066 88066->88058 88067 6cfb90f4 IntersectRect 88066->88067 88067->88058 88068 6cfb910e IntersectRect 88067->88068 88068->88058 88069 6cfb9128 88068->88069 88070 6cfb9137 88069->88070 88073 6cfbad50 43 API calls __ehhandler$?_RunAndWait@_StructuredTaskCollection@details@Concurrency@@QAG?AW4_TaskCollectionStatus@23@PAV_UnrealizedChore@23@@Z 88070->88073 88072 6cfb917e 88072->88058 88073->88072 88074 4029ff 88085 401553 88074->88085 88076 402a09 88077 40145c 18 API calls 88076->88077 88078 402a12 88077->88078 88079 402a1f RegQueryValueExW 88078->88079 88083 401a13 88078->88083 88080 402a45 88079->88080 88081 402a3f 88079->88081 88082 4029e4 RegCloseKey 88080->88082 88080->88083 88081->88080 88089 405f7d wsprintfW 88081->88089 88082->88083 88086 401563 88085->88086 88087 40145c 18 API calls 88086->88087 88088 401589 RegOpenKeyExW 88087->88088 88088->88076 88089->88080 88090 401a1f 88091 40145c 18 API calls 88090->88091 88092 401a26 88091->88092 88093 4062cf 11 API calls 88092->88093 88094 401a49 88093->88094 88095 401a64 88094->88095 88096 401a5c 88094->88096 88144 406035 lstrcpynW 88095->88144 88143 406035 lstrcpynW 88096->88143 88099 401a62 88102 406064 5 API calls 88099->88102 88100 401a6f 88101 40674e 3 API calls 88100->88101 88103 401a75 lstrcatW 88101->88103 88135 401a81 88102->88135 88103->88099 88104 406301 2 API calls 88104->88135 88105 405e5c 2 API calls 88105->88135 88107 401a98 CompareFileTime 88107->88135 88108 401ba9 88109 404f9e 25 API calls 88108->88109 88111 401bb3 88109->88111 88110 401b5d 88112 404f9e 25 API calls 88110->88112 88113 40337f 33 API calls 88111->88113 88114 401b70 88112->88114 88115 401bc6 88113->88115 88117 4062cf 11 API calls 88114->88117 88116 4062cf 11 API calls 88115->88116 88118 401bda 88116->88118 88122 401b8b 88117->88122 88119 401be9 SetFileTime 88118->88119 88120 401bf8 CloseHandle 88118->88120 88119->88120 88120->88122 88123 401c09 88120->88123 88121 406831 18 API calls 88121->88135 88125 401c21 88123->88125 88126 401c0e 88123->88126 88124 406035 lstrcpynW 88124->88135 88128 406831 18 API calls 88125->88128 88127 406831 18 API calls 88126->88127 88130 401c16 lstrcatW 88127->88130 88131 401c29 88128->88131 88130->88131 88132 4062cf 11 API calls 88131->88132 88133 401c34 88132->88133 88146 405ccc MessageBoxIndirectW 88133->88146 88134 401b50 88136 401b93 88134->88136 88137 401b53 88134->88137 88135->88104 88135->88105 88135->88107 88135->88108 88135->88110 88135->88121 88135->88124 88135->88134 88139 4062cf 11 API calls 88135->88139 88142 405e7c GetFileAttributesW CreateFileW 88135->88142 88145 405ccc MessageBoxIndirectW 88135->88145 88141 4062cf 11 API calls 88136->88141 88140 4062cf 11 API calls 88137->88140 88139->88135 88140->88110 88141->88122 88142->88135 88143->88099 88144->88100 88145->88135 88146->88122

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 525 6cf98747-6cf98754 526 6cf987cf-6cf98843 GetClientRect GetUpdateRect 525->526 527 6cf98756-6cf987ca call 6cf83830 BeginPaint call 6cfbcdc0 EndPaint 525->527 529 6cf9884c-6cf9885b 526->529 530 6cf98845-6cf98847 526->530 532 6cf9c745-6cf9c75d call 6cf7addf 527->532 533 6cf9886a-6cf988be call 6cf9d920 * 2 529->533 534 6cf9885d-6cf98865 call 6cf9d940 529->534 530->532 544 6cf98cd8-6cf98ce7 533->544 545 6cf988c4-6cf988e0 IsRectEmpty 533->545 534->533 548 6cf98ced-6cf98cfc 544->548 549 6cf98e22-6cf98e31 544->549 546 6cf98cd3 KiUserCallbackDispatcher 545->546 547 6cf988e6-6cf988fb IsIconic 545->547 546->544 547->546 552 6cf98901-6cf98917 call 6cfc7bc0 547->552 548->549 553 6cf98d02-6cf98d3f 548->553 550 6cf98f08-6cf98f17 549->550 551 6cf98e37-6cf98e70 549->551 557 6cf98f19-6cf98f26 550->557 558 6cf98f83-6cf98fc9 call 6cf83830 BeginPaint 550->558 564 6cf98e8e-6cf98ec8 UnionRect 551->564 565 6cf98e72-6cf98e87 551->565 566 6cf98adb-6cf98b2e call 6cf8c510 552->566 567 6cf9891d-6cf9895a 552->567 555 6cf98d41-6cf98d74 call 6cf83830 553->555 556 6cf98d77-6cf98e1d 553->556 555->556 556->549 557->558 559 6cf98f28-6cf98f7d call 6cfc2030 557->559 576 6cf99cab-6cf99d06 SaveDC 558->576 577 6cf98fcf-6cf9901d SelectObject SaveDC 558->577 559->558 574 6cf98eca-6cf98ed0 564->574 575 6cf98ed6-6cf98ee2 564->575 565->564 602 6cf98b3f-6cf98b56 call 6d007580 566->602 572 6cf9895c-6cf98969 DeleteDC 567->572 573 6cf9896f-6cf9897c 567->573 572->573 580 6cf9897e-6cf9898b DeleteDC 573->580 581 6cf98991-6cf9899e 573->581 574->575 584 6cf98ef0-6cf98f05 call 6cf83830 575->584 585 6cf98ee4-6cf98eea 575->585 598 6cf99d17-6cf99d2e call 6d007580 576->598 582 6cf990c1-6cf990f7 call 6cfc9d00 577->582 583 6cf99023-6cf99035 577->583 580->581 588 6cf989a0-6cf989ad DeleteObject 581->588 589 6cf989b3-6cf989c0 581->589 592 6cf990f9-6cf99108 582->592 587 6cf99046-6cf99058 583->587 584->550 585->584 587->582 594 6cf9905a-6cf99066 587->594 588->589 595 6cf989c2-6cf989cf DeleteObject 589->595 596 6cf989d5-6cf98a24 589->596 600 6cf9910e 592->600 601 6cf99406-6cf99410 592->601 603 6cf99077-6cf99083 594->603 595->596 604 6cf98a86-6cf98ad6 596->604 605 6cf98a26-6cf98a80 596->605 615 6cf99d7a-6cf99d8e RestoreDC 598->615 616 6cf99d30-6cf99d78 call 6cf8c8b0 598->616 607 6cf99118-6cf9912f call 6d007580 600->607 608 6cf99421-6cf99438 call 6d007580 601->608 625 6cf98c28 602->625 626 6cf98b5c-6cf98b95 call 6cf8c8b0 602->626 610 6cf990bc 603->610 611 6cf99085-6cf990ba 603->611 620 6cf98c2f-6cf98c3e 604->620 605->604 607->601 628 6cf99135-6cf99162 call 6cf8c8b0 IsWindow 607->628 630 6cf9943a-6cf99482 call 6cf8c8b0 608->630 631 6cf99484-6cf994ad RestoreDC 608->631 610->587 611->603 623 6cf99d94-6cf99dd7 EndPaint call 6cf9d920 615->623 616->598 620->546 632 6cf98c44-6cf98c83 call 6cf9de00 620->632 645 6cf99dd9-6cf99ddf call 6cf9c9e0 623->645 646 6cf99de4-6cf99ded 623->646 625->620 669 6cf98bdc-6cf98c1e 626->669 670 6cf98b97-6cf98bda 626->670 656 6cf99164-6cf99194 call 6cf8c7b0 * 2 628->656 657 6cf99196-6cf991b4 IsWindowVisible 628->657 630->608 634 6cf994b3-6cf99501 GetWindowRect call 6cf8cbb0 631->634 635 6cf99b82-6cf99bd7 73A24D40 631->635 649 6cf98cb5-6cf98cce call 6cfd3200 632->649 650 6cf98c85-6cf98c94 632->650 665 6cf99507-6cf99611 call 6cf8cbb0 634->665 666 6cf999b6-6cf999c8 634->666 643 6cf99bdd-6cf99c06 SelectObject 635->643 654 6cf99c0c-6cf99c1b 643->654 655 6cf99ca6 643->655 645->646 659 6cf99def-6cf99e0d call 6cf9de00 646->659 660 6cf99e12-6cf99e14 646->660 649->546 650->649 662 6cf98c96-6cf98cb0 call 6cf9c9e0 call 6cf9d920 650->662 654->655 671 6cf99c21-6cf99ca0 SelectObject GetStockObject SelectObject Rectangle SelectObject 654->671 655->623 656->607 663 6cf991bb-6cf9920f call 6cf9dd30 IntersectRect 657->663 664 6cf991b6 657->664 659->660 660->532 662->532 688 6cf99211 663->688 689 6cf99216-6cf992de call 6cfc2030 call 6cf83830 SelectObject SendMessageW 663->689 664->607 690 6cf999b1 665->690 691 6cf99617-6cf99624 665->691 677 6cf999d9-6cf999eb 666->677 701 6cf98c23 669->701 670->701 671->655 682 6cf99ac8-6cf99b80 677->682 683 6cf999f1-6cf999fd 677->683 682->643 692 6cf99a0e-6cf99a1a 683->692 688->607 730 6cf992ef-6cf99301 689->730 690->682 695 6cf9962a-6cf99762 call 6cfc2030 call 6cf83830 SelectObject call 6cfb8e50 call 6cfbcbb0 call 6cfb8e10 691->695 696 6cf99767-6cf99776 691->696 697 6cf99a20-6cf99a55 692->697 698 6cf99ac3 692->698 703 6cf9983a-6cf9986f 695->703 696->703 704 6cf9977c-6cf99835 call 6cf83830 call 6cfb8e50 call 6cfbcbb0 call 6cfb8e10 696->704 707 6cf99abe 697->707 708 6cf99a57-6cf99a6f 697->708 698->677 701->602 703->690 717 6cf99875-6cf9989e 703->717 704->703 707->692 712 6cf99a71-6cf99a8a 708->712 713 6cf99aa7-6cf99ab9 708->713 712->713 716 6cf99a8c-6cf99aa5 712->716 713->707 716->707 716->713 725 6cf999ac 717->725 726 6cf998a4-6cf999a7 717->726 725->690 735 6cf99388-6cf99401 73A24D40 SelectObject DeleteObject DeleteDC 730->735 736 6cf99307-6cf99311 730->736 735->607 737 6cf99322-6cf99334 736->737 740 6cf99383 737->740 741 6cf99336-6cf9936a 737->741 740->730 743 6cf9936c-6cf9937f 741->743 744 6cf99381 741->744 743->744 744->737
                        APIs
                        • _memset.LIBCMT ref: 6CF9876B
                        • BeginPaint.USER32(?,?), ref: 6CF98787
                        • EndPaint.USER32(?,?), ref: 6CF987C2
                        • GetClientRect.USER32(?,00000000), ref: 6CF98801
                        • GetUpdateRect.USER32(?,00000000,00000000), ref: 6CF9883B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: PaintRect$BeginClientUpdate_memset
                        • String ID: windowinit$windowsize$0
                        • API String ID: 3456385447-2147870576
                        • Opcode ID: 2e5ff7a705564747817198f7429e896a486c5bb8db1352e59a10c3c004566ead
                        • Instruction ID: 717dfbf3350e95bf41d7dc6248e34e9a571c67beaf88ae0c67a0bf35124e3079
                        • Opcode Fuzzy Hash: 2e5ff7a705564747817198f7429e896a486c5bb8db1352e59a10c3c004566ead
                        • Instruction Fuzzy Hash: 48E2D674A052288FEB65CB18CC94BDAB7B1EF89304F1481E9D90DAB351CB35AE85DF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1239 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 1246 403947-40394a 1239->1246 1247 40394f-403963 call 405d32 CharNextW 1239->1247 1246->1247 1250 4039f6-4039fc 1247->1250 1251 403a02 1250->1251 1252 403968-40396e 1250->1252 1253 403a21-403a39 GetTempPathW call 4037f8 1251->1253 1254 403970-403976 1252->1254 1255 403978-40397c 1252->1255 1264 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 1253->1264 1265 403a5f-403a79 DeleteFileW call 4035b3 1253->1265 1254->1254 1254->1255 1257 403984-403988 1255->1257 1258 40397e-403983 1255->1258 1259 4039e4-4039f1 call 405d32 1257->1259 1260 40398a-403991 1257->1260 1258->1257 1259->1250 1274 4039f3 1259->1274 1262 403993-40399a 1260->1262 1263 4039a6-4039b8 call 40382c 1260->1263 1268 4039a1 1262->1268 1269 40399c-40399f 1262->1269 1279 4039ba-4039c1 1263->1279 1280 4039cd-4039e2 call 40382c 1263->1280 1264->1265 1277 403af8-403b07 call 403885 OleUninitialize 1264->1277 1265->1277 1278 403a7b-403a81 1265->1278 1268->1263 1269->1263 1269->1268 1274->1250 1293 403bfa-403c00 1277->1293 1294 403b0d-403b1d call 405ccc ExitProcess 1277->1294 1281 403ae1-403ae8 call 405958 1278->1281 1282 403a83-403a8c call 405d32 1278->1282 1284 4039c3-4039c6 1279->1284 1285 4039c8 1279->1285 1280->1259 1295 403a04-403a1c call 40824c call 406035 1280->1295 1292 403aed-403af3 call 406113 1281->1292 1296 403aa5-403aa7 1282->1296 1284->1280 1284->1285 1285->1280 1292->1277 1299 403c02-403c1f call 406328 * 3 1293->1299 1300 403c7d-403c85 1293->1300 1295->1253 1304 403aa9-403ab3 1296->1304 1305 403a8e-403aa0 call 40382c 1296->1305 1332 403c21-403c23 1299->1332 1333 403c69-403c74 ExitWindowsEx 1299->1333 1306 403c87 1300->1306 1307 403c8b 1300->1307 1312 403b23-403b3d lstrcatW lstrcmpiW 1304->1312 1313 403ab5-403ac5 call 4067aa 1304->1313 1305->1304 1318 403aa2 1305->1318 1306->1307 1312->1277 1317 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 1312->1317 1313->1277 1326 403ac7-403add call 406035 * 2 1313->1326 1321 403b62-403b82 call 406035 * 2 1317->1321 1322 403b57-403b5d call 406035 1317->1322 1318->1296 1340 403b87-403ba3 call 406831 DeleteFileW 1321->1340 1322->1321 1326->1281 1332->1333 1337 403c25-403c27 1332->1337 1333->1300 1336 403c76-403c78 call 40141d 1333->1336 1336->1300 1337->1333 1338 403c29-403c3b GetCurrentProcess 1337->1338 1338->1333 1345 403c3d-403c5f 1338->1345 1346 403be4-403bec 1340->1346 1347 403ba5-403bb5 CopyFileW 1340->1347 1345->1333 1346->1340 1348 403bee-403bf5 call 406c94 1346->1348 1347->1346 1349 403bb7-403bd7 call 406c94 call 406831 call 405c6b 1347->1349 1348->1277 1349->1346 1359 403bd9-403be0 CloseHandle 1349->1359 1359->1346
                        APIs
                        • #17.COMCTL32 ref: 004038CE
                        • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                        • OleInitialize.OLE32(00000000), ref: 004038E0
                          • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                          • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                          • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                        • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                        • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                        • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                        • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                        • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                        • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                        • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                        • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                        • OleUninitialize.OLE32(?), ref: 00403AFD
                        • ExitProcess.KERNEL32 ref: 00403B1D
                        • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                        • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                        • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                        • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                        • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                        • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                        • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                        • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                        • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                        • API String ID: 2435955865-3712954417
                        • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                        • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                        • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                        • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0-pixel image$1/2/4/8-bit only$SNRt$XXXX PNG chunk not known$bad IHDR len$bad comp method$bad ctype$bad filter method$bad interlace method$bad tRNS len$first not IHDR$invalid PLTE$multiple IHDR$no IDAT$no PLTE$outofdata$outofmem$tRNS after IDAT$tRNS before PLTE$tRNS with alpha$too large
                        • API String ID: 0-3688516492
                        • Opcode ID: cd376327e9ac6a7d1692d5a4dcf7475d9bd33595eb7ef2dcfab13e472f0cc057
                        • Instruction ID: 90ddbfcbefacffe43edaf340c1fb153eadc10bc50bf9c3a6a7e309590f23e3f7
                        • Opcode Fuzzy Hash: cd376327e9ac6a7d1692d5a4dcf7475d9bd33595eb7ef2dcfab13e472f0cc057
                        • Instruction Fuzzy Hash: 2BA281F4A04159CFCB14CB94CA90BAEBBB1AF45308F2481E9D5497B742C731AE85CF66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2545 406cc7-406ce1 call 4067aa 2548 406ce3-406cf5 DeleteFileW 2545->2548 2549 406cfa-406d05 2545->2549 2550 406ef9-406efb 2548->2550 2551 406d07-406d09 2549->2551 2552 406d19-406d2d call 406035 2549->2552 2553 406e77-406e7c 2551->2553 2554 406d0f-406d13 2551->2554 2561 406d39-406d3a call 40677d 2552->2561 2562 406d2f-406d37 lstrcatW 2552->2562 2556 406ef7-406ef8 2553->2556 2557 406e7e-406e82 2553->2557 2554->2552 2554->2553 2556->2550 2559 406e84-406e89 2557->2559 2560 406e8b-406e92 call 406301 2557->2560 2563 406ee1-406eee call 4062cf 2559->2563 2560->2556 2571 406e94-406eb7 call 40674e call 4062cf call 405e5c RemoveDirectoryW 2560->2571 2564 406d3f-406d43 2561->2564 2562->2564 2563->2556 2568 406d45-406d4d 2564->2568 2569 406d4f-406d55 lstrcatW 2564->2569 2568->2569 2572 406d57-406d78 lstrlenW FindFirstFileW 2568->2572 2569->2572 2596 406ef0-406ef2 call 404f9e 2571->2596 2597 406eb9-406ebd 2571->2597 2575 406e67 2572->2575 2576 406d7e-406d93 call 405d32 2572->2576 2579 406e69-406e6c 2575->2579 2584 406d95-406d99 2576->2584 2585 406d9e-406da2 2576->2585 2579->2553 2582 406e6e-406e73 2579->2582 2582->2553 2584->2585 2587 406d9b 2584->2587 2588 406dc0-406dd0 call 406035 2585->2588 2589 406da4-406dab 2585->2589 2587->2585 2599 406dd2-406dda 2588->2599 2600 406de7-406e04 call 4062cf call 405e5c DeleteFileW 2588->2600 2592 406db1-406db4 2589->2592 2593 406e44-406e56 FindNextFileW 2589->2593 2592->2588 2598 406db6-406dba 2592->2598 2593->2576 2595 406e5c-406e65 FindClose 2593->2595 2595->2579 2596->2556 2602 406edc 2597->2602 2603 406ebf-406eda call 4062cf call 404f9e call 406c94 2597->2603 2598->2588 2598->2593 2599->2593 2604 406ddc-406de5 call 406cc7 2599->2604 2616 406e06-406e0a 2600->2616 2617 406e3d-406e3f call 404f9e 2600->2617 2602->2563 2603->2556 2604->2593 2620 406e29-406e3b call 4062cf 2616->2620 2621 406e0c-406e27 call 4062cf call 404f9e call 406c94 2616->2621 2617->2593 2620->2593 2621->2593
                        APIs
                        • DeleteFileW.KERNELBASE(?,?,004CF0A0), ref: 00406CE4
                        • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                        • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                        • lstrlenW.KERNEL32(?), ref: 00406D58
                        • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                        • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                        • FindClose.KERNEL32(?), ref: 00406E5F
                        Strings
                        • ptF, xrefs: 00406D1A
                        • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                        • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                        • Delete: DeleteFile("%s"), xrefs: 00406DE8
                        • \*.*, xrefs: 00406D2F
                        • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                        • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                        • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                        • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                        • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                        • API String ID: 2035342205-1650287579
                        • Opcode ID: f7a733ba7b7dda8f767778852903590a58a16c07b963c85795d8b3373a8eb2b2
                        • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                        • Opcode Fuzzy Hash: f7a733ba7b7dda8f767778852903590a58a16c07b963c85795d8b3373a8eb2b2
                        • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGlobal$lstrcpyn$Window_memsetlstrcpy
                        • String ID:
                        • API String ID: 752816851-0
                        • Opcode ID: 1cb60d70ab325124b7ae2bbfb3249d9aa8a19737f4a3b4867fba2d4c968adb59
                        • Instruction ID: ea8accb40aa5f7b7801a51166217e1fd61b5299abb4f67219c803a5e497a7edc
                        • Opcode Fuzzy Hash: 1cb60d70ab325124b7ae2bbfb3249d9aa8a19737f4a3b4867fba2d4c968adb59
                        • Instruction Fuzzy Hash: 2F419376901218DBCB10EF64C980BDEB379BF89714F214699D61967B40DB71AD88CFE0
                        APIs
                        • OutputDebugStringW.KERNELBASE(00000000), ref: 6CF624B7
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DebugOutputString_free
                        • String ID: Window$classname_leeqia$node_addr$parent:%ld$sub_child
                        • API String ID: 3134867242-553710224
                        • Opcode ID: ef7d91857067f276cfb1af3acb0ace91ac63958b5a00a3bebdfa6249b7e8130d
                        • Instruction ID: 9ec85ee1a2531293183b273419dfe328a1e1df948286854b1d1747657a7f11ee
                        • Opcode Fuzzy Hash: ef7d91857067f276cfb1af3acb0ace91ac63958b5a00a3bebdfa6249b7e8130d
                        • Instruction Fuzzy Hash: A4E16C719052189FDB25CF64DC84BDEB7B1AF49304F1082EAD459A7B41DB35AE88CFA0
                        APIs
                        • FindResourceW.KERNEL32(00000000,00000000,00000000,?,?,6CF949B0,?,00000000,00000000), ref: 6CFD084B
                        • LoadResource.KERNEL32(00000000,00000000,?,?,6CF949B0), ref: 6CFD0869
                        • FreeResource.KERNEL32(00000000,?,?,6CF949B0), ref: 6CFD087C
                        • SizeofResource.KERNEL32(00000000,00000000,00000000,?,?,6CF949B0), ref: 6CFD089C
                        • LockResource.KERNEL32(00000000,00000000,?,?,6CF949B0), ref: 6CFD08A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Resource$FindFreeLoadLockSizeof
                        • String ID:
                        • API String ID: 4159136517-0
                        • Opcode ID: 14d6d041d81738f508e29bcdaa2c1adbc8beb72eb2c141014752307c382bff5e
                        • Instruction ID: 2191f50945f5bf2c9bdeabcefbd3cee13460054c3711bc2ea1fa432595e41ac3
                        • Opcode Fuzzy Hash: 14d6d041d81738f508e29bcdaa2c1adbc8beb72eb2c141014752307c382bff5e
                        • Instruction Fuzzy Hash: 6F515F75E00259EFCB04DF99C894AEF77B5BF88304F148529F805AB740DB75A981CBA0
                        APIs
                        • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                        • FindClose.KERNEL32(00000000), ref: 00406318
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID: jF
                        • API String ID: 2295610775-3349280890
                        • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                        • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                        • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                        • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                        APIs
                        • GetLastError.KERNEL32(00000400,6CFD3381,00000000,00000000,?,?,6CFD3381), ref: 6CFD31D1
                        • FormatMessageW.KERNELBASE(00001100,00000000,00000000,?,?,6CFD3381), ref: 6CFD31DF
                        • LocalFree.KERNEL32(6CFD3381,?,?,6CFD3381), ref: 6CFD31E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFormatFreeLastLocalMessage
                        • String ID:
                        • API String ID: 1365068426-0
                        • Opcode ID: e804ad260118203cb08bbb0bbfa9ec47917ba6c5036cb1ce23fd35c0bef42e65
                        • Instruction ID: d2a43a5504b7aa652690b7378cb8e8f986f7c9d0fb9d63b05e5a6ff261afcebf
                        • Opcode Fuzzy Hash: e804ad260118203cb08bbb0bbfa9ec47917ba6c5036cb1ce23fd35c0bef42e65
                        • Instruction Fuzzy Hash: 53D05EB5E85308BBEB149BD0CC4BFB9773CE749B12F600184FB09961C09BB1690487B6
                        APIs
                        • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                        • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                        • GetProcAddress.KERNEL32(00000000), ref: 00406353
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: AddressHandleLibraryLoadModuleProc
                        • String ID:
                        • API String ID: 310444273-0
                        • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                        • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                        • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                        • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: Default$Font$Image$Import$Style$Window$alpha$bktrans$bold$caption$default$defaultfontcolor$disabledfontcolor$fontfile$gdiplustext$italic$layered$layeredimage$layeredopacity$linkfontcolor$linkhoverfontcolor$mask$maxinfo$mininfo$name$noactivate$opacity$restype$roundcorner$selectedcolor$shadowcolor$shadowcorner$shadowdarkness$shadowimage$shadowposition$shadowsharpness$shadowsize$shared$showdirty$showshadow$size$sizebox$textrenderinghint$tooltiphovertime$true$underline$value
                        • API String ID: 3832890014-2278178710
                        • Opcode ID: 7c79f5b86beecf7f26576666178873e5ac0e9c36928d83075b4fda707bf66e91
                        • Instruction ID: 820b4bb7a260185cbe8c20896113df10be10144966ffcfe800dbdfde0242c98c
                        • Opcode Fuzzy Hash: 7c79f5b86beecf7f26576666178873e5ac0e9c36928d83075b4fda707bf66e91
                        • Instruction Fuzzy Hash: EFC220B1D08658ABDB24CB64DC50BEFB3B4AF45306F0485D9E50DA7680EB35AE84CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 751 6cf92ba0-6cf92bc6 call 6d01804e 754 6cf92bc8-6cf92bdb call 6d01804e 751->754 755 6cf92bf4-6cf92c07 call 6d01804e 751->755 754->755 762 6cf92bdd-6cf92bee 754->762 760 6cf92c09-6cf92c1c call 6d01804e 755->760 761 6cf92c35-6cf92c48 call 6d01804e 755->761 767 6cf92c1e-6cf92c2d 760->767 768 6cf92c33 760->768 769 6cf92c4a-6cf92c5d call 6d01804e 761->769 770 6cf92c77-6cf92c8a call 6d01804e 761->770 762->755 767->768 768->770 769->770 775 6cf92c5f-6cf92c71 769->775 776 6cf92cbd-6cf92cd0 call 6cf7b07d 770->776 777 6cf92c8c-6cf92c9f call 6d01804e 770->777 775->770 784 6cf92cf9-6cf92d0c call 6d01804e 776->784 785 6cf92cd2-6cf92cf4 call 6d01804e call 6cf8fb30 776->785 782 6cf92cb8 777->782 783 6cf92ca1-6cf92cb2 777->783 786 6cf93297-6cf932a4 call 6cf7addf 782->786 783->782 794 6cf92d0e-6cf92d30 call 6d01804e call 6cf8fba0 784->794 795 6cf92d35-6cf92d48 call 6d01804e 784->795 785->786 794->786 802 6cf92d4a-6cf92d6c call 6d01804e call 6cf8fbc0 795->802 803 6cf92d71-6cf92d84 call 6d01804e 795->803 802->786 810 6cf92dad-6cf92dc0 call 6d01804e 803->810 811 6cf92d86-6cf92da8 call 6d01804e call 6cf8fbe0 803->811 818 6cf92de9-6cf92dfc call 6d01804e 810->818 819 6cf92dc2-6cf92de4 call 6d01804e call 6cf8fc00 810->819 811->786 826 6cf92dfe-6cf92e20 call 6d01804e call 6cf8fc60 818->826 827 6cf92e25-6cf92e38 call 6d01804e 818->827 819->786 826->786 834 6cf92e3a-6cf92e4d call 6d01804e 827->834 835 6cf92e76-6cf92e89 call 6d01804e 827->835 841 6cf92e4f-6cf92e6a 834->841 842 6cf92e71 834->842 843 6cf92e8b-6cf92e9e call 6d01804e 835->843 844 6cf92eba-6cf92ecd call 6d01804e 835->844 841->842 842->786 849 6cf92ea0-6cf92eaf 843->849 850 6cf92eb5 843->850 851 6cf92ed3-6cf92ee6 call 6d0182be 844->851 852 6cf92f92-6cf92fa5 call 6d01804e 844->852 849->850 850->786 859 6cf92ee8-6cf92f09 851->859 860 6cf92f0f-6cf92f22 call 6d0182be 851->860 857 6cf92fc1-6cf92fd4 call 6d01804e 852->857 858 6cf92fa7-6cf92fbc call 6d018646 call 6cf8fce0 852->858 870 6cf9303f-6cf93052 call 6cf7b07d 857->870 871 6cf92fd6-6cf92fde 857->871 858->786 859->860 868 6cf92f4e-6cf92f61 call 6d0182be 860->868 869 6cf92f24-6cf92f48 860->869 882 6cf92f8d 868->882 883 6cf92f63-6cf92f87 868->883 869->868 885 6cf9306e-6cf93081 call 6cf7b07d 870->885 886 6cf93054-6cf93069 call 6d018646 call 6cf8fdc0 870->886 873 6cf92ffa-6cf93003 871->873 874 6cf92fe0-6cf92fe9 871->874 879 6cf93012-6cf9303a call 6d018616 call 6cf8fd60 873->879 880 6cf93005-6cf9300f CharNextW 873->880 874->873 878 6cf92feb-6cf92ff8 CharNextW 874->878 878->871 879->786 880->879 882->786 883->882 893 6cf93083-6cf9308f call 6cf92800 885->893 894 6cf93094-6cf930a7 call 6cf7b07d 885->894 886->786 893->786 902 6cf930a9-6cf930b5 call 6cf92830 894->902 903 6cf930ba-6cf930cd call 6cf7b07d 894->903 902->786 908 6cf930cf-6cf930db call 6cf92860 903->908 909 6cf930e0-6cf930f3 call 6cf7b07d 903->909 908->786 914 6cf930f5-6cf93101 call 6cf92890 909->914 915 6cf93106-6cf93119 call 6cf7b07d 909->915 914->786 920 6cf9311f-6cf931b9 call 6d0185fc * 4 call 6cf928c0 915->920 921 6cf931be-6cf931d1 call 6cf7b07d 915->921 920->786 926 6cf931d3-6cf931df call 6cf92900 921->926 927 6cf931e4-6cf931f7 call 6cf7b07d 921->927 926->786 935 6cf931f9-6cf93205 call 6cf92950 927->935 936 6cf9320a-6cf9321d call 6cf7b07d 927->936 935->786 945 6cf9321f-6cf93232 call 6d0182be 936->945 946 6cf93287-6cf93292 call 6cfccf60 936->946 951 6cf93241-6cf93254 call 6d0182be 945->951 952 6cf93234-6cf93237 945->952 946->786 955 6cf93263-6cf93276 call 6d0182be 951->955 956 6cf93256-6cf93259 951->956 952->951 959 6cf93278-6cf9327b 955->959 960 6cf93285 955->960 956->955 959->960 960->786
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: align$autohscroll$autovscroll$center$disabledimage$focusedimage$font$hotimage$hscrollbar$left$maxchar$multiline$normalimage$password$readonly$rich$right$textcolor$textpadding$tipvalue$tipvaluealign$tipvaluecolor$transparent$true$vscrollbar$wantctrlreturn$wantreturn$wanttab
                        • API String ID: 3832890014-2978963918
                        • Opcode ID: 0ffcb7f0927216efe56301d137cf2be674c177c54c4467657442c13834abc6c0
                        • Instruction ID: fff60c202600cf98c90c2ae1ea0d5fd92d549fc7ad155464937ece00e734d476
                        • Opcode Fuzzy Hash: 0ffcb7f0927216efe56301d137cf2be674c177c54c4467657442c13834abc6c0
                        • Instruction Fuzzy Hash: AE1230B5E09205ABEF04DBA5CD45EEE73F5AF48304F148168E909AB741EB36DE04CB61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 961 6cfccf60-6cfccf86 call 6cf7b07d 964 6cfccf8c-6cfcd02e call 6d0185fc * 4 961->964 965 6cfcd033-6cfcd046 call 6cf7b07d 961->965 986 6cfcd445-6cfcd452 call 6cf7addf 964->986 970 6cfcd048-6cfcd072 call 6cf7b07d 965->970 971 6cfcd077-6cfcd08a call 6cf7b07d 965->971 970->986 979 6cfcd08c-6cfcd0cd call 6cf7b07d call 6cfcc390 971->979 980 6cfcd0d4-6cfcd0e7 call 6cf7b07d 971->980 1002 6cfcd0cf 979->1002 989 6cfcd0ed-6cfcd13c call 6cf8cc60 980->989 990 6cfcd19e-6cfcd1b1 call 6cf7b07d 980->990 1020 6cfcd13e-6cfcd15f call 6cf8c9d0 call 6cfa0b10 989->1020 1021 6cfcd199 989->1021 1000 6cfcd1fb-6cfcd20e call 6cf7b07d 990->1000 1001 6cfcd1b3-6cfcd1f6 call 6cf7b07d 990->1001 1008 6cfcd214-6cfcd263 call 6cf8cc60 1000->1008 1009 6cfcd2c5-6cfcd2d8 call 6cf7b07d 1000->1009 1001->986 1002->986 1042 6cfcd265-6cfcd286 call 6cf8c9d0 call 6cfa0b10 1008->1042 1043 6cfcd2c0 1008->1043 1017 6cfcd2fc-6cfcd30f call 6d01804e 1009->1017 1018 6cfcd2da-6cfcd2f7 call 6d018646 1009->1018 1029 6cfcd380-6cfcd393 call 6d01804e 1017->1029 1030 6cfcd311-6cfcd324 call 6d01804e 1017->1030 1018->986 1037 6cfcd17e-6cfcd194 call 6cfc9840 1020->1037 1038 6cfcd161-6cfcd17c call 6cfc9840 1020->1038 1021->986 1044 6cfcd395-6cfcd3a8 call 6d01804e 1029->1044 1045 6cfcd401-6cfcd414 call 6cf7b07d 1029->1045 1046 6cfcd335-6cfcd348 call 6d01804e 1030->1046 1047 6cfcd326-6cfcd333 1030->1047 1037->1021 1038->1021 1077 6cfcd288-6cfcd2a3 call 6cfc9840 1042->1077 1078 6cfcd2a5-6cfcd2bb call 6cfc9840 1042->1078 1043->986 1067 6cfcd3b9-6cfcd3cc call 6d01804e 1044->1067 1068 6cfcd3aa-6cfcd3b7 1044->1068 1065 6cfcd435-6cfcd440 call 6cfc81e0 1045->1065 1066 6cfcd416-6cfcd433 call 6d018646 1045->1066 1061 6cfcd359-6cfcd36c call 6d01804e 1046->1061 1062 6cfcd34a-6cfcd357 1046->1062 1053 6cfcd37b 1047->1053 1053->986 1061->1053 1082 6cfcd36e-6cfcd371 1061->1082 1062->1053 1065->986 1066->986 1080 6cfcd3dd-6cfcd3f0 call 6d01804e 1067->1080 1081 6cfcd3ce-6cfcd3db 1067->1081 1073 6cfcd3ff 1068->1073 1073->986 1077->1043 1078->1043 1080->1073 1090 6cfcd3f2-6cfcd3f5 1080->1090 1081->1073 1082->1053 1090->1073
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __fassign$__wcsicoll$wcstoxl
                        • String ID: bottom$center$childalign$childpadding$childvalign$hscrollbar$hscrollbarstyle$inset$left$mousechild$right$scrollstepsize$top$true$vcenter$vscrollbar$vscrollbarstyle
                        • API String ID: 1413853151-2115408772
                        • Opcode ID: 09a218c501da8c642495317189ee751ef35a361d3fb92970360fe24ea89b6187
                        • Instruction ID: 11dd1f97221722309e096b56296cbdc100ba44984e1b01be368f2d5455ff8bc0
                        • Opcode Fuzzy Hash: 09a218c501da8c642495317189ee751ef35a361d3fb92970360fe24ea89b6187
                        • Instruction Fuzzy Hash: 7BE12E75B44106ABDB04DFA4CD90AEEB3F5AF88304F148168E919A7750DB35EE44CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1093 4015a0-4015f4 1094 4030e3-4030ec 1093->1094 1095 4015fa 1093->1095 1114 4030ee-4030f2 1094->1114 1097 401601-401611 call 4062cf 1095->1097 1098 401742-40174f 1095->1098 1099 401962-40197d call 40145c GetFullPathNameW 1095->1099 1100 4019ca-4019e6 call 40145c SearchPathW 1095->1100 1101 40176e-401794 call 40145c call 4062cf SetFileAttributesW 1095->1101 1102 401650-40166d call 40137e call 4062cf call 40139d 1095->1102 1103 4017b1-4017d8 call 40145c call 4062cf call 405d85 1095->1103 1104 401672-401686 call 40145c call 4062cf 1095->1104 1105 401693-4016ac call 401446 call 4062cf 1095->1105 1106 401715-401731 1095->1106 1107 401616-40162d call 40145c call 4062cf call 404f9e 1095->1107 1108 4016d6-4016db 1095->1108 1109 401736-40173d 1095->1109 1110 401897-4018a7 call 40145c call 406301 1095->1110 1111 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 1095->1111 1112 40163c-401645 1095->1112 1113 4016bd-4016d1 call 4062cf SetForegroundWindow 1095->1113 1097->1114 1129 401751-401755 ShowWindow 1098->1129 1130 401758-40175f 1098->1130 1151 4019a3-4019a8 1099->1151 1152 40197f-401984 1099->1152 1100->1094 1158 4019ec-4019f8 1100->1158 1101->1094 1172 40179a-4017a6 call 4062cf 1101->1172 1102->1114 1197 401864-40186c 1103->1197 1198 4017de-4017fc call 405d32 CreateDirectoryW 1103->1198 1173 401689-40168e call 404f9e 1104->1173 1178 4016b1-4016b8 Sleep 1105->1178 1179 4016ae-4016b0 1105->1179 1106->1114 1126 401632-401637 1107->1126 1123 401702-401710 1108->1123 1124 4016dd-4016fd call 401446 1108->1124 1128 4030dd-4030de call 405f7d 1109->1128 1174 4018c2-4018d6 call 4062cf 1110->1174 1175 4018a9-4018bd call 4062cf 1110->1175 1208 401912-401919 1111->1208 1209 40191e-401921 1111->1209 1112->1126 1127 401647-40164e PostQuitMessage 1112->1127 1113->1094 1123->1094 1124->1094 1126->1114 1127->1126 1128->1094 1129->1130 1130->1094 1146 401765-401769 ShowWindow 1130->1146 1146->1094 1165 4019af-4019b2 1151->1165 1164 401986-401989 1152->1164 1152->1165 1158->1094 1158->1128 1164->1165 1176 40198b-401993 call 406301 1164->1176 1165->1094 1180 4019b8-4019c5 GetShortPathNameW 1165->1180 1192 4017ab-4017ac 1172->1192 1173->1094 1174->1114 1175->1114 1176->1151 1201 401995-4019a1 call 406035 1176->1201 1178->1094 1179->1178 1180->1094 1192->1094 1204 401890-401892 1197->1204 1205 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 1197->1205 1212 401846-40184e call 4062cf 1198->1212 1213 4017fe-401809 GetLastError 1198->1213 1201->1165 1204->1173 1205->1094 1208->1173 1214 401923-40192b call 406301 1209->1214 1215 40194a-401950 1209->1215 1227 401853-401854 1212->1227 1218 401827-401832 GetFileAttributesW 1213->1218 1219 40180b-401825 GetLastError call 4062cf 1213->1219 1214->1215 1233 40192d-401948 call 406c94 call 404f9e 1214->1233 1217 401957-40195d call 4062cf 1215->1217 1217->1192 1225 401834-401844 call 4062cf 1218->1225 1226 401855-40185e 1218->1226 1219->1226 1225->1227 1226->1197 1226->1198 1227->1226 1233->1217
                        APIs
                        • PostQuitMessage.USER32(00000000), ref: 00401648
                        • Sleep.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004016B2
                        • SetForegroundWindow.USER32(?), ref: 004016CB
                        • ShowWindow.USER32(?), ref: 00401753
                        • ShowWindow.USER32(?), ref: 00401767
                        • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                        • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                        • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                        • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                        • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                        • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                        • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                        Strings
                        • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                        • CreateDirectory: "%s" created, xrefs: 00401849
                        • Rename: %s, xrefs: 004018F8
                        • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                        • Aborting: "%s", xrefs: 0040161D
                        • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                        • BringToFront, xrefs: 004016BD
                        • Jump: %d, xrefs: 00401602
                        • Rename failed: %s, xrefs: 0040194B
                        • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                        • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                        • Call: %d, xrefs: 0040165A
                        • Rename on reboot: %s, xrefs: 00401943
                        • detailprint: %s, xrefs: 00401679
                        • CreateDirectory: "%s" (%d), xrefs: 004017BF
                        • SetFileAttributes failed., xrefs: 004017A1
                        • Sleep(%d), xrefs: 0040169D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                        • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                        • API String ID: 2872004960-3619442763
                        • Opcode ID: 0aacebd35cab78dd9e56fb0c34c611705e18b02e61851c41ce70807ba0770869
                        • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                        • Opcode Fuzzy Hash: 0aacebd35cab78dd9e56fb0c34c611705e18b02e61851c41ce70807ba0770869
                        • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1360 4054a5-4054b7 1361 4055f9-405608 1360->1361 1362 4054bd-4054c3 1360->1362 1364 405657-40566c 1361->1364 1365 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 1361->1365 1362->1361 1363 4054c9-4054d2 1362->1363 1368 4054d4-4054e1 SetWindowPos 1363->1368 1369 4054e7-4054ea 1363->1369 1366 4056ac-4056b1 call 403ddb 1364->1366 1367 40566e-405671 1364->1367 1365->1364 1379 4056b6-4056d1 1366->1379 1371 405673-40567e call 40139d 1367->1371 1372 4056a4-4056a6 1367->1372 1368->1369 1374 405504-40550a 1369->1374 1375 4054ec-4054fe ShowWindow 1369->1375 1371->1372 1393 405680-40569f SendMessageW 1371->1393 1372->1366 1378 40594c 1372->1378 1380 405526-405529 1374->1380 1381 40550c-405521 DestroyWindow 1374->1381 1375->1374 1386 40594e-405955 1378->1386 1384 4056d3-4056d5 call 40141d 1379->1384 1385 4056da-4056e0 1379->1385 1389 40552b-405537 SetWindowLongW 1380->1389 1390 40553c-405542 1380->1390 1387 405929-40592f 1381->1387 1384->1385 1396 4056e6-4056f1 1385->1396 1397 40590a-405923 DestroyWindow EndDialog 1385->1397 1387->1378 1394 405931-405937 1387->1394 1389->1386 1391 4055e5-4055f4 call 403df6 1390->1391 1392 405548-405559 GetDlgItem 1390->1392 1391->1386 1398 405578-40557b 1392->1398 1399 40555b-405572 SendMessageW IsWindowEnabled 1392->1399 1393->1386 1394->1378 1401 405939-405942 ShowWindow 1394->1401 1396->1397 1402 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 1396->1402 1397->1387 1403 405580-405583 1398->1403 1404 40557d-40557e 1398->1404 1399->1378 1399->1398 1401->1378 1430 405746-40574c 1402->1430 1431 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 1402->1431 1408 405591-405596 1403->1408 1409 405585-40558b 1403->1409 1407 4055ae-4055b3 call 403d44 1404->1407 1407->1391 1412 4055cc-4055df SendMessageW 1408->1412 1414 405598-40559e 1408->1414 1409->1412 1413 40558d-40558f 1409->1413 1412->1391 1413->1407 1418 4055a0-4055a6 call 40141d 1414->1418 1419 4055b5-4055be call 40141d 1414->1419 1428 4055ac 1418->1428 1419->1391 1427 4055c0-4055ca 1419->1427 1427->1428 1428->1407 1430->1431 1434 405790 1431->1434 1435 40578d-40578e 1431->1435 1436 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 1434->1436 1435->1436 1437 4057c2-4057d3 SendMessageW 1436->1437 1438 4057d5 1436->1438 1439 4057db-405812 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 1437->1439 1438->1439 1447 405817-405819 1439->1447 1447->1379 1448 40581f-405821 1447->1448 1448->1379 1449 405827-40582b 1448->1449 1450 40584a-40585e DestroyWindow 1449->1450 1451 40582d-405833 1449->1451 1450->1387 1453 405864-405891 CreateDialogParamW 1450->1453 1451->1378 1452 405839-40583f 1451->1452 1452->1379 1454 405845 1452->1454 1453->1387 1455 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 1453->1455 1454->1378 1455->1378 1460 4058f0-405908 ShowWindow call 403ddb 1455->1460 1460->1387
                        APIs
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                        • ShowWindow.USER32(?), ref: 004054FE
                        • DestroyWindow.USER32 ref: 00405512
                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                        • GetDlgItem.USER32(?,?), ref: 0040554F
                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                        • IsWindowEnabled.USER32(00000000), ref: 0040556A
                        • GetDlgItem.USER32(?,00000001), ref: 00405619
                        • GetDlgItem.USER32(?,00000002), ref: 00405623
                        • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                        • GetDlgItem.USER32(?,00000003), ref: 00405734
                        • ShowWindow.USER32(00000000,?), ref: 00405756
                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                        • EnableWindow.USER32(?,?), ref: 00405783
                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                        • EnableMenuItem.USER32(00000000), ref: 004057A0
                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                        • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                        • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                        • ShowWindow.USER32(?,0000000A), ref: 0040593C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                        • String ID:
                        • API String ID: 3282139019-0
                        • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                        • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                        • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                        • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1463 405958-405970 call 406328 1466 405972-405982 call 405f7d 1463->1466 1467 405984-4059bc call 405eff 1463->1467 1476 4059df-405a08 call 403ec1 call 4067aa 1466->1476 1472 4059d4-4059da lstrcatW 1467->1472 1473 4059be-4059cf call 405eff 1467->1473 1472->1476 1473->1472 1481 405a9c-405aa4 call 4067aa 1476->1481 1482 405a0e-405a13 1476->1482 1488 405ab2-405ab9 1481->1488 1489 405aa6-405aad call 406831 1481->1489 1482->1481 1483 405a19-405a41 call 405eff 1482->1483 1483->1481 1490 405a43-405a47 1483->1490 1492 405ad2-405af7 LoadImageW 1488->1492 1493 405abb-405ac1 1488->1493 1489->1488 1494 405a49-405a58 call 405d32 1490->1494 1495 405a5b-405a67 lstrlenW 1490->1495 1497 405b92-405b9a call 40141d 1492->1497 1498 405afd-405b3f RegisterClassW 1492->1498 1493->1492 1496 405ac3-405ac8 call 403ea0 1493->1496 1494->1495 1500 405a69-405a77 lstrcmpiW 1495->1500 1501 405a8f-405a97 call 40674e call 406035 1495->1501 1496->1492 1512 405ba4-405baf call 403ec1 1497->1512 1513 405b9c-405b9f 1497->1513 1503 405c61 1498->1503 1504 405b45-405b8d SystemParametersInfoW CreateWindowExW 1498->1504 1500->1501 1509 405a79-405a83 GetFileAttributesW 1500->1509 1501->1481 1508 405c63-405c6a 1503->1508 1504->1497 1514 405a85-405a87 1509->1514 1515 405a89-405a8a call 40677d 1509->1515 1521 405bb5-405bd2 ShowWindow LoadLibraryW 1512->1521 1522 405c38-405c40 call 405073 1512->1522 1513->1508 1514->1501 1514->1515 1515->1501 1523 405bd4-405bd9 LoadLibraryW 1521->1523 1524 405bdb-405bed GetClassInfoW 1521->1524 1529 405c42-405c48 1522->1529 1530 405c5a-405c5c call 40141d 1522->1530 1523->1524 1527 405c05-405c28 DialogBoxParamW call 40141d 1524->1527 1528 405bef-405bff GetClassInfoW RegisterClassW 1524->1528 1534 405c2d-405c36 call 403c94 1527->1534 1528->1527 1529->1513 1532 405c4e-405c55 call 40141d 1529->1532 1530->1503 1532->1513 1534->1508
                        APIs
                          • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                          • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                          • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                        • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                        • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                        • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                        • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                        • RegisterClassW.USER32(00476A40), ref: 00405B36
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                        • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                          • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                        • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                        • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                        • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                        • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                        • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                        • RegisterClassW.USER32(00476A40), ref: 00405BFF
                        • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                        • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                        • API String ID: 608394941-2746725676
                        • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                        • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                        • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                        • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1843 6cfd1f70-6cfd1fca call 6cf88f00 call 6cfceae0 1848 6cfd1fed-6cfd1ffd call 6cfceb90 1843->1848 1849 6cfd1fcc-6cfd1feb call 6cfcea70 1843->1849 1854 6cfd29a4 1848->1854 1855 6cfd2003-6cfd202a call 6cfcebb0 call 6cf7b07d 1848->1855 1849->1848 1856 6cfd29aa-6cfd29c4 call 6cf7addf 1854->1856 1863 6cfd202c-6cfd2042 call 6cf7b07d 1855->1863 1864 6cfd2074 1855->1864 1863->1864 1867 6cfd2044-6cfd205a call 6cf7b07d 1863->1867 1864->1849 1867->1864 1870 6cfd205c-6cfd2072 call 6cf7b07d 1867->1870 1870->1864 1873 6cfd2079-6cfd2099 call 6cf7b07d 1870->1873 1876 6cfd209b 1873->1876 1877 6cfd20a0-6cfd20b6 call 6cf7b07d 1873->1877 1876->1849 1880 6cfd22cc-6cfd2352 call 6cf8c8d0 call 6cf8d410 call 6cf8c940 call 6cfe03a0 call 6cfe01c0 1877->1880 1881 6cfd20bc-6cfd20cc call 6cfceda0 1877->1881 1906 6cfd23df-6cfd23e6 1880->1906 1907 6cfd2358-6cfd2377 call 6cf97720 1880->1907 1887 6cfd20ce 1881->1887 1888 6cfd20d3-6cfd2133 call 6cf83830 call 6cfcecb0 1881->1888 1887->1849 1898 6cfd2135-6cfd214d call 6d0185fc 1888->1898 1899 6cfd2153-6cfd2180 call 6cfcecb0 1888->1899 1898->1899 1908 6cfd2187-6cfd21ae 1899->1908 1909 6cfd2182 1899->1909 1910 6cfd23e8-6cfd23f5 1906->1910 1911 6cfd2422-6cfd2429 1906->1911 1921 6cfd2388-6cfd2399 call 6d007580 1907->1921 1914 6cfd21b4-6cfd21d3 call 6cfd0730 1908->1914 1915 6cfd22c2 1908->1915 1909->1849 1910->1911 1916 6cfd23f7-6cfd241c 1910->1916 1918 6cfd2434-6cfd243b 1911->1918 1919 6cfd242f call 6cf8c980 1911->1919 1928 6cfd21d9-6cfd2258 call 6d0185fc call 6cfd0770 1914->1928 1929 6cfd225a-6cfd2294 call 6cfd0770 1914->1929 1915->1849 1916->1911 1922 6cfd243d 1918->1922 1923 6cfd2442-6cfd2452 call 6cfceb50 1918->1923 1919->1918 1921->1906 1934 6cfd239b-6cfd23ba call 6cf8c880 1921->1934 1922->1849 1935 6cfd2454-6cfd246c call 6cfd1f70 1923->1935 1936 6cfd2471-6cfd247f 1923->1936 1946 6cfd22ab-6cfd22bd call 6cfcefc0 1928->1946 1940 6cfd2299-6cfd22a5 1929->1940 1953 6cfd23dd 1934->1953 1954 6cfd23bc-6cfd23d9 1934->1954 1935->1936 1938 6cfd2485-6cfd248c 1936->1938 1939 6cfd2702-6cfd2709 1936->1939 1938->1939 1943 6cfd2492-6cfd24e7 1938->1943 1944 6cfd270b 1939->1944 1945 6cfd2710-6cfd2714 1939->1945 1940->1946 1985 6cfd24ed-6cfd24f4 1943->1985 1986 6cfd2619-6cfd2620 1943->1986 1944->1849 1949 6cfd278c-6cfd279c call 6cfceda0 1945->1949 1950 6cfd2716-6cfd271d 1945->1950 1964 6cfd28e7-6cfd28ee 1949->1964 1965 6cfd27a2-6cfd27e6 call 6cf83830 call 6cfced60 1949->1965 1958 6cfd271f-6cfd273f 1950->1958 1959 6cfd2741-6cfd2757 1950->1959 1953->1921 1954->1953 1963 6cfd23db 1954->1963 1968 6cfd275c-6cfd2778 call 6cfa0100 1958->1968 1959->1968 1963->1906 1969 6cfd28f0-6cfd2938 call 6cf8c900 * 2 call 6cf62980 1964->1969 1970 6cfd2962-6cfd2966 1964->1970 1999 6cfd27f7-6cfd2803 1965->1999 1968->1949 1980 6cfd277a-6cfd2787 call 6cfc9840 1968->1980 2009 6cfd293e-6cfd295d call 6cf8c980 * 2 1969->2009 1973 6cfd2968-6cfd296f 1970->1973 1974 6cfd298a-6cfd2991 1970->1974 1973->1974 1979 6cfd2971-6cfd2985 1973->1979 1981 6cfd299f 1974->1981 1982 6cfd2993-6cfd2999 1974->1982 1979->1974 1980->1949 1981->1849 1982->1981 1992 6cfd24fa-6cfd2534 call 6cfe5780 1985->1992 1993 6cfd2591-6cfd2598 1985->1993 1988 6cfd2664-6cfd266b 1986->1988 1989 6cfd2622-6cfd265f 1986->1989 1994 6cfd266d-6cfd267f 1988->1994 1995 6cfd2685-6cfd268c 1988->1995 1989->1939 2019 6cfd258c 1992->2019 2020 6cfd2536-6cfd2555 1992->2020 1996 6cfd259a-6cfd25bc 1993->1996 1997 6cfd2614 1993->1997 1994->1995 2002 6cfd268e-6cfd2690 1995->2002 2003 6cfd2695-6cfd26b4 1995->2003 1996->1997 2012 6cfd25be-6cfd25dd 1996->2012 1997->1939 2004 6cfd2809-6cfd2810 1999->2004 2005 6cfd28e5 1999->2005 2002->1856 2003->1939 2025 6cfd26b6-6cfd26d5 2003->2025 2010 6cfd28a4-6cfd28de call 6cfcec50 call 6cfcebf0 call 6cf92ba0 2004->2010 2011 6cfd2816-6cfd287a call 6cfcec50 call 6cf8c900 call 6cfcebf0 call 6cf8c900 call 6cf62980 2004->2011 2005->1970 2009->1970 2042 6cfd28e0 2010->2042 2047 6cfd2880-6cfd289f call 6cf8c980 * 2 2011->2047 2021 6cfd25df-6cfd25f9 2012->2021 2022 6cfd25fb 2012->2022 2019->1997 2030 6cfd2557-6cfd2571 2020->2030 2031 6cfd2573 2020->2031 2026 6cfd2605-6cfd260f 2021->2026 2022->2026 2027 6cfd26d7-6cfd26f1 2025->2027 2028 6cfd26f3 2025->2028 2026->1849 2036 6cfd26fd 2027->2036 2028->2036 2037 6cfd257d-6cfd2587 2030->2037 2031->2037 2036->1849 2037->1849 2042->1999 2047->2010
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$__fassign_memset
                        • String ID: C%sUI$Default$Font$IContainer$Image$Import$Include$Style$TreeNode$TreeView$count$source
                        • API String ID: 3453739279-446817640
                        • Opcode ID: 46a3989816623e864da92e0789726d48d49d6b5d455f6f1162f9f13644307cb7
                        • Instruction ID: a349562b4921c30a51c4d4525e1af000a37bd46e059671e0a028f8403b332312
                        • Opcode Fuzzy Hash: 46a3989816623e864da92e0789726d48d49d6b5d455f6f1162f9f13644307cb7
                        • Instruction Fuzzy Hash: 8A523975A052689FDB24CF14CC94BDAB3B2BF88304F1442D9E519A7690DB726EC8CF91
                        APIs
                          • Part of subcall function 6F951581: GlobalAlloc.KERNELBASE(00000040,?,6F9515BA,?,?,6F95185F,?,6F951017), ref: 6F95158B
                          • Part of subcall function 6F9515A3: lstrcpyW.KERNEL32(00000000,?,?,?,6F95185F,?,6F951017), ref: 6F9515C1
                          • Part of subcall function 6F9515A3: GlobalFree.KERNEL32 ref: 6F9515D2
                        • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6F951D0B
                        • lstrcpyW.KERNEL32(00000008,?), ref: 6F951D59
                        • lstrcpyW.KERNEL32(00000808,?), ref: 6F951D63
                        • GlobalFree.KERNEL32(00000000), ref: 6F951D7D
                        • GlobalFree.KERNEL32(?), ref: 6F951E69
                        • GlobalFree.KERNELBASE(?), ref: 6F951E6E
                        • GlobalFree.KERNELBASE(?), ref: 6F951E73
                        • GlobalFree.KERNEL32(00000000), ref: 6F95201A
                        • lstrcpyW.KERNEL32(?,?), ref: 6F95217A
                        • GetModuleHandleW.KERNEL32(00000008), ref: 6F9521EE
                        • LoadLibraryW.KERNEL32(00000008), ref: 6F9521FF
                        • lstrcmpiW.KERNEL32(kernel32,00000008), ref: 6F95221B
                        • lstrcmpiW.KERNEL32(kernel32.dll,00000008), ref: 6F952227
                        • lstrlenW.KERNEL32(00000808), ref: 6F952258
                        • lstrcatW.KERNEL32(00000808,6F9530C8), ref: 6F95227C
                        • lstrcpyW.KERNEL32(?,00000808), ref: 6F9522C7
                        • lstrcatW.KERNEL32(?,00000057), ref: 6F9522DE
                        • lstrcatW.KERNEL32(00000808,00000057), ref: 6F952307
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$Free$lstrcpy$lstrcat$Alloclstrcmpi$HandleLibraryLoadModulelstrlen
                        • String ID: W$kernel32$kernel32.dll
                        • API String ID: 2496820534-4093004423
                        • Opcode ID: 419cac719a9e4dc39c8d947ce9c675112c844857bd0a6f6f916ae80eac10bde9
                        • Instruction ID: 82a4574e5e9ae6934ed0f91982289f8c6635e47f7dce8ca3642e17b8988368c1
                        • Opcode Fuzzy Hash: 419cac719a9e4dc39c8d947ce9c675112c844857bd0a6f6f916ae80eac10bde9
                        • Instruction Fuzzy Hash: A9128B71904706DADB21CFB8C980AEEBBB9FF0A314F10452AD166E61C0D774E6E8CB54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2252 6cfb9b30-6cfb9b63 2253 6cfb9b6a-6cfb9b6e 2252->2253 2254 6cfb9f89-6cfb9f97 2253->2254 2255 6cfb9b74-6cfb9b9d call 6cf974b0 call 6cf8c940 call 6cf974c0 call 6cf8cbb0 2253->2255 2257 6cfb9f99-6cfb9fa2 2254->2257 2258 6cfb9fa4-6cfb9fa9 call 6cf97490 2254->2258 2295 6cfb9ba3-6cfb9be3 call 6cf8ce60 call 6cf8c9d0 CreateFileW 2255->2295 2296 6cfb9cc1-6cfb9cfb call 6cf974c0 call 6cf8ce30 call 6cf974d0 call 6cf8c940 call 6cf974e0 2255->2296 2260 6cfb9faf-6cfb9fd1 FindResourceW 2257->2260 2258->2260 2264 6cfb9fd8-6cfb9ff9 LoadResource 2260->2264 2265 6cfb9fd3 2260->2265 2268 6cfb9ffb-6cfba008 FreeResource 2264->2268 2269 6cfba00a-6cfba025 SizeofResource 2264->2269 2267 6cfba077-6cfba07b 2265->2267 2273 6cfba14f-6cfba153 2267->2273 2274 6cfba081-6cfba0aa CreateFileW 2267->2274 2268->2267 2270 6cfba029-6cfba069 call 6cf7aa0d LockResource call 6cf7d070 FreeResource 2269->2270 2271 6cfba027 2269->2271 2298 6cfba06f-6cfba071 2270->2298 2271->2267 2278 6cfba15c-6cfba1a0 call 6cfa4530 call 6cf7c147 2273->2278 2279 6cfba155-6cfba157 2273->2279 2275 6cfba0ac 2274->2275 2276 6cfba0b1-6cfba0c7 GetFileSize 2274->2276 2275->2273 2285 6cfba0c9 2276->2285 2286 6cfba0ce-6cfba127 call 6cf7aa0d ReadFile CloseHandle 2276->2286 2305 6cfba1a9-6cfba21c call 6cf83830 2278->2305 2306 6cfba1a2-6cfba1a4 2278->2306 2282 6cfba471-6cfba48a call 6cf7addf 2279->2282 2285->2273 2302 6cfba129-6cfba141 call 6cf7c147 2286->2302 2303 6cfba148 2286->2303 2317 6cfb9bfc-6cfb9c12 GetFileSize 2295->2317 2318 6cfb9be5-6cfb9bf7 call 6cf8c980 2295->2318 2347 6cfb9d0a-6cfb9d39 call 6cf8c9d0 call 6cfa1250 call 6cf8c9d0 call 6cfdf420 2296->2347 2348 6cfb9cfd-6cfb9d08 call 6cf974f0 2296->2348 2298->2253 2298->2267 2302->2303 2303->2273 2324 6cfba21e-6cfba220 2305->2324 2325 6cfba225-6cfba24d 2305->2325 2306->2282 2319 6cfb9c2b-6cfb9c84 call 6cf7aa0d ReadFile CloseHandle 2317->2319 2320 6cfb9c14-6cfb9c26 call 6cf8c980 2317->2320 2318->2267 2337 6cfb9cbc 2319->2337 2338 6cfb9c86-6cfb9cb7 call 6cf7c147 call 6cf8c980 2319->2338 2320->2267 2324->2282 2334 6cfba253-6cfba280 2325->2334 2335 6cfba3c6-6cfba3ca call 6cfa41a0 2325->2335 2339 6cfba329-6cfba371 2334->2339 2340 6cfba286-6cfba327 2334->2340 2350 6cfba3cf-6cfba3f3 call 6cf7c861 2335->2350 2344 6cfb9f72-6cfb9f84 call 6cf8c980 2337->2344 2338->2267 2345 6cfba375-6cfba384 2339->2345 2340->2345 2344->2298 2351 6cfba3c1 2345->2351 2352 6cfba386-6cfba3bd 2345->2352 2382 6cfb9d3e-6cfb9d4e 2347->2382 2362 6cfb9d6b-6cfb9d72 2348->2362 2363 6cfba411 2350->2363 2364 6cfba3f5-6cfba40f call 6cf8c8d0 2350->2364 2352->2351 2367 6cfb9d9a-6cfb9dfb call 6cf8c900 call 6cf8d200 call 6cf8c9d0 call 6cfdf440 2362->2367 2368 6cfb9d74-6cfb9d95 call 6cf8c980 * 2 2362->2368 2366 6cfba41b-6cfba46e 2363->2366 2364->2366 2366->2282 2391 6cfb9dfd-6cfb9e2d call 6cf8c980 * 3 2367->2391 2392 6cfb9e32-6cfb9e3f 2367->2392 2368->2267 2382->2362 2385 6cfb9d50-6cfb9d68 call 6cf7c147 2382->2385 2385->2362 2391->2267 2394 6cfb9e41-6cfb9e71 call 6cf8c980 * 3 2392->2394 2395 6cfb9e76-6cfb9ebc call 6cf7aa0d call 6cfdf520 2392->2395 2394->2267 2409 6cfb9f39-6cfb9f43 call 6cf974e0 2395->2409 2410 6cfb9ebe-6cfb9ec8 2395->2410 2417 6cfb9f45-6cfb9f4c call 6cfdf540 2409->2417 2418 6cfb9f54-6cfb9f6d call 6cf8c980 * 2 2409->2418 2410->2409 2414 6cfb9eca-6cfb9ef3 call 6cf7c147 call 6cf974e0 2410->2414 2426 6cfb9ef5-6cfb9f01 call 6cfdf540 2414->2426 2427 6cfb9f04-6cfb9f34 call 6cf8c980 * 3 2414->2427 2424 6cfb9f51 2417->2424 2418->2344 2424->2418 2426->2427 2427->2267
                        APIs
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000FF,00000000,E243FD3F), ref: 6CFB9BD0
                        • GetFileSize.KERNEL32(000000FF,00000000), ref: 6CFB9C05
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CFB9CCD
                        • FindResourceW.KERNEL32(00000000,000000FF,00000000,E243FD3F), ref: 6CFB9FBE
                        • CreateFileW.KERNEL32(000000FF,80000000,00000001,00000000,00000003,00000080,00000000), ref: 6CFBA097
                        • GetFileSize.KERNEL32(000000FF,00000000), ref: 6CFBA0BA
                        • ReadFile.KERNEL32(000000FF,00000000,00000000,00000000,00000000), ref: 6CFBA10B
                        • CloseHandle.KERNEL32(000000FF), ref: 6CFBA118
                        • _memset.LIBCMT ref: 6CFBA1B1
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: File$CreateDebugHeapSize$CloseFindHandleReadResourceStringString::__free_memsetstd::_
                        • String ID: (
                        • API String ID: 1708488715-3887548279
                        • Opcode ID: 5cd86bab5aa994db4dd2780997fb78f9287672661d4c0da728d8fc589d0601ba
                        • Instruction ID: f2f6cfd430d8978b9f89a20dc934477cb618ce7444139e980a2e623a67d0c0c8
                        • Opcode Fuzzy Hash: 5cd86bab5aa994db4dd2780997fb78f9287672661d4c0da728d8fc589d0601ba
                        • Instruction Fuzzy Hash: EE525CB0D04259CBDB24DFA4C840BEEBBB5AF49304F1082D9D51977781DB35AA88CF65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2437 6cf717b0-6cf717f6 2438 6cf719a6 2437->2438 2439 6cf717fc-6cf71800 2437->2439 2442 6cf719b5-6cf719c7 call 6cf8cec0 2438->2442 2439->2438 2440 6cf71806-6cf7186a lstrcpynW GlobalFree call 6cf74910 call 6cf83830 2439->2440 2450 6cf7188f-6cf718c0 call 6cf8c900 call 6cf83830 2440->2450 2451 6cf7186c-6cf71870 2440->2451 2447 6cf719dd-6cf719ef call 6cf8cec0 2442->2447 2448 6cf719c9-6cf719d8 call 6cf749e0 2442->2448 2459 6cf719f1-6cf71a19 call 6cf8c9d0 call 6cf748c0 call 6cf8c980 2447->2459 2460 6cf71a1e-6cf71a30 call 6cf8cec0 2447->2460 2465 6cf71b02-6cf71b27 call 6cf8c980 * 2 call 6cf7addf 2448->2465 2471 6cf718e5-6cf7190b call 6cf8c900 IsWindow 2450->2471 2472 6cf718c2-6cf718c6 2450->2472 2451->2450 2454 6cf71872-6cf71889 lstrcpyW GlobalFree 2451->2454 2454->2450 2459->2465 2468 6cf71a32-6cf71a46 call 6cf8c9d0 2460->2468 2469 6cf71a4b-6cf71a5d call 6cf8cec0 2460->2469 2500 6cf71afd call 6cf748c0 2468->2500 2487 6cf71a5f-6cf71a78 call 6cf749e0 2469->2487 2488 6cf71a7d-6cf71a8f call 6cf8cec0 2469->2488 2471->2465 2485 6cf71911-6cf7191e call 6d007580 2471->2485 2472->2471 2476 6cf718c8-6cf718df lstrcpyW GlobalFree 2472->2476 2476->2471 2502 6cf71920-6cf7193a call 6cf8c9d0 call 6cfa0430 2485->2502 2503 6cf7193c-6cf71944 2485->2503 2487->2465 2504 6cf71a91-6cf71aaa call 6cf749e0 2488->2504 2505 6cf71aac-6cf71abe call 6cf8cec0 2488->2505 2500->2465 2502->2503 2509 6cf71946-6cf7194d call 6d007580 2503->2509 2510 6cf7196b-6cf7196d 2503->2510 2504->2465 2521 6cf71ac0-6cf71ad9 call 6d01954e 2505->2521 2522 6cf71af8 2505->2522 2509->2510 2526 6cf7194f-6cf71969 call 6cf8c9d0 call 6cfa0430 2509->2526 2510->2465 2512 6cf71973-6cf71979 call 6cf8cf70 2510->2512 2523 6cf7197e-6cf71990 call 6cf8cec0 2512->2523 2531 6cf71af1-6cf71af6 2521->2531 2532 6cf71adb-6cf71aef call 6cfa2cc0 call 6cf749e0 2521->2532 2522->2500 2523->2442 2537 6cf71992-6cf719a1 call 6cf749e0 2523->2537 2526->2510 2531->2500 2532->2465 2537->2465
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF71816
                        • GlobalFree.KERNEL32 ref: 6CF71826
                        • _memset.LIBCMT ref: 6CF7185A
                        • lstrcpyW.KERNEL32(?,?), ref: 6CF7187D
                        • GlobalFree.KERNEL32 ref: 6CF71889
                          • Part of subcall function 6CF748C0: GlobalAlloc.KERNEL32(00000040,0000200C,00000000,?,6CF71B02,unsupported attribute,selected,visible,enabled,userdata,text,height,width,?,000000FF), ref: 6CF748D9
                          • Part of subcall function 6CF748C0: lstrcpynW.KERNEL32(00000004,?,00002004,?,6CF71B02,unsupported attribute,selected,visible,enabled,userdata,text,height,width,?,000000FF), ref: 6CF748F0
                        • _memset.LIBCMT ref: 6CF718B1
                        • lstrcpyW.KERNEL32(?,?,?,?,000000FF), ref: 6CF718D3
                        • GlobalFree.KERNELBASE ref: 6CF718DF
                        • IsWindow.USER32(?), ref: 6CF71902
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$Free$_memsetlstrcpylstrcpyn$AllocWindow
                        • String ID: enabled$height$selected$text$unsupported attribute$unsupported attribute with this control$userdata$visible$width
                        • API String ID: 3770548889-1816005700
                        • Opcode ID: cec8ce15f5060606ca4acee3d9f1cde1120280122bffa3c1768dcafee49d0b85
                        • Instruction ID: 021a8cb324791c0dff217640237c3b132eed791d2f26f1f272fa0546ec37631b
                        • Opcode Fuzzy Hash: cec8ce15f5060606ca4acee3d9f1cde1120280122bffa3c1768dcafee49d0b85
                        • Instruction Fuzzy Hash: 32918E719015159BDF24EF24ED50FEE7375AF95208F50829AD90967680EF30EA8DCFA0

                        Control-flow Graph

                        APIs
                          • Part of subcall function 6CFD7540: CoCreateInstance.COMBASE(6D035FE0,00000000,00000001,6D036010,?), ref: 6CFD75C8
                          • Part of subcall function 6CF8C420: _malloc.LIBCMT ref: 6CF8C450
                          • Part of subcall function 6CF8D5D0: _memset.LIBCMT ref: 6CF8D62F
                          • Part of subcall function 6CFD29D0: _memset.LIBCMT ref: 6CFD2A66
                        • _memset.LIBCMT ref: 6CF96963
                        • GetStockObject.GDI32(00000011), ref: 6CF96973
                        • GetObjectW.GDI32(00000000), ref: 6CF9697A
                        • CreateFontIndirectW.GDI32(00000000), ref: 6CF96988
                        • _memset.LIBCMT ref: 6CF969F4
                        • CreatePen.GDI32(00000000,00000001,000000DC), ref: 6CF96A67
                        • 6F551CD0.COMCTL32(?,?,?,?,?,?), ref: 6CF96A72
                        • LoadLibraryW.KERNELBASE(msimg32.dll), ref: 6CF96A7D
                        • _memset.LIBCMT ref: 6CF96B14
                        • _memset.LIBCMT ref: 6CF96B2D
                        • _memset.LIBCMT ref: 6CF96B45
                        • _memset.LIBCMT ref: 6CF96B5E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset$Create$Object$F551FontIndirectInstanceLibraryLoadStock_malloc
                        • String ID: msimg32.dll$$0
                        • API String ID: 1442371279-2677200948
                        • Opcode ID: fd67418b8a33ad443f2665245f64ca98d9fbd8a69a357fd7b5bc428481a8d8ae
                        • Instruction ID: 5aeee5cf3dd3c81bc4b2361583451dac0776a4c3a50bcbd1fd01fb1699c1316e
                        • Opcode Fuzzy Hash: fd67418b8a33ad443f2665245f64ca98d9fbd8a69a357fd7b5bc428481a8d8ae
                        • Instruction Fuzzy Hash: E5127E70901259CFEB24CB54CA54BDEBBB1BF45308F1481E8D689AB3C2DB765A84CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2704 6cfd2d00-6cfd2d31 call 6cfd2c80 call 6cfd4bd0 2709 6cfd2d50-6cfd2d60 2704->2709 2710 6cfd2d33-6cfd2d4b 2704->2710 2711 6cfd2d9b-6cfd2da5 2709->2711 2712 6cfd2d62-6cfd2d69 2709->2712 2719 6cfd3180-6cfd318d call 6cf7addf 2710->2719 2716 6cfd2da7-6cfd2db1 2711->2716 2717 6cfd2dd1-6cfd2ddb 2711->2717 2714 6cfd2d6b-6cfd2d81 2712->2714 2715 6cfd2de6-6cfd2e01 SetWindowPos 2712->2715 2718 6cfd3168-6cfd317e call 6cf8be80 2714->2718 2720 6cfd2d87-6cfd2d94 2714->2720 2715->2718 2716->2715 2721 6cfd2db3-6cfd2dba 2716->2721 2722 6cfd30c5-6cfd30cf 2717->2722 2723 6cfd2de1 2717->2723 2718->2719 2720->2711 2720->2718 2727 6cfd3149-6cfd3156 2720->2727 2728 6cfd2f20-6cfd2f2a 2720->2728 2729 6cfd2fc0-6cfd2fca 2720->2729 2730 6cfd30a2-6cfd30ab 2720->2730 2731 6cfd30e2-6cfd30ec 2720->2731 2732 6cfd2dbc-6cfd2dc6 2721->2732 2733 6cfd2e06-6cfd2e23 GetWindowRect 2721->2733 2724 6cfd30dd 2722->2724 2725 6cfd30d1-6cfd30d8 call 6cfd3200 2722->2725 2723->2718 2724->2718 2725->2724 2727->2718 2746 6cfd2fbb 2728->2746 2747 6cfd2f30-6cfd2f47 GetWindowRect 2728->2747 2738 6cfd309d 2729->2738 2739 6cfd2fd0-6cfd2fd4 2729->2739 2734 6cfd30ad-6cfd30b4 call 6cfd3200 2730->2734 2735 6cfd30c0 2730->2735 2742 6cfd30ee-6cfd30f2 2731->2742 2743 6cfd3147 2731->2743 2744 6cfd2dcc 2732->2744 2745 6cfd3158-6cfd3163 call 6cfd2c80 call 6cfd4d20 2732->2745 2736 6cfd2e58-6cfd2e91 SetWindowPos 2733->2736 2737 6cfd2e25-6cfd2e56 SetWindowPos 2733->2737 2758 6cfd30b9-6cfd30bc 2734->2758 2735->2718 2753 6cfd2e97-6cfd2ea0 2736->2753 2737->2753 2738->2718 2750 6cfd2fdc-6cfd2ffb ShowWindow 2739->2750 2751 6cfd2fd6-6cfd2fda 2739->2751 2754 6cfd3115-6cfd311f 2742->2754 2755 6cfd30f4-6cfd3113 ShowWindow 2742->2755 2743->2718 2744->2718 2745->2718 2746->2718 2756 6cfd2f7c-6cfd2fb5 SetWindowPos 2747->2756 2757 6cfd2f49-6cfd2f7a SetWindowPos 2747->2757 2763 6cfd3094-6cfd309a 2750->2763 2751->2750 2760 6cfd3000-6cfd300a 2751->2760 2761 6cfd2ee2-6cfd2eee 2753->2761 2762 6cfd2ea2-6cfd2eac 2753->2762 2754->2743 2764 6cfd3121-6cfd3144 ShowWindow 2754->2764 2755->2743 2756->2746 2757->2746 2758->2735 2760->2763 2766 6cfd3010-6cfd302d 2760->2766 2769 6cfd2f1b 2761->2769 2770 6cfd2ef0-6cfd2efa 2761->2770 2767 6cfd2eae-6cfd2eb8 2762->2767 2768 6cfd2ee0 2762->2768 2763->2738 2764->2743 2772 6cfd302f-6cfd3052 2766->2772 2773 6cfd3054-6cfd305b 2766->2773 2767->2768 2771 6cfd2eba-6cfd2edd ShowWindow 2767->2771 2768->2769 2769->2718 2770->2769 2774 6cfd2efc-6cfd2f18 ShowWindow 2770->2774 2771->2768 2772->2773 2775 6cfd305d-6cfd3064 call 6cfd3200 2772->2775 2776 6cfd3069-6cfd3073 2773->2776 2774->2769 2775->2776 2776->2763 2778 6cfd3075-6cfd3091 ShowWindow 2776->2778 2778->2763
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: G
                        • API String ID: 0-985283518
                        • Opcode ID: bd252c7d10a7fd798e1d6e40f9d369c158ab7acf8d16afd2851101e081d8d06b
                        • Instruction ID: dd6054f8f3ca879cc04b606882094ea0e7a6c35389b0b34d5d332d7cd0372f3a
                        • Opcode Fuzzy Hash: bd252c7d10a7fd798e1d6e40f9d369c158ab7acf8d16afd2851101e081d8d06b
                        • Instruction Fuzzy Hash: ACF1B271A00149EFCB08CF98C894BAEBBB1BF85305F2981C8E555AB685C731EF45DB90

                        Control-flow Graph

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 6CF701DA
                        • _memset.LIBCMT ref: 6CF701EE
                        • lstrcpyW.KERNEL32(?,?), ref: 6CF7021C
                        • GlobalFree.KERNEL32 ref: 6CF70229
                        • _memset.LIBCMT ref: 6CF70311
                        • lstrcpyW.KERNEL32(?,?,?,?,000000FF,00000000), ref: 6CF70333
                        • GlobalFree.KERNEL32 ref: 6CF70340
                        • wsprintfW.USER32 ref: 6CF703E3
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF70402
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF70418
                        • PostMessageW.USER32(00000000,00008071,00000000,00000000), ref: 6CF7043E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$Free_memsetlstrcpy$AllocInitializeMessagePostlstrcpynwsprintf
                        • String ID: XXX$install.xml$skin.zip
                        • API String ID: 2343033441-3793670083
                        • Opcode ID: ef919107ab6c99fca8fd6d39cad48e96632bf4f71523344409431309650cef08
                        • Instruction ID: ad22750a1ba70a1b9cd61bd93ddaff5e425edca67cc5f5597f92e387c1ac44ba
                        • Opcode Fuzzy Hash: ef919107ab6c99fca8fd6d39cad48e96632bf4f71523344409431309650cef08
                        • Instruction Fuzzy Hash: CC71A471A01204EBDB14EF64DD41FEE7378AF89704F10455AE609A77C1DB70A988CF64

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2850 6cf63be0-6cf63c09 2851 6cf63c3c-6cf63c3f 2850->2851 2852 6cf63c0b-6cf63c0f 2850->2852 2853 6cf63c15-6cf63c1e call 6cf8c0d0 2851->2853 2854 6cf63c41-6cf63c47 2851->2854 2852->2853 2855 6cf63f74-6cf63f80 call 6cf94b80 2852->2855 2864 6cf63c23-6cf63c39 call 6cf7addf 2853->2864 2856 6cf63c4d-6cf63c54 2854->2856 2857 6cf63d4a-6cf63d50 2854->2857 2863 6cf63f85-6cf63f96 call 6cf7addf 2855->2863 2856->2855 2860 6cf63c5a-6cf63cd8 GetCursorPos GetClientRect ScreenToClient call 6cfa03b0 2856->2860 2861 6cf63d52-6cf63d59 2857->2861 2862 6cf63d6b-6cf63d71 2857->2862 2878 6cf63d25-6cf63d45 InvalidateRect 2860->2878 2879 6cf63cda-6cf63d21 GetWindowRect SetWindowPos 2860->2879 2861->2855 2866 6cf63d5f-6cf63d66 2861->2866 2868 6cf63d77-6cf63d7f 2862->2868 2869 6cf63e45-6cf63e48 2862->2869 2866->2855 2868->2855 2875 6cf63d85-6cf63e0a GetClientRect GetCursorPos ScreenToClient call 6cfa03b0 2868->2875 2872 6cf63e8f-6cf63e95 2869->2872 2873 6cf63e4a-6cf63e51 2869->2873 2872->2864 2877 6cf63e9b-6cf63ea1 2872->2877 2873->2855 2880 6cf63e57-6cf63e8c call 6cf94b80 73A1A570 call 6cf6dec0 call 6cf7addf 2873->2880 2886 6cf63e2f-6cf63e40 InvalidateRect 2875->2886 2887 6cf63e0c-6cf63e2c call 6d007580 call 6cf70720 2875->2887 2882 6cf63ea7-6cf63eae 2877->2882 2883 6cf63f50-6cf63f53 2877->2883 2878->2855 2879->2878 2888 6cf63f00-6cf63f07 2882->2888 2889 6cf63eb0-6cf63ed4 call 6cf64da0 2882->2889 2883->2855 2890 6cf63f55-6cf63f5c 2883->2890 2886->2855 2887->2886 2888->2855 2895 6cf63f09-6cf63f2d call 6cf64e00 2888->2895 2889->2888 2903 6cf63ed6-6cf63efd call 6cf7addf 2889->2903 2890->2855 2894 6cf63f5e-6cf63f65 2890->2894 2894->2855 2899 6cf63f67-6cf63f6f call 6cfa0430 2894->2899 2895->2855 2908 6cf63f2f-6cf63f4d call 6cf619c0 call 6cf7addf 2895->2908 2899->2855
                        APIs
                        • GetCursorPos.USER32(?), ref: 6CF63C5F
                        • GetClientRect.USER32(?,?), ref: 6CF63C7E
                        • ScreenToClient.USER32(?,?), ref: 6CF63C8D
                        • GetWindowRect.USER32(?,?), ref: 6CF63CEF
                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000001), ref: 6CF63D17
                        • InvalidateRect.USER32(?,?,00000001,?,?), ref: 6CF63D3C
                          • Part of subcall function 6CF8C0D0: PostMessageW.USER32(?,?,?,00000000), ref: 6CF8C0EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$ClientWindow$CursorInvalidateMessagePostScreen
                        • String ID: editLicense$s
                        • API String ID: 2400065917-3755112512
                        • Opcode ID: 2d34b886ef4efaba59e59ee32ff5c83a3e0ea12f9e80ca15b609aad0507f09ab
                        • Instruction ID: f73d94151cdb72114ec6834e69cbe145bb33b8af431e3194dd51dc9e82bf8264
                        • Opcode Fuzzy Hash: 2d34b886ef4efaba59e59ee32ff5c83a3e0ea12f9e80ca15b609aad0507f09ab
                        • Instruction Fuzzy Hash: F1B16E75A04301DFCB14DF65D680F9AB7F5EB89318F10892EF45987A80D734A989CF92
                        APIs
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        • lstrcatW.KERNEL32(00000000,00000000,ShowPage,004D70B0,00000000,00000000), ref: 00401A76
                        • CompareFileTime.KERNEL32(-00000014,?,ShowPage,ShowPage,00000000,00000000,ShowPage,004D70B0,00000000,00000000), ref: 00401AA0
                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00428BB1,74DF23A0,00000000), ref: 00404FD6
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FE6
                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FF9
                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                        • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$ShowPage
                        • API String ID: 4286501637-3981414064
                        • Opcode ID: 23359e57e86623cb041ae238ad4d2dfc68e00f0e31f0802a264bc06316deb979
                        • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                        • Opcode Fuzzy Hash: 23359e57e86623cb041ae238ad4d2dfc68e00f0e31f0802a264bc06316deb979
                        • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D
                        APIs
                          • Part of subcall function 6CFCF970: _free.LIBCMT ref: 6CFCF985
                          • Part of subcall function 6CFCF970: _free.LIBCMT ref: 6CFCF99D
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,74E2F860,00000000,E243FD3F), ref: 6CFCF358
                        • GetFileSize.KERNEL32(000000FF,00000000), ref: 6CFCF3AB
                          • Part of subcall function 6CFD06D0: _wcsncpy.LIBCMT ref: 6CFD06E6
                          • Part of subcall function 6CFD06D0: _wcsncpy.LIBCMT ref: 6CFD0713
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CFCF587
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _free$DebugFileHeap_wcsncpy$CreateSizeStringString::_std::_
                        • String ID: Could not find ziped file$Could not read file$Could not unzip file$Error opening file$Error opening zip file$File is empty$File too large
                        • API String ID: 2069743891-2950584456
                        • Opcode ID: 24f9072254c9761c5ad8367671ad41805c2295ab1c45453b335c7970bcdbdb0b
                        • Instruction ID: 58007f32d3944874b18787a272ed9bdf8db18ec9d9fc225fd55ca654d386c09c
                        • Opcode Fuzzy Hash: 24f9072254c9761c5ad8367671ad41805c2295ab1c45453b335c7970bcdbdb0b
                        • Instruction Fuzzy Hash: 20F188B0E06268DBDB20DB64DC40BDEBB75AF15304F1482D9E15967A81DB306F88CF66
                        APIs
                        • GetWindowRect.USER32(00000000,?), ref: 6CFD3243
                        • _memset.LIBCMT ref: 6CFD32E6
                        • SelectObject.GDI32(00000000,00000000), ref: 6CFD3369
                        • GetLastError.KERNEL32 ref: 6CFD3372
                          • Part of subcall function 6CFD31C0: GetLastError.KERNEL32(00000400,6CFD3381,00000000,00000000,?,?,6CFD3381), ref: 6CFD31D1
                          • Part of subcall function 6CFD31C0: FormatMessageW.KERNELBASE(00001100,00000000,00000000,?,?,6CFD3381), ref: 6CFD31DF
                          • Part of subcall function 6CFD31C0: LocalFree.KERNEL32(6CFD3381,?,?,6CFD3381), ref: 6CFD31E9
                          • Part of subcall function 6CFBAD50: GetModuleHandleW.KERNEL32(msimg32.dll,AlphaBlend), ref: 6CFBAD86
                          • Part of subcall function 6CFBAD50: GetProcAddress.KERNEL32(00000000), ref: 6CFBAD8D
                        • MoveWindow.USER32(00000000,?,?,00000000,?,00000000,?,00000000,?), ref: 6CFD3575
                        • UpdateLayeredWindow.USER32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000002), ref: 6CFD359F
                        • SelectObject.GDI32(00000000,6CFD4A32), ref: 6CFD35B0
                        • DeleteObject.GDI32(00000000), ref: 6CFD35BA
                        • DeleteDC.GDI32(00000000), ref: 6CFD35C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ObjectWindow$DeleteErrorLastSelect$AddressFormatFreeHandleLayeredLocalMessageModuleMoveProcRectUpdate_memset
                        • String ID: (
                        • API String ID: 4092839018-3887548279
                        • Opcode ID: 00e3e12dccf80a1607875fe454c6b2987a0df90d62604701fb2226bad0a16b0a
                        • Instruction ID: 7e8cea3a6e253888a4355e7b43a9dd25910c92e80f04e7e23132210cfe271b20
                        • Opcode Fuzzy Hash: 00e3e12dccf80a1607875fe454c6b2987a0df90d62604701fb2226bad0a16b0a
                        • Instruction Fuzzy Hash: 30D14C71E04258DFDB14CFA8C894BEEBBB5BF49304F248199E509AB345D730AA85CF51
                        APIs
                        • SelectObject.GDI32(?,00000000), ref: 6CFBDE41
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ObjectSelect
                        • String ID: &#x
                        • API String ID: 1517587568-603352367
                        • Opcode ID: b71509ed1acc912eb7ea17d292e545d3d6813503f99a4e566e6c8c6a92ffa63b
                        • Instruction ID: a526d55fcc74846f9c02854d42f8a25c7ff477e25ea52588e67c81b5f322760b
                        • Opcode Fuzzy Hash: b71509ed1acc912eb7ea17d292e545d3d6813503f99a4e566e6c8c6a92ffa63b
                        • Instruction Fuzzy Hash: FA72F2B1905669DFDB24CF65CC90BEEBBB5AB48305F1082D9E509B7680DB349E84CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGlobal$_memsetlstrcpy$Windowlstrcpyn
                        • String ID:
                        • API String ID: 2383034679-0
                        • Opcode ID: 7319cb1f2e180c4134fc287c73430e5131c5189898672906351b73304ad6260b
                        • Instruction ID: 07acfad80c44ab3a54f9c6f1e5b85953d26c3ed840c7612c866bf590496165c3
                        • Opcode Fuzzy Hash: 7319cb1f2e180c4134fc287c73430e5131c5189898672906351b73304ad6260b
                        • Instruction Fuzzy Hash: 626162B2901114DBCB24EF64DD50FEAB379BF85714F504299D61AA7A40DB30EA49CFA0
                        APIs
                        • GetTickCount.KERNEL32 ref: 004035C4
                        • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                          • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                          • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                        • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                        Strings
                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                        • Null, xrefs: 004036AA
                        • Error launching installer, xrefs: 00403603
                        • Inst, xrefs: 00403698
                        • soft, xrefs: 004036A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                        • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                        • API String ID: 4283519449-527102705
                        • Opcode ID: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                        • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                        • Opcode Fuzzy Hash: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                        • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: /../$/..\$\../$\..\
                        • API String ID: 4104443479-3885502717
                        • Opcode ID: 5e7b5fb70ca130f6e1530c9280c7fe1d4cf6cfa5431475c11672ec7556f63316
                        • Instruction ID: 7d78f14759ee9433aceef4a6535e6cff77b13d7f079e1d6a463577abaa69d411
                        • Opcode Fuzzy Hash: 5e7b5fb70ca130f6e1530c9280c7fe1d4cf6cfa5431475c11672ec7556f63316
                        • Instruction Fuzzy Hash: 76523C70A012189FDB15CF58C990BEDB7B5AF89304F1882E9E519AB385D730AF81CF90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: %s%s$%s%s%s
                        • API String ID: 0-1506711308
                        • Opcode ID: 45a411f8884dfe8a536a7c97f75943245a69106a6d1c62919ebc657fb2090543
                        • Instruction ID: e97aa7d7cc20fa4ce8a052b8c2d1aa136eef4a1d4614600709f3c80384c34f27
                        • Opcode Fuzzy Hash: 45a411f8884dfe8a536a7c97f75943245a69106a6d1c62919ebc657fb2090543
                        • Instruction Fuzzy Hash: D0026071905119CFDB24CF14CD84BAAB7B2AF85308F1A82D9E4196B740DB32AED5CF91
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF639AF
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF639C4
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF639DD
                        • lstrcpynW.KERNEL32(00000004,ui_inited,00002004), ref: 6CF639F1
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF63B0C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocGloballstrcpyn$Xinvalid_argumentstd::_
                        • String ID: .txt$editLicense$list<T> too long$ui_inited
                        • API String ID: 1084485446-4130411850
                        • Opcode ID: ba08f00ba96890524c0bcc628522458b2081b90fb1af37db8629257b65a2a58e
                        • Instruction ID: 05d82b68585620f4c38bb878c3fbc4573ec5a9fee85249d100b0b441579204ad
                        • Opcode Fuzzy Hash: ba08f00ba96890524c0bcc628522458b2081b90fb1af37db8629257b65a2a58e
                        • Instruction Fuzzy Hash: AEB18AB1608381CFD714DF29C580BAAB7F5BF89708F14491DE49987B91D770E849CB92
                        APIs
                        • GetTickCount.KERNEL32 ref: 004033F1
                        • GetTickCount.KERNEL32 ref: 00403492
                        • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                        • wsprintfW.USER32 ref: 004034CE
                        • WriteFile.KERNELBASE(00000000,00000000,00428BB1,00403792,00000000), ref: 004034FF
                        • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CountFileTickWrite$wsprintf
                        • String ID: (]C$... %d%%$pAB
                        • API String ID: 651206458-3635341587
                        • Opcode ID: cb4c91118d633cdc657fe6c8c56820a3b26f1ee58aa4180b17ceb2c9431ae53d
                        • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                        • Opcode Fuzzy Hash: cb4c91118d633cdc657fe6c8c56820a3b26f1ee58aa4180b17ceb2c9431ae53d
                        • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF61CF9
                        • __CxxThrowException@8.LIBCMT ref: 6CF61D0E
                        • std::exception::exception.LIBCMT ref: 6CF61D1D
                        • __CxxThrowException@8.LIBCMT ref: 6CF61D32
                        • std::exception::exception.LIBCMT ref: 6CF61D41
                        • __CxxThrowException@8.LIBCMT ref: 6CF61D56
                        • std::exception::exception.LIBCMT ref: 6CF61D65
                        • __CxxThrowException@8.LIBCMT ref: 6CF61D7A
                        • std::exception::exception.LIBCMT ref: 6CF61D89
                        • __CxxThrowException@8.LIBCMT ref: 6CF61D9E
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8B0
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8CA
                          • Part of subcall function 6CF7C861: __CxxThrowException@8.LIBCMT ref: 6CF7C8DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                        • String ID:
                        • API String ID: 2621100827-0
                        • Opcode ID: df9705d3a88584009c2c1e9c8568471d55a77d5dd0671868b5dbd9eff9d7de25
                        • Instruction ID: 21392575428012c828f7da844d9fa76acad6014f57a71a05efa2f3d3db959de8
                        • Opcode Fuzzy Hash: df9705d3a88584009c2c1e9c8568471d55a77d5dd0671868b5dbd9eff9d7de25
                        • Instruction Fuzzy Hash: 17516DB1901704DFC761CF69D980AEEBBF0FF58600F14866ED449A7B51E731AA08CB62
                        APIs
                        • IntersectRect.USER32(00000000,?,?), ref: 6CFCDA38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: IntersectRect
                        • String ID:
                        • API String ID: 481094312-0
                        • Opcode ID: 7dac4e6525abba0ebb98c4ddbea3a74dfbf4954f4cac856dd0777189af07a3e7
                        • Instruction ID: 2ae48e1bd3b20577acd3ee45a1916ee162727b1470ee227b95911ef91cfd3f0f
                        • Opcode Fuzzy Hash: 7dac4e6525abba0ebb98c4ddbea3a74dfbf4954f4cac856dd0777189af07a3e7
                        • Instruction Fuzzy Hash: 60420A74A002099FCB58DF68C890BEEB7B1BF89314F1482A9E459AB751DB30AD85CF51
                        APIs
                        • lstrlenW.KERNEL32(?), ref: 6F952958
                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6F952985
                        • lstrcpynW.KERNEL32(00000000,?), ref: 6F952998
                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6F9529B4
                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6F9529C1
                        • GlobalFree.KERNEL32(00000000), ref: 6F9529C8
                        • GlobalAlloc.KERNEL32(00000040), ref: 6F9529D8
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F9529EF
                        • GlobalFree.KERNELBASE(00000000), ref: 6F952A19
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$Alloc$Free$ByteCharFromMultiStringWidelstrcpynlstrlen
                        • String ID:
                        • API String ID: 916651646-0
                        • Opcode ID: 3e876ff800af75e58e2a559d1f6f366aeed590134c889fe575416fd2505727c6
                        • Instruction ID: 4006e292df1972aee6b3d404d24a3f841df3edf44532779ba96872249562a8fd
                        • Opcode Fuzzy Hash: 3e876ff800af75e58e2a559d1f6f366aeed590134c889fe575416fd2505727c6
                        • Instruction Fuzzy Hash: C541AA71108301AFE764CF788944A6A7BF8FF46321F100A1AE61ADA2D1D730E4B9CF61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGlobal$Windowlstrcpyn$Update_memsetlstrcpy
                        • String ID:
                        • API String ID: 1311623043-0
                        • Opcode ID: 3aaffdbd6d4fe5bd4b0688e53861effc3ce169d50a59e14180049c1d0dba2f82
                        • Instruction ID: a00c6c64d1f0fe98430fc90df8edcc78cb6dfe15b7d148a4be75f195c77adc24
                        • Opcode Fuzzy Hash: 3aaffdbd6d4fe5bd4b0688e53861effc3ce169d50a59e14180049c1d0dba2f82
                        • Instruction Fuzzy Hash: B351BF76901314DFCB24DF68DA80FAAB3B9BFC9714F10455AE94597700DB71A984CFA0
                        APIs
                          • Part of subcall function 6CF8B7D0: IsWindow.USER32(?), ref: 6CF8B7E0
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        • lstrcpynW.KERNEL32(?,?,00000080,?), ref: 6CF70629
                        • GlobalFree.KERNEL32 ref: 6CF7063A
                        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 6CF706AB
                        • TranslateMessage.USER32(00000000), ref: 6CF706DA
                        • DispatchMessageW.USER32(00000000), ref: 6CF706E3
                        • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00000000,00000000), ref: 6CF706F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CallbackDispatcherMessageUser$DispatchFreeGlobalTranslateWindow_freelstrcpyn
                        • String ID: logo.ico
                        • API String ID: 2296167118-87942624
                        • Opcode ID: 99defe743fc28bdd9bea8b73d98bae1df0e3e416d2e4ca5b4ab42e54ef3bc88e
                        • Instruction ID: a370a1cfb5c71f96fca97e9159666b13594a558adfe58e77751e67665446eeb2
                        • Opcode Fuzzy Hash: 99defe743fc28bdd9bea8b73d98bae1df0e3e416d2e4ca5b4ab42e54ef3bc88e
                        • Instruction Fuzzy Hash: 78413171A01218DFDF14EF64DD90FDAB7B8EF89704F104199E94997640DB71AA88CFA0
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040241C
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00428BB1,74DF23A0,00000000), ref: 00404FD6
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FE6
                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FF9
                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                        • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                        Strings
                        • Error registering DLL: %s not found in %s, xrefs: 0040249A
                        • `G, xrefs: 0040246E
                        • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                        • Error registering DLL: Could not load %s, xrefs: 004024DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                        • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                        • API String ID: 1033533793-4193110038
                        • Opcode ID: c076069b8b51cc5180cfdda9fa0df6bded6a99c0ce616e210176aacc9454d606
                        • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                        • Opcode Fuzzy Hash: c076069b8b51cc5180cfdda9fa0df6bded6a99c0ce616e210176aacc9454d606
                        • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF63067
                        • __CxxThrowException@8.LIBCMT ref: 6CF6307C
                        • std::exception::exception.LIBCMT ref: 6CF6308B
                        • __CxxThrowException@8.LIBCMT ref: 6CF630A0
                        • std::exception::exception.LIBCMT ref: 6CF630AF
                        • __CxxThrowException@8.LIBCMT ref: 6CF630C4
                        • std::exception::exception.LIBCMT ref: 6CF630D3
                        • __CxxThrowException@8.LIBCMT ref: 6CF630E8
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8B0
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8CA
                          • Part of subcall function 6CF7C861: __CxxThrowException@8.LIBCMT ref: 6CF7C8DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                        • String ID:
                        • API String ID: 2621100827-0
                        • Opcode ID: 3413db461a175ded4634e89aa8cfa65850fccea547189820b8738daac46ddbf6
                        • Instruction ID: 5c982adbfa3035d7f52df8a96150e2f69e1ef01876cd405f26c3bd6e0415685b
                        • Opcode Fuzzy Hash: 3413db461a175ded4634e89aa8cfa65850fccea547189820b8738daac46ddbf6
                        • Instruction Fuzzy Hash: 6391A7B0905604DFC721CF68C684BDABBF0EB59304F14856ED45E97702E735A908CFA2
                        APIs
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,00000003,00000000,00000000), ref: 6CFCF0CA
                        • _malloc.LIBCMT ref: 6CFCF0DB
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,00000003,?,00000000), ref: 6CFCF101
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,6CFA1AE0,00000000,00000000), ref: 6CFCF130
                        • _malloc.LIBCMT ref: 6CFCF141
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,6CFA1AE0,?,6CFA1AE0), ref: 6CFCF164
                        • _malloc.LIBCMT ref: 6CFCF252
                        • _memmove.LIBCMT ref: 6CFCF26F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$_malloc$_memmove
                        • String ID:
                        • API String ID: 3455049887-0
                        • Opcode ID: 95e7ca84321498eab80927df39c2eaa79e8653a3d60507a890d4573326f2f128
                        • Instruction ID: 4b1ba527608a748b0f57834b800858522dd1880de6e826024f21f830c23592a5
                        • Opcode Fuzzy Hash: 95e7ca84321498eab80927df39c2eaa79e8653a3d60507a890d4573326f2f128
                        • Instruction Fuzzy Hash: 9C818175B0424AAFCB54CF68C490BEEBB72EF89314F14C158E9499F781C731AA46CB91
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF62A69
                        • OutputDebugStringW.KERNELBASE(00000000,images,E243FD3F,00000000,?,74DEFFC0), ref: 6CF62AD8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DebugOutputStringXinvalid_argumentstd::_
                        • String ID: %s, %s, %s$Window$images$list<T> too long
                        • API String ID: 1269862971-2528853410
                        • Opcode ID: f443d4126717b246f85ca21c21482f3441bdaea45b8b0d7dc9c0a4dd48374f7b
                        • Instruction ID: f5b7ab6e6a0d15409d032ee79c2966e3afc9f390e2b45baca5fa514c050a5195
                        • Opcode Fuzzy Hash: f443d4126717b246f85ca21c21482f3441bdaea45b8b0d7dc9c0a4dd48374f7b
                        • Instruction Fuzzy Hash: 8061DE716083418FC714DF2AC984BEAB7F5BF85318F040A5DE499A7E41DB71E9488BA2
                        APIs
                        • FindResourceW.KERNEL32(00000000,?,6CF70290,74E2F860), ref: 6CFA1A5F
                          • Part of subcall function 6CFCEFE0: _wcslen.LIBCMT ref: 6CFCEFF5
                          • Part of subcall function 6CFCEFE0: _malloc.LIBCMT ref: 6CFCF009
                          • Part of subcall function 6CFCEFE0: _memmove.LIBCMT ref: 6CFCF026
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FindResource_malloc_memmove_wcslen
                        • String ID:
                        • API String ID: 2598395083-0
                        • Opcode ID: 8c0b9d5509c43a270e425d2284f9a8398c21f72c438a536ff253f483484e5ce0
                        • Instruction ID: 68f212e6aadfab57f85571edbc4b3f1b55c9400790e9dbb4f67f3cab5448372e
                        • Opcode Fuzzy Hash: 8c0b9d5509c43a270e425d2284f9a8398c21f72c438a536ff253f483484e5ce0
                        • Instruction Fuzzy Hash: DD41A672E00129EBCB18DBE9DC58BABB7B9AF8D344F108599F409D7640DB34D9858B60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGlobal$TextWindow_memsetlstrcpylstrcpyn
                        • String ID:
                        • API String ID: 1391933569-0
                        • Opcode ID: 03a310116181ce18dc6c3ee11beb0f67b548401caa8fff15b55557e95951051a
                        • Instruction ID: 127460a678b3b23284a9daa362dacd73d0841fd52baa8561daecc3af6d6218fe
                        • Opcode Fuzzy Hash: 03a310116181ce18dc6c3ee11beb0f67b548401caa8fff15b55557e95951051a
                        • Instruction Fuzzy Hash: 6A213D76902208DFCB24DF68D980F9AB7B9EF89714F20455AE90597340D771E988CFA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _malloc
                        • String ID: invalid filter$not enough pixels$outofmem
                        • API String ID: 1579825452-151463205
                        • Opcode ID: 8bab5281eaac270ddf5d30dd28cdb204d9bf61500889cdb5bbf1783fbab639e6
                        • Instruction ID: 659e3ef6af5be1097dafe2caa753473b179164898f8848107566f163ef11c019
                        • Opcode Fuzzy Hash: 8bab5281eaac270ddf5d30dd28cdb204d9bf61500889cdb5bbf1783fbab639e6
                        • Instruction Fuzzy Hash: E5C2F575E04199CFCB05CFA9C590AAEBBB1FF4A308F188159E851BB745C339AA52CF50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                        • String ID:
                        • API String ID: 4048096073-0
                        • Opcode ID: ec2f3f45b22c6c1f499700662e45d79e4d94285a8cedecb7b0c9d721168bfe6e
                        • Instruction ID: ffc953ee35c82723f23e1d09190ce1f6149c9b023b9b1c49f593a65aa51f8bdc
                        • Opcode Fuzzy Hash: ec2f3f45b22c6c1f499700662e45d79e4d94285a8cedecb7b0c9d721168bfe6e
                        • Instruction Fuzzy Hash: 9751DA71A01709DBDB309FF9A84068E77B5AF41328F21826BE83597A90D770DA54CF70
                        APIs
                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                        • GlobalFree.KERNELBASE(00000000), ref: 00402387
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGloballstrcpyn
                        • String ID: Exch: stack < %d elements$Pop: stack empty$ShowPage
                        • API String ID: 1459762280-2337487663
                        • Opcode ID: e59d48cc0b33387c2730e4ad274f001f3a7594b7c65e82bccf9c8afdadd6d069
                        • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                        • Opcode Fuzzy Hash: e59d48cc0b33387c2730e4ad274f001f3a7594b7c65e82bccf9c8afdadd6d069
                        • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D
                        APIs
                        • _malloc.LIBCMT ref: 6CF87E24
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        • _free.LIBCMT ref: 6CF87E37
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocateHeap_free_malloc
                        • String ID:
                        • API String ID: 1020059152-0
                        • Opcode ID: bb773307f19fce5320b956fdc27c434a89d0b041e86b65be2694e9a0534cccb2
                        • Instruction ID: 1886dea2e195e6431e10ecd8a5be66a541f058d7220cb6da32cccb0df58979de
                        • Opcode Fuzzy Hash: bb773307f19fce5320b956fdc27c434a89d0b041e86b65be2694e9a0534cccb2
                        • Instruction Fuzzy Hash: 0211A732A46516ABCB321B75A804BCB3BB59F55369B214527F8549BE40DF318C4446F4
                        APIs
                        • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                        • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                        • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                        • GlobalFree.KERNELBASE(00000000), ref: 00402387
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                        • String ID:
                        • API String ID: 3376005127-0
                        • Opcode ID: 62822491a2171e7313e749cd3bc434bc25a9f92e131eb6a230f292f9eb063890
                        • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                        • Opcode Fuzzy Hash: 62822491a2171e7313e749cd3bc434bc25a9f92e131eb6a230f292f9eb063890
                        • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                        • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                        • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                        • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                        • String ID:
                        • API String ID: 2568930968-0
                        • Opcode ID: 39b3758b80fcd953e19c2f81128d57e0ae640eda6b6d66c2b66b0c237e413b24
                        • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                        • Opcode Fuzzy Hash: 39b3758b80fcd953e19c2f81128d57e0ae640eda6b6d66c2b66b0c237e413b24
                        • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68
                        APIs
                        • _vswprintf_s.LIBCMT ref: 6CF8D552
                          • Part of subcall function 6D01841D: __vsnwprintf_l.LIBCMT ref: 6D018430
                        • _malloc.LIBCMT ref: 6CF8D56B
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        • _memset.LIBCMT ref: 6CF8D580
                        • _vswprintf_s.LIBCMT ref: 6CF8D59B
                          • Part of subcall function 6CF8CAD0: _wcslen.LIBCMT ref: 6CF8CAF0
                          • Part of subcall function 6CF8CAD0: _free.LIBCMT ref: 6CF8CB22
                          • Part of subcall function 6CF8CAD0: _wcsncpy.LIBCMT ref: 6CF8CB90
                        • _free.LIBCMT ref: 6CF8D5B8
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Heap_free_vswprintf_s$AllocateErrorFreeLast__vsnwprintf_l_malloc_memset_wcslen_wcsncpy
                        • String ID:
                        • API String ID: 246700949-0
                        • Opcode ID: 508418e29619212fee40b68fdadcee9c50b6da2f11f2d5297319a23dcb07fa83
                        • Instruction ID: 643eab3c5d0cd15375abc3db21d116a234be956453be25a7f23f89d8a0023b8a
                        • Opcode Fuzzy Hash: 508418e29619212fee40b68fdadcee9c50b6da2f11f2d5297319a23dcb07fa83
                        • Instruction Fuzzy Hash: 4E11C0B5E04108BBDB54DFD8DC81E9EB7B9EF48204F148698E91997340E631AB148B91
                        APIs
                          • Part of subcall function 6CF973C0: 73A1A570.USER32(?,00000000,00000000,00000000,00000000,00000053,?), ref: 6CF97455
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CF94A31
                        • MessageBoxW.USER32(00000000,00000000,Duilib,00000010), ref: 6CF94A5A
                        • ExitProcess.KERNEL32 ref: 6CF94A62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DebugHeap$A570ExitMessageProcessStringString::_std::_
                        • String ID: Duilib
                        • API String ID: 2211569601-72997937
                        • Opcode ID: 33acccb884f8b74d90ccd3d71c84908dc7e03d739f4fee4cb80a6f5ab79735ba
                        • Instruction ID: b75229c6023e3cf008628ab8ab1a3ad5b44d37fc1d350d1e43b96a1d1fde6903
                        • Opcode Fuzzy Hash: 33acccb884f8b74d90ccd3d71c84908dc7e03d739f4fee4cb80a6f5ab79735ba
                        • Instruction Fuzzy Hash: 12B1E5B09012289FDB64DB18CC90BD9F7B5AF48308F5052D9E619A7391DB706F88CF69
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object_memset
                        • String ID: CreateTextServices$Msftedit.dll
                        • API String ID: 2040364543-398192312
                        • Opcode ID: 5ad15788aa6d2fed04da6147048cf6e6321e6dadc1c2d987568d688c0c61235a
                        • Instruction ID: 6c9c0bea9a9ee3eaa9bfda11f98ce03c844585709cb0d29f03e8bb9a350c8ebc
                        • Opcode Fuzzy Hash: 5ad15788aa6d2fed04da6147048cf6e6321e6dadc1c2d987568d688c0c61235a
                        • Instruction Fuzzy Hash: 0C61D6B9E01209DFDB04CF98C495BAEBBB1BF88318F108199E9159B795D770E981CBD0
                        APIs
                          • Part of subcall function 6F951C1B: GlobalFree.KERNEL32(?), ref: 6F951E69
                          • Part of subcall function 6F951C1B: GlobalFree.KERNELBASE(?), ref: 6F951E6E
                          • Part of subcall function 6F951C1B: GlobalFree.KERNELBASE(?), ref: 6F951E73
                        • GlobalFree.KERNEL32(00000000), ref: 6F952AFA
                        • FreeLibrary.KERNEL32(?), ref: 6F952B71
                        • GlobalFree.KERNEL32(00000000), ref: 6F952B96
                          • Part of subcall function 6F9523C1: GlobalAlloc.KERNEL32(00000040,00000000), ref: 6F9523F3
                          • Part of subcall function 6F9525B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,?,6F952ACB,00000000), ref: 6F952611
                          • Part of subcall function 6F951904: lstrcpyW.KERNEL32(00000000,error,00000000,6F95287B,00000000), ref: 6F951929
                          • Part of subcall function 6F952445: wsprintfW.USER32 ref: 6F9524E8
                          • Part of subcall function 6F952445: GlobalFree.KERNEL32(?), ref: 6F952516
                          • Part of subcall function 6F952445: GlobalFree.KERNEL32(00000000), ref: 6F95253F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                        • String ID:
                        • API String ID: 1767494692-3916222277
                        • Opcode ID: 11ee72a18cce88ff89d727e2c1c84fd7b8f11ac8665c8ac79dfda2c4faab9bdb
                        • Instruction ID: ee4c0d908d72fa17a4f66c8bd660878bc7153d5a32f497799ee112715a492d1e
                        • Opcode Fuzzy Hash: 11ee72a18cce88ff89d727e2c1c84fd7b8f11ac8665c8ac79dfda2c4faab9bdb
                        • Instruction Fuzzy Hash: 7631B3714043459ADF54DFB898C4B963BACAF16328F144426E919AE0D7DBB4E0B5CA60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _free
                        • String ID: bad req_comp
                        • API String ID: 269201875-3549665374
                        • Opcode ID: 21c519371a4d52cf3fa1dc34b7be5a1550aa36ccc2e93021e47a747c9fee14ea
                        • Instruction ID: 0750227c3d35280596b9c96a9f5219040d293bb7de1704ffd74d019963d90ecd
                        • Opcode Fuzzy Hash: 21c519371a4d52cf3fa1dc34b7be5a1550aa36ccc2e93021e47a747c9fee14ea
                        • Instruction Fuzzy Hash: F841E4B9600208EFDB44DF54C480B9ABBB1FF89358F24C198E8098B351D735EA86CBD0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __fassign$__wcsicoll_free
                        • String ID: size
                        • API String ID: 1821799827-4156564586
                        • Opcode ID: c09b6b04bc4209ba3b5c08208dd28156d1651608a0fc6f238d46ce3f69d3937f
                        • Instruction ID: d5eca398e88988ee2021eab55fa727c991319c17c2f85deb232e22c432114f34
                        • Opcode Fuzzy Hash: c09b6b04bc4209ba3b5c08208dd28156d1651608a0fc6f238d46ce3f69d3937f
                        • Instruction Fuzzy Hash: A0310671E051289BDB24DB68CC95BDAB3B4AF44315F2482D9E11DA7680EB346F88CF51
                        APIs
                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$Timeout
                        • String ID: !
                        • API String ID: 1777923405-2657877971
                        • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                        • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                        • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                        • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _wcslen$_free_wcsncpy
                        • String ID: ?
                        • API String ID: 3312590453-1684325040
                        • Opcode ID: 83c4e04ced0c35d90007358bf620018d9ab5b002182313b935d3b80e5be4fd74
                        • Instruction ID: c6911270186eeda0c3641ed06c55ec8c7d49272f0cbd39624dbdec830269f184
                        • Opcode Fuzzy Hash: 83c4e04ced0c35d90007358bf620018d9ab5b002182313b935d3b80e5be4fd74
                        • Instruction Fuzzy Hash: 8831FAB5A05108EFDB04DFA4C580A9DB7B5FF89319F2482A8E805AB740E730AF45DF91
                        APIs
                          • Part of subcall function 6F9515A3: lstrcpyW.KERNEL32(00000000,?,?,?,6F95185F,?,6F951017), ref: 6F9515C1
                          • Part of subcall function 6F9515A3: GlobalFree.KERNEL32 ref: 6F9515D2
                        • GlobalFree.KERNEL32(?), ref: 6F951A04
                        • GlobalFree.KERNEL32(?), ref: 6F951A9C
                        • GlobalFree.KERNELBASE(?), ref: 6F951AA1
                        • __alldvrm.LIBCMT ref: 6F951ACB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGlobal$__alldvrmlstrcpy
                        • String ID:
                        • API String ID: 1811517867-0
                        • Opcode ID: 30f89d33481757dd4014b647400f95ccd9f521134b74788e087700d2097ea101
                        • Instruction ID: a642c6a6be5a80771a78e6cedf304b59059f2247557daba0f8f8837f28aae8c7
                        • Opcode Fuzzy Hash: 30f89d33481757dd4014b647400f95ccd9f521134b74788e087700d2097ea101
                        • Instruction Fuzzy Hash: 6C512331D04208AB9BA2DFF8C5809ADB7B9EF87354B118257D818971D4E735EFF08A51
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 6CFDDF03
                        • _wcslen.LIBCMT ref: 6CFDDF12
                        • _wcscat.LIBCMT ref: 6CFDDF4A
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 6CFDDF62
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CurrentDirectoryFilePointer_wcscat_wcslen
                        • String ID:
                        • API String ID: 1723098609-0
                        • Opcode ID: 0f2b0e60c03a25d2d99e8aee66fb888ae0e29496b37f9b9c589f414258fd0115
                        • Instruction ID: 9353113fa5050c85d4cf1ad595678112acbbfd7abceed7c0d8af175689944eb7
                        • Opcode Fuzzy Hash: 0f2b0e60c03a25d2d99e8aee66fb888ae0e29496b37f9b9c589f414258fd0115
                        • Instruction Fuzzy Hash: 5E3191B5D0420ADBDB00DFA8C885BAFB775EF45308F194658F514A7A80E330AA91CFA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_malloc_memmovestd::exception::exception
                        • String ID:
                        • API String ID: 3703101265-0
                        • Opcode ID: 7d8c022cc382d7add20709b17183ecd137ad99761f14c9d611708e595f4c36e0
                        • Instruction ID: dad8a5cd9720979e2791f8b1c59d157f90c12b8e4d1d1bf83422841cb5e4a562
                        • Opcode Fuzzy Hash: 7d8c022cc382d7add20709b17183ecd137ad99761f14c9d611708e595f4c36e0
                        • Instruction Fuzzy Hash: 3211D632901205AFD721CF58E844A9AB7B9EF85328F14C1AFE8195B710D731D919CBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_malloc_memmovestd::exception::exception
                        • String ID:
                        • API String ID: 3703101265-0
                        • Opcode ID: 224eda0a1d6cf721da101296c79e24d88f1df4354a0b950460b7716fda698457
                        • Instruction ID: 997b094f54d13b5d2325f043e5fe90268d6fc7a62633082d5ed66b9bb1134854
                        • Opcode Fuzzy Hash: 224eda0a1d6cf721da101296c79e24d88f1df4354a0b950460b7716fda698457
                        • Instruction Fuzzy Hash: 06F0497290012567C721DBBDAC04AEFB7B89F85264F14076BD814A7B41EB70961983F1
                        APIs
                        • _malloc.LIBCMT ref: 6CF7C87B
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        • std::exception::exception.LIBCMT ref: 6CF7C8B0
                        • std::exception::exception.LIBCMT ref: 6CF7C8CA
                        • __CxxThrowException@8.LIBCMT ref: 6CF7C8DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                        • String ID:
                        • API String ID: 615853336-0
                        • Opcode ID: b032d55c88053d2d1e1567da0a7a3fa8236c1c4e4d292e7d57b8b2930966ebcc
                        • Instruction ID: cd66af20083f58fac5a00fc4c1041cd86b4e6c24924bade4b4ce3ee0da010fac
                        • Opcode Fuzzy Hash: b032d55c88053d2d1e1567da0a7a3fa8236c1c4e4d292e7d57b8b2930966ebcc
                        • Instruction Fuzzy Hash: 39F0CD71401145ABEF24EF69F904FEE3AB8AF4531CF10453BE820A5E81DB708644C771
                        APIs
                        • CharNextW.USER32(?), ref: 6CFC995A
                        • CharNextW.USER32(?,&quot;,6D02C778,6CFC8270,000000FF,E243FD3F), ref: 6CFC9A94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CharNext
                        • String ID: &quot;
                        • API String ID: 3213498283-1102514066
                        • Opcode ID: f3916c109cf3a39bf5dc3bc23af83fc326d9ddc0b66ee3cc98f82c8e63d3e409
                        • Instruction ID: 92274733b66e2cfc498fc9a0d15e2a4ea8a1360e1809d6c743403cb3ef17d11e
                        • Opcode Fuzzy Hash: f3916c109cf3a39bf5dc3bc23af83fc326d9ddc0b66ee3cc98f82c8e63d3e409
                        • Instruction Fuzzy Hash: 37C1E570A02229CBCB64EB24C990BEEB7B1EF59318F2042D9D49A67690DB305FD4CF51
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66CC5
                        • _memmove.LIBCMT ref: 6CF66D16
                          • Part of subcall function 6CF67FE0: std::_Xinvalid_argument.LIBCPMT ref: 6CF67FFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$_memmove
                        • String ID: string too long
                        • API String ID: 2168136238-2556327735
                        • Opcode ID: b618d93e43f84b46cb93b575ff2ba88a68155fbbc037d1562751ee9210ffb3a6
                        • Instruction ID: f1bb406839acd8451d4311565c34786389bd4b058fcaf6832fad4a19579cb5a4
                        • Opcode Fuzzy Hash: b618d93e43f84b46cb93b575ff2ba88a68155fbbc037d1562751ee9210ffb3a6
                        • Instruction Fuzzy Hash: 9431A772315A105BD7258E5EE880A5AF7E9EBA6769B20062FF481C7F40C771DC4483A1
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 6CF636CF
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser_free
                        • String ID: oninstallwidowshow$syscommandclose
                        • API String ID: 3825463412-236353129
                        • Opcode ID: 0bbeaeb5a52f6c721d1f50a391cfbfa6956c89e56213bf097114f43dcbcdca9a
                        • Instruction ID: d781aaca6bad160101bf36bbcb442140df141b0da208568f1c995af6da4cf1d2
                        • Opcode Fuzzy Hash: 0bbeaeb5a52f6c721d1f50a391cfbfa6956c89e56213bf097114f43dcbcdca9a
                        • Instruction Fuzzy Hash: 33318C759046189FDB14DB64C981FEAF7B4FB05324F104799E52A93BC0DB34AA48CBA0
                        APIs
                        • GetTickCount.KERNEL32 ref: 00405EC9
                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CountFileNameTempTick
                        • String ID: nsa
                        • API String ID: 1716503409-2209301699
                        • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                        • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                        • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                        • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 52352421b158a794b63c4f626c22c98504cdb797f6a3ad0ca8516d6d16dc881c
                        • Instruction ID: 9c8e809e3987d5b10921919c889de061f39de601a0b44c2c85fc4115f3288329
                        • Opcode Fuzzy Hash: 52352421b158a794b63c4f626c22c98504cdb797f6a3ad0ca8516d6d16dc881c
                        • Instruction Fuzzy Hash: 17A117B5900209DFDB08CF98D994BDEBBB5FF48308F208199E919AB340D775AA55CF50
                        APIs
                        • lstrlenW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 6CF9F951
                        • __fassign.LIBCMT ref: 6CF9F97F
                        • _memmove.LIBCMT ref: 6CF9FA46
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __fassign_memmovelstrlen
                        • String ID:
                        • API String ID: 1376217908-0
                        • Opcode ID: 42e7cfcec9580fb257be93f35a007df09b888361223510f4488b1571007a384b
                        • Instruction ID: a9b7aeae5e5f4cb17641586b4bf102683d287d0821583001b0ec718bac6b9fce
                        • Opcode Fuzzy Hash: 42e7cfcec9580fb257be93f35a007df09b888361223510f4488b1571007a384b
                        • Instruction Fuzzy Hash: 9C81A0B5A00109EBEF48CF98C990FEE77B5AF89308F148158F915AB781D735DA44DBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02bb77d007f29480c58d0586cb7c8e5673373f867ab591d6a136fb0ef8246149
                        • Instruction ID: 6b3221f3072eff6f0327a8f07f06543d403c6021ad97a3780c100cabe78b370d
                        • Opcode Fuzzy Hash: 02bb77d007f29480c58d0586cb7c8e5673373f867ab591d6a136fb0ef8246149
                        • Instruction Fuzzy Hash: 1291FDB4A00219CFDB04CFA8C990BAEB7B1BF88304F258699D8156B785D735ED45CFA0
                        APIs
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,E243FD3F,00000000,00000000,?,00000000,node_addr,6D039F24,6D039E60), ref: 6CF62164
                        • _memset.LIBCMT ref: 6CF621DC
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000001,000000FF,00000000,00000000,00000000,00000000), ref: 6CF621F7
                          • Part of subcall function 6CF66000: _memmove.LIBCMT ref: 6CF66033
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$_memmove_memset
                        • String ID:
                        • API String ID: 2888255262-0
                        • Opcode ID: 7207328ba642583ae4110ae1bf226f39a710efa6fb9fb00e44d1f06a97993d23
                        • Instruction ID: f05cb8bdba8d48c3843acb6781dda0acfd387333205e26ff880e0aea6a58b233
                        • Opcode Fuzzy Hash: 7207328ba642583ae4110ae1bf226f39a710efa6fb9fb00e44d1f06a97993d23
                        • Instruction Fuzzy Hash: E1410770604245AFD721DF2A8C84FABBBF9EF86714F14462DE451DBF80DB71950887A1
                        APIs
                        • CreateFileW.KERNELBASE(00000001,80000000,00000001,00000000,00000003,00000080,00000000,?,6CFDDF9B), ref: 6CFDC2DA
                        • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001,?,6CFDDF9B), ref: 6CFDC307
                        • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001,?,?,6CFDDF9B), ref: 6CFDC37F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: File$Pointer$Create
                        • String ID:
                        • API String ID: 250661774-0
                        • Opcode ID: 6dc2c9f8de2c5f7de4e025e51511bb67f274d94e79c2e990806f7b981529abae
                        • Instruction ID: ecd89194f7b2a78a0eeff39bc0432993d8594de44df4d1e90252969c910c7388
                        • Opcode Fuzzy Hash: 6dc2c9f8de2c5f7de4e025e51511bb67f274d94e79c2e990806f7b981529abae
                        • Instruction Fuzzy Hash: CA512A74E04349EFDB15CFA4C855B9EBBB1BF05304F248299EC606B381C3B2AA45CB91
                        APIs
                        • std::exception::exception.LIBCMT ref: 6CF68169
                          • Part of subcall function 6CF7B28C: std::exception::_Copy_str.LIBCMT ref: 6CF7B2A7
                        • __CxxThrowException@8.LIBCMT ref: 6CF6817E
                          • Part of subcall function 6CF7D3D1: RaiseException.KERNEL32(?,?,6CF7C8E0,E243FD3F,?,?,?,?,6CF7C8E0,E243FD3F,6D042A94,6D049FF4,E243FD3F,-00000898,00000002,?), ref: 6CF7D413
                          • Part of subcall function 6CF69D60: std::exception::exception.LIBCMT ref: 6CF69D8F
                          • Part of subcall function 6CF69D60: __CxxThrowException@8.LIBCMT ref: 6CF69DA4
                        • _memmove.LIBCMT ref: 6CF681C5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaise_memmovestd::exception::_
                        • String ID:
                        • API String ID: 163498487-0
                        • Opcode ID: 9f8a1c7ea4dbeb5f46ce79ec7833ffe033f173dd40d82a4ae6a0ff7904d007e7
                        • Instruction ID: 6a9a97e13b99c02309a0fc602c088950b522f2cec7c1ced8f5c913448411943e
                        • Opcode Fuzzy Hash: 9f8a1c7ea4dbeb5f46ce79ec7833ffe033f173dd40d82a4ae6a0ff7904d007e7
                        • Instruction Fuzzy Hash: CE4173B1900605ABDB14CF69C89079EBBF8EB0A364F51462FE825A7F81D7709944CBE1
                        APIs
                        • SetFilePointer.KERNELBASE(?,74E2F860,00000000,00000000), ref: 6CFDC4D3
                        • SetFilePointer.KERNEL32(?,74E2F860,00000000,00000001), ref: 6CFDC4F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 21f480230c5b908bfc02217d383e6e598dd9ab93a2626e08d311b8581670dec8
                        • Instruction ID: 81c4aa4c5a6e435bf7b5ae89fad1fd35c674826d6b572f3bfaf87994d58a2638
                        • Opcode Fuzzy Hash: 21f480230c5b908bfc02217d383e6e598dd9ab93a2626e08d311b8581670dec8
                        • Instruction Fuzzy Hash: 03314535654208EFDB08DF19C894B9A7BB1BF46764F19C209F8594B681C330FA81CF90
                        APIs
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CF646B5
                        • __wfopen_s.LIBCMT ref: 6CF646DC
                        • _fseek.LIBCMT ref: 6CF646F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DebugHeap$StringString::___wfopen_s_fseekstd::_
                        • String ID:
                        • API String ID: 568567257-0
                        • Opcode ID: 40164fef754cffc93f3ee08eb20ce90956282511c3b7fb572fdac2e409e7a021
                        • Instruction ID: 0a821ad2626aee0878fd024a71988a79545abf7aa9ceb6ebb0f96f6aa14f5f74
                        • Opcode Fuzzy Hash: 40164fef754cffc93f3ee08eb20ce90956282511c3b7fb572fdac2e409e7a021
                        • Instruction Fuzzy Hash: C5218371900128ABEB24EB64DD41FEEB7B8EF45214F1002A9D91DA77C1DF756A48CF90
                        APIs
                        • IsWindowEnabled.USER32(00000000), ref: 6CFE33E8
                          • Part of subcall function 6CF95A40: CharNextW.USER32(00000000,00000000,?,00000000,E243FD3F), ref: 6CF95B51
                          • Part of subcall function 6CF95A40: CharNextW.USER32(00000000,00000000,?,00000000,E243FD3F), ref: 6CF95B80
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CharNext$EnabledWindow
                        • String ID: res='%s' restype='%s' dest='%d,%d,%d,%d' source='%d,%d,%d,%d'
                        • API String ID: 3456984671-192091556
                        • Opcode ID: 102c1356b744db78edaf5cc0c19bcf0c84396fdf2c314ed3f3d5a16f5375db0d
                        • Instruction ID: 29c8ca27280e723a6b95796fd3bf164af4c6d2d4509da0cb11b71e0ab8014924
                        • Opcode Fuzzy Hash: 102c1356b744db78edaf5cc0c19bcf0c84396fdf2c314ed3f3d5a16f5375db0d
                        • Instruction Fuzzy Hash: 4C221871A016299BDB29CB48CC94BEAB3B9BF48305F1442E9E50DA7751DB31AF84CF50
                        APIs
                        • GetKeyState.USER32(00000011), ref: 6CF9055B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: State
                        • String ID: return
                        • API String ID: 1649606143-2812165903
                        • Opcode ID: de16ebcbe52223e83bbc663872509e28cff183c12dd174cb487bbbda95cd9970
                        • Instruction ID: 8fc0ef36ed2a9f43e575984c6259d0b91e6d959d8500df23591f8905ad6fd124
                        • Opcode Fuzzy Hash: de16ebcbe52223e83bbc663872509e28cff183c12dd174cb487bbbda95cd9970
                        • Instruction Fuzzy Hash: 54218434A04148AFEF04CF45C490BAEB7B5EF4C714F5482A9E959AB781D7B0E981CF50
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF61FF6
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7B9
                          • Part of subcall function 6CF7A7A4: __CxxThrowException@8.LIBCMT ref: 6CF7A7CE
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                        • String ID: list<T> too long
                        • API String ID: 1823113695-4027344264
                        • Opcode ID: 15f95757ba19854176564aa6e8c4a3b3363dd1140283a532a326da3ff711cf43
                        • Instruction ID: 497fc55ce6996eb3bd2cd111f2181a1b4e23845f7b8f24b6d4ca7151b191db05
                        • Opcode Fuzzy Hash: 15f95757ba19854176564aa6e8c4a3b3363dd1140283a532a326da3ff711cf43
                        • Instruction Fuzzy Hash: 8F011EB6501204AF8714DB69DA80C9BB7F9FB89704710956DE94687F05EA31F905CB60
                        APIs
                        • GetDiskFreeSpaceExW.KERNELBASE(00000000), ref: 6F95130B
                        • GetLastError.KERNEL32 ref: 6F951412
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: DiskErrorFreeLastSpace
                        • String ID:
                        • API String ID: 1766372604-0
                        • Opcode ID: 47c6e2a55ff88f4abad91d69f21c64c254611c6d394fab2ceb1002b6fb32cd3e
                        • Instruction ID: b2b95f15d7a9a8758c2a7720b2ab57bc783bab6d9b8d4ac30d8de2ed798c5a83
                        • Opcode Fuzzy Hash: 47c6e2a55ff88f4abad91d69f21c64c254611c6d394fab2ceb1002b6fb32cd3e
                        • Instruction Fuzzy Hash: 0F517B768087049FEB60DF78D9A0B5937A8FB47328F20452AE404CA2C1DB34E5F9DE95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c1c07166bb8f83e8a2cde84626e94b43a837e4a6f338e8c3efbea705bd33657
                        • Instruction ID: 3301e6cbb68f447bbaac4b5d0884d5c7ad234b2d3d856515624bf595e723bde0
                        • Opcode Fuzzy Hash: 3c1c07166bb8f83e8a2cde84626e94b43a837e4a6f338e8c3efbea705bd33657
                        • Instruction Fuzzy Hash: 24517071604209EFCF04CFA6C890BEE7BB5AF98304F145159F955AB780CB35DA85DBA0
                        APIs
                          • Part of subcall function 6CFDC4A0: SetFilePointer.KERNELBASE(?,74E2F860,00000000,00000000), ref: 6CFDC4D3
                        • _malloc.LIBCMT ref: 6CFDC8CB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FilePointer_malloc
                        • String ID:
                        • API String ID: 1406651323-0
                        • Opcode ID: 84e05b30651d38e19ff2f1d31f9345a3416f335dac32045217ba89f97c9ccd0f
                        • Instruction ID: 54d324ee2ed185d26b4da257123a6f1f4138df2456774c2b42b7d949eef32b74
                        • Opcode Fuzzy Hash: 84e05b30651d38e19ff2f1d31f9345a3416f335dac32045217ba89f97c9ccd0f
                        • Instruction Fuzzy Hash: 2E518EB1D04109DFCF04EFD8C991ABEBBB1AF45318F298259D512B7784D731AA40CB92
                        APIs
                        • SetTimer.USER32(?,?,?,00000000), ref: 6CF9D560
                        • SetTimer.USER32(?,?,?,00000000), ref: 6CF9D5D5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Timer
                        • String ID:
                        • API String ID: 2870079774-0
                        • Opcode ID: cfba2d3c9834c25c24549a569d49eef9c0bdf9c5359ebee48bc1a9ce88dd2841
                        • Instruction ID: 3142ce3a81f6d45378c65cb8f1ad1859c8e2f9516739fd120433f65dda1ffd14
                        • Opcode Fuzzy Hash: cfba2d3c9834c25c24549a569d49eef9c0bdf9c5359ebee48bc1a9ce88dd2841
                        • Instruction Fuzzy Hash: E351AF75A04109EFDF04CF98C590AAEB7B5FF89304F348299D909AB741D731AE41DBA1
                        APIs
                          • Part of subcall function 6CF8BCD0: _memset.LIBCMT ref: 6CF8BD16
                          • Part of subcall function 6CF8BCD0: GetClassInfoExW.USER32(00000000,?,00000030), ref: 6CF8BD2F
                          • Part of subcall function 6CF8BCD0: GetClassInfoExW.USER32(00000000,?,00000030), ref: 6CF8BD47
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CF8B709
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ClassInfo$CreateWindow_memset
                        • String ID:
                        • API String ID: 834990534-0
                        • Opcode ID: 6e74e1d85c2d23cee028873c224a06af602c338cd4fc8d6f167a2a00c9308cd2
                        • Instruction ID: 07fe32bb0c8f9ec24ff803ea61480b4dd8c52f766bfa979343b39df49979d421
                        • Opcode Fuzzy Hash: 6e74e1d85c2d23cee028873c224a06af602c338cd4fc8d6f167a2a00c9308cd2
                        • Instruction Fuzzy Hash: 9B41A5B9A05109AF8B04DF99C890DAEB7B9FF8D304B14C699F919D7354DB30E901CBA0
                        APIs
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6CFDE906
                        • _memset.LIBCMT ref: 6CFDE95B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_memset
                        • String ID:
                        • API String ID: 2800726579-0
                        • Opcode ID: 4e9dc80b875e4e51950e82dc7fea1814b33eb7f857b5b9e7a7aae3d76082872c
                        • Instruction ID: 265eaf26551b39be3b877965c5486617eb245f048ea878da2718a44028fe28f4
                        • Opcode Fuzzy Hash: 4e9dc80b875e4e51950e82dc7fea1814b33eb7f857b5b9e7a7aae3d76082872c
                        • Instruction Fuzzy Hash: 43317A70A02208DFCB15DF64CC81BDAB7B1BB89314F1483A9E9656B3D0D730AA95CF91
                        APIs
                        • CreateWindowExW.USER32(00080020,6D02D19C,00000000,00000000,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6CFD2BFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: b9f0191d9bffef32506027de23a9845b519b090f75787af10530e0a49e1b75ba
                        • Instruction ID: 5d6fbadf08112d511354bae243e602098031e01b3931e731e724c40827397e05
                        • Opcode Fuzzy Hash: b9f0191d9bffef32506027de23a9845b519b090f75787af10530e0a49e1b75ba
                        • Instruction Fuzzy Hash: 94311A75E05308AFDB04CFA4D895FAEBB71AB45324F248288F915AB384C771AD81CB94
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF79C47
                        • __CxxThrowException@8.LIBCMT ref: 6CF79C5C
                          • Part of subcall function 6CF78550: _malloc.LIBCMT ref: 6CF78580
                          • Part of subcall function 6CF78550: std::exception::exception.LIBCMT ref: 6CF7859C
                          • Part of subcall function 6CF78550: __CxxThrowException@8.LIBCMT ref: 6CF785B1
                          • Part of subcall function 6CF78550: _memmove.LIBCMT ref: 6CF785B9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception$_memmove
                        • String ID:
                        • API String ID: 4279888175-0
                        • Opcode ID: 2aff1a53fbcb8d24121a8e7288d75f8a0134bf57d38dca6460edf5be71fda9fb
                        • Instruction ID: 1dbd3b2c1ee7d09dfeca43d6361a16c1b10014b22fe90b10f555d89cf997c5f7
                        • Opcode Fuzzy Hash: 2aff1a53fbcb8d24121a8e7288d75f8a0134bf57d38dca6460edf5be71fda9fb
                        • Instruction Fuzzy Hash: DB2153B1D01609ABC714DF99D940AEEFBF8EB58714F10456FD419A3B41E7306A44CBA1
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF7967B
                        • __CxxThrowException@8.LIBCMT ref: 6CF79690
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID:
                        • API String ID: 4063778783-0
                        • Opcode ID: 9dcc18a7949045d21a4d292d1f51fc7d50dd76f19085f9de1da4dc72c2dd8ed3
                        • Instruction ID: a8da55107f210d0f2f7d93406a8f6af956efd23d7d63d8a0a1c8d915995f8b53
                        • Opcode Fuzzy Hash: 9dcc18a7949045d21a4d292d1f51fc7d50dd76f19085f9de1da4dc72c2dd8ed3
                        • Instruction Fuzzy Hash: 09217FB1A01608DFCB11DF59C980A9AFBF8FB59610F10856FE819A7741D730AA04CBA1
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF6ADC4
                        • __CxxThrowException@8.LIBCMT ref: 6CF6ADD9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID:
                        • API String ID: 4063778783-0
                        • Opcode ID: 6d4751498ef4f520a21e4858177efd2408a451190cc1474e26442b069026ba23
                        • Instruction ID: 6a8f43c85bf57559d02559174e2bd13bed3a29684e8ad526fc5af1808fdb5172
                        • Opcode Fuzzy Hash: 6d4751498ef4f520a21e4858177efd2408a451190cc1474e26442b069026ba23
                        • Instruction Fuzzy Hash: 5B2183B19016099BCB14DFA9D940BEEFBF8FB48714F10866ED459A3B41DB306904CBA1
                        APIs
                        • ReadFile.KERNELBASE(?,00000001,00000001,00000000,00000000,00000000,?,00000001,FFFFFFFF), ref: 6CFDC5AF
                        • _memmove.LIBCMT ref: 6CFDC604
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FileRead_memmove
                        • String ID:
                        • API String ID: 1325644223-0
                        • Opcode ID: 0cee9960e5b90c0f98b5bb65a02be0dfbb9cd5870326293c93206c54f1e7d5f0
                        • Instruction ID: 79af8288df3912acd1c359965f3a14729d441ed1db793b1689a202c8e3288e5f
                        • Opcode Fuzzy Hash: 0cee9960e5b90c0f98b5bb65a02be0dfbb9cd5870326293c93206c54f1e7d5f0
                        • Instruction Fuzzy Hash: ED21A6B9A00109EFCB08CF59D590A9EBBB6BF88304F148199E805AB345D730EE51CFA1
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF6A334
                        • __CxxThrowException@8.LIBCMT ref: 6CF6A349
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID:
                        • API String ID: 4063778783-0
                        • Opcode ID: 96f210a09cf2b6a6d12cdf711af40dcc1920b0acfb5437919678d300a20fef32
                        • Instruction ID: 20745babc09f8c86dc0a5c873b0e6ed2fba6017d2929e10ec1dd0c0ef62ba092
                        • Opcode Fuzzy Hash: 96f210a09cf2b6a6d12cdf711af40dcc1920b0acfb5437919678d300a20fef32
                        • Instruction Fuzzy Hash: 00216D71901608DFCB15CF99C940ADEFBF4FF59710F50856AE819A7B41D730AA04CBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e093246de82540408ff0a4e0227cab13c62d7d3a3a66881b214539f50f39e639
                        • Instruction ID: 2389de3c1d2ffe2c696dcfb459d5dcbc955fbfd5b1eec57522f90f856120feab
                        • Opcode Fuzzy Hash: e093246de82540408ff0a4e0227cab13c62d7d3a3a66881b214539f50f39e639
                        • Instruction Fuzzy Hash: 9C21E9B4900208EFDB10DF94C880B9DBBB1FF45318F258699D8156B794D375AA85CF91
                        APIs
                          • Part of subcall function 00401553: RegOpenKeyExW.KERNELBASE(?,00000000,00000022,00000000,?,?), ref: 0040158B
                        • RegCloseKey.ADVAPI32(?), ref: 004029E4
                        • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?), ref: 00402A32
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID:
                        • API String ID: 3677997916-0
                        • Opcode ID: 7364fa734b1cafd0e9c302eb8c761ae35a440ebd4c3d320034ea02a32beaa18b
                        • Instruction ID: e3af14d3babfee09cb1fb7ac7dbcae58df224abeee96a0ce1dd220965ef9d513
                        • Opcode Fuzzy Hash: 7364fa734b1cafd0e9c302eb8c761ae35a440ebd4c3d320034ea02a32beaa18b
                        • Instruction Fuzzy Hash: C8116071A10204EFDF24DFA4DA499AEB6B4EF44344B20847FE446F72D0E6785B41DB19
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF6ACD9
                        • __CxxThrowException@8.LIBCMT ref: 6CF6ACEE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID:
                        • API String ID: 4063778783-0
                        • Opcode ID: 385f24ebfac7455477bdb12b3015d23b217529f3404ba2a0d47a20751aa7a45c
                        • Instruction ID: d289ee9b4c8e90c7b24182d1306163e549a493fd599415cfa2eb357d9fa18ead
                        • Opcode Fuzzy Hash: 385f24ebfac7455477bdb12b3015d23b217529f3404ba2a0d47a20751aa7a45c
                        • Instruction Fuzzy Hash: 3F0144749012049FC71CDF55D490C9ABBB5EF58704B14C56EDD2A4BB51E730E944CB91
                        APIs
                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                        • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                        • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                        • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __lock_file_memset
                        • String ID:
                        • API String ID: 26237723-0
                        • Opcode ID: 06698e66946bb2029f954ac1c57e2ec1aebcf8a1c3d8d8d0e2f9b9efb99fb1cd
                        • Instruction ID: 7bcd0ae9af19ad24031a7380847ddca7796c0a155d83dc0e610ee9ba60a09080
                        • Opcode Fuzzy Hash: 06698e66946bb2029f954ac1c57e2ec1aebcf8a1c3d8d8d0e2f9b9efb99fb1cd
                        • Instruction Fuzzy Hash: EB012172802219EBCF61AFA4E8004DE3F71BF04759F548127F82456A60D7758666DFE1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$Show
                        • String ID:
                        • API String ID: 990937876-0
                        • Opcode ID: 0d7307184d7afc5bb02e267d02b631cd42a340feafe83a89f764a3181317c6a4
                        • Instruction ID: 80f87f2fb2f054ce770e597b6616f7a268a17fc84140558985b108f599d5c60c
                        • Opcode Fuzzy Hash: 0d7307184d7afc5bb02e267d02b631cd42a340feafe83a89f764a3181317c6a4
                        • Instruction Fuzzy Hash: 01F0B475E05108ABCF00DFB8C845A5EBFB4AB46305F24C699F81597380D334DA40DB50
                        APIs
                        • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$AttributesCreate
                        • String ID:
                        • API String ID: 415043291-0
                        • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                        • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                        • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                        • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                        APIs
                        • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                        • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                        • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                        • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5cd60096e74fc4a71c35b357a7bd661c41c96a97361e48af39233303a176268c
                        • Instruction ID: af994bad9280fd40b92785b417e8a7711c3a8c7f2f861a7cc4536bea6db235ca
                        • Opcode Fuzzy Hash: 5cd60096e74fc4a71c35b357a7bd661c41c96a97361e48af39233303a176268c
                        • Instruction Fuzzy Hash: 0A613DB5E002089BDB20DF65DC44BDEB774AF45368F158698E82C97681E730EA85CFA1
                        APIs
                        • GetTickCount.KERNEL32 ref: 6CF9DF22
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CountTick_free_malloc
                        • String ID:
                        • API String ID: 1247268073-0
                        • Opcode ID: 4ca2353358e4f11c841aa103274eb43f87f02562798e1192360fa5bd59c4ebc1
                        • Instruction ID: bd6e471e75a60c63daca64476b175c15371e176d4ebeb7ab063e55bbaad41d5d
                        • Opcode Fuzzy Hash: 4ca2353358e4f11c841aa103274eb43f87f02562798e1192360fa5bd59c4ebc1
                        • Instruction Fuzzy Hash: 6671F974A04218DFDB18CF18C894BD9B7B2BF89304F1482E9D98D9B781DB716A85CF91
                        APIs
                        • GetCaretBlinkTime.USER32(00000000), ref: 6CF904C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: BlinkCaretTime
                        • String ID:
                        • API String ID: 1096504186-0
                        • Opcode ID: 1a29a88efae64d627b9f430345fe059d2dddcdb386276ff947e3a5c03f9381c2
                        • Instruction ID: 38a20784073c7eeeb08204a571e253c592cd0095f48a7c4452e1e57e26797399
                        • Opcode Fuzzy Hash: 1a29a88efae64d627b9f430345fe059d2dddcdb386276ff947e3a5c03f9381c2
                        • Instruction Fuzzy Hash: 1051D974A01218DFDB44CF94D894BEDB7B6BF88308F248169E9096B791C772AC56CF90
                        APIs
                        • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?,?,?,6CF97F4C,00000000), ref: 6CF9D977
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: 40b7f489e21bdb6e515bce2447838c905a819d412f9f9ade5b7e481f983b121c
                        • Instruction ID: 35d59738634d1ae3741fc82ccaad6d9134b510d231983ea1046f7dc19f915205
                        • Opcode Fuzzy Hash: 40b7f489e21bdb6e515bce2447838c905a819d412f9f9ade5b7e481f983b121c
                        • Instruction Fuzzy Hash: 11411774A042589FDF08CFA4C894BEEFBF1AF89300F2481A9D894AB341D7755A41CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _strlen
                        • String ID:
                        • API String ID: 4218353326-0
                        • Opcode ID: 053d598874e5e5334d4bb59e4813d0103692fac75d0491cf5b90e16ae7b9ba9a
                        • Instruction ID: a3ac22aecae3c90129f38155d8b02f2e777c894c3eae8f760761d4ba32f4e130
                        • Opcode Fuzzy Hash: 053d598874e5e5334d4bb59e4813d0103692fac75d0491cf5b90e16ae7b9ba9a
                        • Instruction Fuzzy Hash: 9B314FB5E00209AFDB14CFA8D840F9EB7B4AB48314F254669E9159B780D770FA84CFA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 06c2130afafc44e1309f79423d01c2de1f8ddde0e153bfc536f64b42bb8972f9
                        • Instruction ID: bfcf103d8b4519fab26334688d16ea042077d0587efe155e0fbfc68aeb0e936d
                        • Opcode Fuzzy Hash: 06c2130afafc44e1309f79423d01c2de1f8ddde0e153bfc536f64b42bb8972f9
                        • Instruction Fuzzy Hash: B821EB75901540DBDB20DF65ED44B9AB7A8EF05618F10465BE822BBB80D738E906C7B1
                        APIs
                        • _free.LIBCMT ref: 6CF797DA
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free
                        • String ID:
                        • API String ID: 1353095263-0
                        • Opcode ID: a0e854e78eca808466754ae826229af9c0482747ae67bebe71962404cdd4de45
                        • Instruction ID: 7ac8343d17bc83d8de89374249f5879cab0fa829e0df49924f4128a19d8681f7
                        • Opcode Fuzzy Hash: a0e854e78eca808466754ae826229af9c0482747ae67bebe71962404cdd4de45
                        • Instruction Fuzzy Hash: E411C4B6904604ABDB20CF58E840B9ABBB9FB45364F14462FE82557B40D739EA04CBE0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _malloc
                        • String ID:
                        • API String ID: 1579825452-0
                        • Opcode ID: fb751a3a8630f95593372b88e12a602d96d9bfda016ae56829b5e6bd6051e19f
                        • Instruction ID: 7a07d8aa0027713e07f04f6350e32d5b3fe6d13207e68657fc564bbac40c9b78
                        • Opcode Fuzzy Hash: fb751a3a8630f95593372b88e12a602d96d9bfda016ae56829b5e6bd6051e19f
                        • Instruction Fuzzy Hash: 4B11FEB1A0114ADFCB24DFA8D940BAEB7B5EF48304F0045A9E80997745DB30EA55DFD1
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 6CF87DD7
                          • Part of subcall function 6CF7EF1D: __getptd_noexit.LIBCMT ref: 6CF7EF1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocateHeap__getptd_noexit
                        • String ID:
                        • API String ID: 328603210-0
                        • Opcode ID: 1ad4ba14d91b6a7980dcd9981225a7c6b5572fc6f4167d656c354383ae00e92f
                        • Instruction ID: 218bd369f4943ba423755c8f89342d5956d28ba4ac5c103fbc87676bb60fe644
                        • Opcode Fuzzy Hash: 1ad4ba14d91b6a7980dcd9981225a7c6b5572fc6f4167d656c354383ae00e92f
                        • Instruction Fuzzy Hash: 4001B5323072159BEB258F25C854FA637B5AB81769F154A2BF8258B980D770D84086A0
                        APIs
                        • CoCreateInstance.COMBASE(6D035FE0,00000000,00000001,6D036010,?), ref: 6CFD75C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CreateInstance
                        • String ID:
                        • API String ID: 542301482-0
                        • Opcode ID: 45a26257304285b9aa821423326c2f5af40923c6cd89da90a141b6e7f29c955f
                        • Instruction ID: 25ddd53d3e14e92bbab5eb0e8bf1357dce2092de5d966592b4171bd37678064a
                        • Opcode Fuzzy Hash: 45a26257304285b9aa821423326c2f5af40923c6cd89da90a141b6e7f29c955f
                        • Instruction Fuzzy Hash: 7411B9B4A0120A8FEB04CF84C595BAFFBF1BF44304F248548D8047B381C775A905CBA5
                        APIs
                        • IntersectRect.USER32(?,?,?), ref: 6CFC9D2A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: IntersectRect
                        • String ID:
                        • API String ID: 481094312-0
                        • Opcode ID: 108bdd859a871a42a184e0e22d27ee1ef435ec14f2751a927f808b7170a0f724
                        • Instruction ID: fb84987a7c6a567c3272df114a2783622daca1ea2150d4c697e3097ec9612b55
                        • Opcode Fuzzy Hash: 108bdd859a871a42a184e0e22d27ee1ef435ec14f2751a927f808b7170a0f724
                        • Instruction Fuzzy Hash: EF014F31B44109EBCB04CF59C940F9FB7B9AF8570AF204598F459A7741CA31AF01DB65
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID:
                        • API String ID: 2102423945-0
                        • Opcode ID: d26226cc891b2855e918279ffd4f4bd53b9422bcb9cc652e2932e6445114fb7a
                        • Instruction ID: d7ab57a7a53626bc8da026f3d104c70bcb67bd3c5c58ee9ea11d20d7c8a4ff86
                        • Opcode Fuzzy Hash: d26226cc891b2855e918279ffd4f4bd53b9422bcb9cc652e2932e6445114fb7a
                        • Instruction Fuzzy Hash: AD0112B5A01208EFDB04CF58D441A9EBFB5EB44350F14C1ADEC495B380D731DA44CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 03ee52f311e1308fc0d61956336024dc7a57e42ded6e671422c3206340cdd153
                        • Instruction ID: c3e54d7915df51098a25b4e021bab7315aa5d7a33ff6888c1474871dc283c824
                        • Opcode Fuzzy Hash: 03ee52f311e1308fc0d61956336024dc7a57e42ded6e671422c3206340cdd153
                        • Instruction Fuzzy Hash: 1501F4B69003049BDB20CF58F44069EB7B1EF44325F20862FD82557B40DB39EA15CBE0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 3916b0518c9523f3abb50564c7dc8c5856ddbf00f16e397b00e7aa2639c3593a
                        • Instruction ID: 5c0534f8c3958230a5f93a6c6beff9ecfebbd39c19ea4c45820e28b9ce71a940
                        • Opcode Fuzzy Hash: 3916b0518c9523f3abb50564c7dc8c5856ddbf00f16e397b00e7aa2639c3593a
                        • Instruction Fuzzy Hash: 9FF082B5900148EFCB00EF68E940B9E73B5AF85308F2586A8E90887780E735FF44DB91
                        APIs
                        • SetFilePointer.KERNELBASE(45C7FC45,00000000,00000000,00000001,?,6CFDC8AB,74E2F860,?,?,?,?,?,?,?,?,6CFDCA64), ref: 6CFDC475
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 623965dab0257ed98cb4f65711d0c42205faa2fe192112b5bcfce300c1f3ded2
                        • Instruction ID: 94381f408c479f4d595d2cce642f3ab9fc8dbd9f2470f37b60dfda71e03ae9fd
                        • Opcode Fuzzy Hash: 623965dab0257ed98cb4f65711d0c42205faa2fe192112b5bcfce300c1f3ded2
                        • Instruction Fuzzy Hash: D5F05E30245315ABEB44DF25C490B767BA5AF46655F28C54CFC898F681CB31F542CB90
                        APIs
                        • RegOpenKeyExW.KERNELBASE(?,00000000,00000022,00000000,?,?), ref: 0040158B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 1caef13d468ef467c4b3b08d59f2ccd1d994183a05b4919832578f2617b25be5
                        • Instruction ID: fa57b471ed8b987ef0152cf373f8deb4fb29a4d96bb60b9d9eb6fabc224e71a1
                        • Opcode Fuzzy Hash: 1caef13d468ef467c4b3b08d59f2ccd1d994183a05b4919832578f2617b25be5
                        • Instruction Fuzzy Hash: F3F0303A650115FBD700DB95DD42EE63BDCAB08794F044131FA0AEB1A1D234E84087AD
                        APIs
                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                        • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                        • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                        • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                        APIs
                          • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                          • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                          • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                          • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                        • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Char$Next$CreateDirectoryPrev
                        • String ID:
                        • API String ID: 4115351271-0
                        • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                        • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                        • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                        • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                        APIs
                        • CallWindowProcW.USER32(?,?,00000202,?,00000000,?,?,6CF94F79,00000000,?,00000202,00000000,?,00000202,00000000), ref: 6CF8C121
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: ca9077a9076f79333351effa49567eb215c3643faa24756bef1e5971b78900a5
                        • Instruction ID: 509feb21f6e347a95e78c48261101a2215eff048b95979c636102fcdb44bcb1d
                        • Opcode Fuzzy Hash: ca9077a9076f79333351effa49567eb215c3643faa24756bef1e5971b78900a5
                        • Instruction Fuzzy Hash: D3E02FB5A15108FB8B04CF99D944D9AF7FDEB4D310B14868DB909D7301D631EE50DBA4
                        APIs
                        • PostMessageW.USER32(?,00008001,00000000,00000000), ref: 6CF9FCB8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 7cea175e64150b24765ccfb89e6380abb882831c092c2049b9e44e9c2875c60f
                        • Instruction ID: 337710789a6c0057159a82233eed3f392d21993d6f3d90cd05482e00a06e68a9
                        • Opcode Fuzzy Hash: 7cea175e64150b24765ccfb89e6380abb882831c092c2049b9e44e9c2875c60f
                        • Instruction Fuzzy Hash: 24E04F70B49208EBDB04CB95C955FA9BBB8AB45705F2442E9FD48AB382C7726E009B54
                        APIs
                        • VirtualProtect.KERNELBASE(6F954020,00000004,00000040,6F954028), ref: 6F952746
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 03069635955d140c0ddf2036d2fa3eb24a82ed4efe604fb25fbfd9511b65f147
                        • Instruction ID: fff53f7ca423a7b0522e56333c4449c2e58f2c1976fee1a18332db34d7d71eb7
                        • Opcode Fuzzy Hash: 03069635955d140c0ddf2036d2fa3eb24a82ed4efe604fb25fbfd9511b65f147
                        • Instruction Fuzzy Hash: 8EE0AEB190DB409EEBD0CF3CD864B023AF0B75B326F21452AE248D62C0E230913CAF19
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __fread_nolock
                        • String ID:
                        • API String ID: 2638373210-0
                        • Opcode ID: 2f4c74d6bb5598f67877027b510957e31077f82797a0ffc6c53c0c3259abc79f
                        • Instruction ID: f1278a43298e94cf700a0b03066a836eff2a4af42caa784c01d6653104ac0a30
                        • Opcode Fuzzy Hash: 2f4c74d6bb5598f67877027b510957e31077f82797a0ffc6c53c0c3259abc79f
                        • Instruction Fuzzy Hash: 70D09E752103086BDB04DF64D881DAB3369EB44614F108819BD154B741D671E9209AA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _calloc
                        • String ID:
                        • API String ID: 1679841372-0
                        • Opcode ID: f0a1bf826ec3f6c1d7305ddabcf0ae9287661dbb3350c9d412980476288be99b
                        • Instruction ID: a97eaa931da5d112f6644ac9b2662aa3090c76387a03887341288627e0fdf0d4
                        • Opcode Fuzzy Hash: f0a1bf826ec3f6c1d7305ddabcf0ae9287661dbb3350c9d412980476288be99b
                        • Instruction Fuzzy Hash: 81D0E27600424DABCB00CFA8D880AAA33A8AB44218F04C918BD2C8B200DA30E560CB50
                        APIs
                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                        • SetDlgItemTextW.USER32(?,?,00000000), ref: 00403D85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: ItemTextVersion
                        • String ID:
                        • API String ID: 1287519508-0
                        • Opcode ID: 6c6e3b9cce5e3c04e16e3261811eafba0214bdccea44d0b3cf2813b955e277e9
                        • Instruction ID: 3d91de8bf8cbd2b1f3a3cf9e9dcc3d672f8c1b7d0241b958bd96d56531da4427
                        • Opcode Fuzzy Hash: 6c6e3b9cce5e3c04e16e3261811eafba0214bdccea44d0b3cf2813b955e277e9
                        • Instruction Fuzzy Hash: 7EC04C76148300BFE641A759CC46F1FB799EFA4719F00C52EB19CE11D5CA398420DA26
                        APIs
                        • _malloc.LIBCMT ref: 6CFA4687
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocateHeap_malloc
                        • String ID:
                        • API String ID: 501242067-0
                        • Opcode ID: 17f0809e41a037017afa13fa89890ed12633f984fcd4df5484950895e108c249
                        • Instruction ID: d0cd4a37662e12f3364b58eabf321d79bdd34db482b95e533e1f94de09590630
                        • Opcode Fuzzy Hash: 17f0809e41a037017afa13fa89890ed12633f984fcd4df5484950895e108c249
                        • Instruction Fuzzy Hash: 1DB012B680030C13890076DCB801886378C0604418F040021FE0C4B701E521F65441E2
                        APIs
                        • _free.LIBCMT ref: 6CFA41A7
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free
                        • String ID:
                        • API String ID: 1353095263-0
                        • Opcode ID: d6cfca12000a0b106740b4379124f6eb9ff0438c1e64e4861b856a235bc69ecf
                        • Instruction ID: 205410f856108ebbce74c322f03418e69be913ef285502ef24a2264a8ca47f6f
                        • Opcode Fuzzy Hash: d6cfca12000a0b106740b4379124f6eb9ff0438c1e64e4861b856a235bc69ecf
                        • Instruction Fuzzy Hash: 7FB012B280430C138A0066D8B801886338C4A04414B440421B90C47B00F625F55441E2
                        APIs
                        • _free.LIBCMT ref: 6CFDB927
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free
                        • String ID:
                        • API String ID: 1353095263-0
                        • Opcode ID: e866c6280bb8740010ab8c6dff84e555f095f6d90278c21fead7fd0c1bf12db2
                        • Instruction ID: 1eb02b8d82abb0ea7519aa0126b1ca3bcf4c73119ecd5063ee721cd2d4a83c9c
                        • Opcode Fuzzy Hash: e866c6280bb8740010ab8c6dff84e555f095f6d90278c21fead7fd0c1bf12db2
                        • Instruction Fuzzy Hash: C2B012B280430C138A0066D87801846338C4A04424B444421B90C47B00F635F51441A2
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                        • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                        • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                        • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                        APIs
                        • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                        • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                        • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                        • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                        APIs
                        • CloseHandle.KERNELBASE(?,00000000), ref: 6CFDC401
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: d63924800296dadd94c2ad727f39b7b5b22e510be9e17451b4ba050bac5d65c5
                        • Instruction ID: 76f7962c370ce36dfb29a4ab1d2441c0e09db627fd1799e6182ee410682378af
                        • Opcode Fuzzy Hash: d63924800296dadd94c2ad727f39b7b5b22e510be9e17451b4ba050bac5d65c5
                        • Instruction Fuzzy Hash: 6AE092B5A15208AFCB04DF64C484A6A7BB8BF45365F25C3A9FC5987740D730EA40DB91
                        APIs
                        • GlobalAlloc.KERNELBASE(00000040,?,6F9515BA,?,?,6F95185F,?,6F951017), ref: 6F95158B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2905145483.000000006F951000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.2905129472.000000006F950000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905161285.000000006F953000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.2905179764.000000006F955000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocGlobal
                        • String ID:
                        • API String ID: 3761449716-0
                        • Opcode ID: cc853746078a4c9b1c6e42b9bb1825dc8667207b0b2e4174895a7d9d4c316632
                        • Instruction ID: af99e66709344539024c1600abcbb94fdda3997164a56c5da794ba7fb55c0459
                        • Opcode Fuzzy Hash: cc853746078a4c9b1c6e42b9bb1825dc8667207b0b2e4174895a7d9d4c316632
                        • Instruction Fuzzy Hash: 4FB002716445006FFF409778CD5BF353BA5F741755F550050F705D5141D56458788D15
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$ObjectRectSelect$ClipColor$CreateDeleteIndirectModeText$Empty_malloc
                        • String ID: ...$d
                        • API String ID: 1279121391-1910149496
                        • Opcode ID: f0751885f060841c649441de676fa1d7c33f725adb579c659d2d812e282cd19c
                        • Instruction ID: 5b7efbf44ff3ce6066bd81f9de8e87b1193927426bd5846b61c4b945936d6899
                        • Opcode Fuzzy Hash: f0751885f060841c649441de676fa1d7c33f725adb579c659d2d812e282cd19c
                        • Instruction Fuzzy Hash: 21236DB5A051198FDB14CF69C890BEEB7B2BF89304F1481D9E809AB744DB34AE95CF50
                        APIs
                        • GetDlgItem.USER32(?,00000403), ref: 0040515B
                        • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                        • GetClientRect.USER32(?,?), ref: 004051C2
                        • GetSystemMetrics.USER32(00000015), ref: 004051CA
                        • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                        • ShowWindow.USER32(?,00000008), ref: 00405266
                        • GetDlgItem.USER32(?,000003EC), ref: 00405287
                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                        • GetDlgItem.USER32(?,000003F8), ref: 00405179
                          • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                        • CreateThread.KERNEL32(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                        • CloseHandle.KERNEL32(00000000), ref: 004052EC
                        • ShowWindow.USER32(00000000), ref: 00405313
                        • ShowWindow.USER32(?,00000008), ref: 00405318
                        • ShowWindow.USER32(00000008), ref: 0040535F
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                        • CreatePopupMenu.USER32 ref: 004053A2
                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                        • GetWindowRect.USER32(?,?), ref: 004053CA
                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                        • OpenClipboard.USER32(00000000), ref: 00405437
                        • EmptyClipboard.USER32 ref: 0040543D
                        • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                        • GlobalLock.KERNEL32(00000000), ref: 00405453
                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                        • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                        • CloseClipboard.USER32 ref: 0040549A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                        • String ID: New install of "%s" to "%s"${
                        • API String ID: 2110491804-1641061399
                        • Opcode ID: b870e07e0f90b65775997a4172df4cb72c50b11c5a38a9ad208b9f3c2b6ee9f0
                        • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                        • Opcode Fuzzy Hash: b870e07e0f90b65775997a4172df4cb72c50b11c5a38a9ad208b9f3c2b6ee9f0
                        • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58
                        APIs
                        • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                        • GetDlgItem.USER32(?,00000408), ref: 004049CC
                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                        • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                        • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                        • DeleteObject.GDI32(?), ref: 00404AA5
                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                        • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                        • ShowWindow.USER32(?,00000005), ref: 00404BFB
                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                        • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                        • GlobalFree.KERNEL32(?), ref: 00404DD8
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                        • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                        • ShowWindow.USER32(?,00000000), ref: 00404F75
                        • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                        • ShowWindow.USER32(00000000), ref: 00404F87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                        • String ID: $ @$M$N
                        • API String ID: 1638840714-3479655940
                        • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                        • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                        • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                        • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: tooltips_class32${
                        • API String ID: 0-3725455198
                        • Opcode ID: b7116dd91ba342e713e8c19f7ada4e4f4c7195c27b0a4856b5674e682ef6b508
                        • Instruction ID: 6a648302e58cb81939efd6e68202ddac04e11847eb248d4ea1846b7d06e2435d
                        • Opcode Fuzzy Hash: b7116dd91ba342e713e8c19f7ada4e4f4c7195c27b0a4856b5674e682ef6b508
                        • Instruction Fuzzy Hash: 5E722974E05218DFEB65CF58C894BA9B7B5FF89304F1081EAE50DA7680CB74AA81CF51
                        APIs
                        • GetDlgItem.USER32(?,000003F0), ref: 00404525
                        • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                        • GetDlgItem.USER32(?,000003FB), ref: 00404553
                        • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                        • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                        • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                        • SetWindowTextW.USER32(?,?), ref: 004045AF
                        • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                        • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                        • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                        • CoTaskMemFree.OLE32(00000000), ref: 00404674
                          • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                          • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                          • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                          • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                          • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                          • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                        • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                        • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                        • String ID: F$A
                        • API String ID: 3347642858-1281894373
                        • Opcode ID: a5fa6dd7612635b06afd7bdf928a1f1f12882f9767dd20a4809df49b26cd99e9
                        • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                        • Opcode Fuzzy Hash: a5fa6dd7612635b06afd7bdf928a1f1f12882f9767dd20a4809df49b26cd99e9
                        • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                        • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                        • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                        • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                        • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                        • CloseHandle.KERNEL32(?), ref: 00407212
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                        • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                        • API String ID: 1916479912-1189179171
                        • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                        • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                        • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                        • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                        APIs
                        • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                        • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                        • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                        • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                        • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406A73
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                        • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                        • API String ID: 3581403547-1792361021
                        • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                        • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                        • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                        • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF6EF6E
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF6EF78
                        • std::exception::exception.LIBCMT ref: 6CF6EF90
                        • __CxxThrowException@8.LIBCMT ref: 6CF6EFAB
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$Exception@8Throw_mallocstd::exception::exception
                        • String ID: list<T> too long$vector<T> too long
                        • API String ID: 462811778-355118384
                        • Opcode ID: f1bad00fe24cb357e5c4a82dbe0f843c94ccfa66eb0f35741211b2c9912fe59c
                        • Instruction ID: 9283031fa201b783670f0f3b38f7c24c40e545c59f7273b0b77656c898d72888
                        • Opcode Fuzzy Hash: f1bad00fe24cb357e5c4a82dbe0f843c94ccfa66eb0f35741211b2c9912fe59c
                        • Instruction Fuzzy Hash: 46919372A006058FC728DF2DCD84BEEB7F6AB84314F54869DD45A97B80DB30AA45CF90
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF6EB5E
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF6EB68
                        • std::exception::exception.LIBCMT ref: 6CF6EB80
                        • __CxxThrowException@8.LIBCMT ref: 6CF6EB9B
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$Exception@8Throw_mallocstd::exception::exception
                        • String ID: list<T> too long$vector<T> too long
                        • API String ID: 462811778-355118384
                        • Opcode ID: 509abdb3048e5f7369b9f739e565b285c7c327f86940d9717aa1328612eacec5
                        • Instruction ID: 6c2707a15ab60d7739ebfbe0f141a493a1f2abd79b660ce74b5ca8ac52972609
                        • Opcode Fuzzy Hash: 509abdb3048e5f7369b9f739e565b285c7c327f86940d9717aa1328612eacec5
                        • Instruction Fuzzy Hash: 3791A472A006058FC728DF29CD84BEEB7F6BF84314F54869DD44A97B80DB30AA45CB90
                        APIs
                        • IsIconic.USER32(00000000), ref: 6CFFCE8B
                        • GetWindowRect.USER32(00000000,?), ref: 6CFFCEAE
                          • Part of subcall function 6CF8C3D0: OffsetRect.USER32(?,?,?), ref: 6CF8C3E3
                        • CreateRoundRectRgn.GDI32(?,?,?,?,?,?), ref: 6CFFCEF2
                        • SetWindowRgn.USER32(00000000,?,00000001), ref: 6CFFCF0A
                        • DeleteObject.GDI32(?), ref: 6CFFCF14
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$Window$CreateDeleteIconicObjectOffsetRound
                        • String ID:
                        • API String ID: 2749569207-0
                        • Opcode ID: ad2a58bd6463279a8eef615ac59197dcc42f5bef309da82eb6fb96dd7ab05970
                        • Instruction ID: 44faef3c65616726481ac6bb3a8ea36609ce66e687887d80b6a589ae78fdd050
                        • Opcode Fuzzy Hash: ad2a58bd6463279a8eef615ac59197dcc42f5bef309da82eb6fb96dd7ab05970
                        • Instruction Fuzzy Hash: 7821A571E04109ABDF04DFA8D995EEEB7B9BF88305F204159E516A7280DB34A905CB64
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 6CF7FE42
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CF7FE57
                        • UnhandledExceptionFilter.KERNEL32(6D0281B0), ref: 6CF7FE62
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 6CF7FE7E
                        • TerminateProcess.KERNEL32(00000000), ref: 6CF7FE85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 1ae05b5477492b667ed5c1cd97b7779058b53298f47aac0f45e638bbeb0d58a8
                        • Instruction ID: 1221aea61ccd443f03e33d453be74bd49d4a5c87791fada5a0d4f1e6fbb701a4
                        • Opcode Fuzzy Hash: 1ae05b5477492b667ed5c1cd97b7779058b53298f47aac0f45e638bbeb0d58a8
                        • Instruction Fuzzy Hash: 5A21E0B9802200DFEF10EF29D686F483BB0BB4E319F20406AE90897761E77499C58F95
                        APIs
                        • GetKeyState.USER32(00000011), ref: 6CF9806D
                        • GetKeyState.USER32(00000001), ref: 6CF98083
                        • GetKeyState.USER32(00000002), ref: 6CF9809B
                        • GetKeyState.USER32(00000010), ref: 6CF980B3
                        • GetKeyState.USER32(00000012), ref: 6CF980C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: State
                        • String ID:
                        • API String ID: 1649606143-0
                        • Opcode ID: 9c6fc4a56e69d2fee9b041f40262113a64858991081abc1b2dabb78a24d101d0
                        • Instruction ID: 65649b4353be616b01d4b21e7d3a5cf0c0540506761ad0f0a8746410d52c0db6
                        • Opcode Fuzzy Hash: 9c6fc4a56e69d2fee9b041f40262113a64858991081abc1b2dabb78a24d101d0
                        • Instruction Fuzzy Hash: 49015270E06608EBFF08CF95C5467ADB7B1FB80305F24415EE946A7650D7719E41EB50
                        APIs
                        • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                        Strings
                        • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CreateInstance
                        • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                        • API String ID: 542301482-1377821865
                        • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                        • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                        • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                        • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 53c8061294ec54c7cd13ddf24de3aaa76d4d596e35418d4a3108236fac6f2d6d
                        • Instruction ID: d3de0d84df5d91be91160343bbdf24ac23cb7b75848b42c34298c9179d895f60
                        • Opcode Fuzzy Hash: 53c8061294ec54c7cd13ddf24de3aaa76d4d596e35418d4a3108236fac6f2d6d
                        • Instruction Fuzzy Hash: 5F321525D2DF424DEB239634C972335A69DAFB73D4F12D727E829B5A96EF28C4834100
                        Strings
                        • invalid literal/length code, xrefs: 6CFDB2BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: invalid literal/length code
                        • API String ID: 0-2703802952
                        • Opcode ID: 29872f1d8ff087c6dc629e40f06ce4ecbe2a8df07dfc0e589a05235272ef46da
                        • Instruction ID: 5e4a749c8e7ab6db34c59b0496c539b600991d9d1ce7abe96e306b506a29d68a
                        • Opcode Fuzzy Hash: 29872f1d8ff087c6dc629e40f06ce4ecbe2a8df07dfc0e589a05235272ef46da
                        • Instruction Fuzzy Hash: 0A6291B4E0520ACFCB08CF99C5909EEFBB2FF89314B248259D815A7355D734A952CFA4
                        APIs
                        • IsIconic.USER32(00000000), ref: 6CF93CF0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Iconic
                        • String ID:
                        • API String ID: 110040809-0
                        • Opcode ID: 714c2a2ef73d93052167ab926de1a7a943601cbe9b5fab842e3bd2f5b73836e4
                        • Instruction ID: 2987d603a749d3349f0bd3e53a00ab5894df4e8e118dc9c0bbadc8a454b083a9
                        • Opcode Fuzzy Hash: 714c2a2ef73d93052167ab926de1a7a943601cbe9b5fab842e3bd2f5b73836e4
                        • Instruction Fuzzy Hash: B6E0C27190820CABEB00CF60D905B8A37F89B00300F008159F80593290DB749A00DA60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                        • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                        • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                        • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                        • Instruction ID: 015b38bda9e3b6cdd42c782103d585f5a40de34a14c9f4388d8bbd788c22bebf
                        • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                        • Instruction Fuzzy Hash: CFC19573D6F5F3458B36462E445822FEE726E81B8832FC395ECE07F989C626AD0585D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                        • Instruction ID: c76afe4eb8a6f476560c20633d8c40b9c5e51c3cb03b31892a7e1d066c5379fb
                        • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                        • Instruction Fuzzy Hash: 89B1A773D6F4F3458725462E445822FEFB26E82B8932FC395ECE07F989C6266D0586D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                        • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                        • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                        • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 610b23f9225da6ee5cf62f95e2cd2b0b0b3a822c1f7dbae692d3ff4384bc61a3
                        • Instruction ID: 58b1faaf3f98daecddb8808ae9473a3db5ed588890f80f439fe2f92ed678d0f9
                        • Opcode Fuzzy Hash: 610b23f9225da6ee5cf62f95e2cd2b0b0b3a822c1f7dbae692d3ff4384bc61a3
                        • Instruction Fuzzy Hash: 77B1B0B1D01258CBDF14DFA9C884BDDFBB5AF14304F1481AED85AA7B40DB356A48CBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction ID: ac1031f6a40c7cd82e45a866f098e9fb1e097232ffaab6a958e0dc8accb0e24b
                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction Fuzzy Hash: E6110BF72420C147D211A72EF5F06A7B395EAC932D739436BD1624BE58D223D1459620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7cfc501d2c9ac840bd8ecb51454683a8592fa786a1eddfe0d74d7eb5a2c6bb83
                        • Instruction ID: 0daafdd6fedcdc14715d5442bd18e21d55c6b7af32b0735ef186756b6bbfccb6
                        • Opcode Fuzzy Hash: 7cfc501d2c9ac840bd8ecb51454683a8592fa786a1eddfe0d74d7eb5a2c6bb83
                        • Instruction Fuzzy Hash: C1E012B1A00208DFCB14DF6DD541AEAF7F4EF48310B51847ED85AE7740D631AD448B90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: align$center$checkable$checkboxdisabledimage$checkboxfocusedimage$checkboxforeimage$checkboxheight$checkboxhotimage$checkboxnormalimage$checkboxpushedimage$checkboxselectedimage$checkboxwidth$comboable$dragable$editable$endellipsis$focusedimage$font$hotimage$left$normalimage$pushedimage$right$sepimage$sepwidth$showhtml$textcolor$textpadding$true
                        • API String ID: 3832890014-1044791483
                        • Opcode ID: 3e9170cbdb25a9efbe7f97a7e821ca3a6381b12dc9229b2d80fa83644151f190
                        • Instruction ID: 84444f849851a4f02ed76476740e315ad1a37ed7166a88f34ff368e1ebe712e4
                        • Opcode Fuzzy Hash: 3e9170cbdb25a9efbe7f97a7e821ca3a6381b12dc9229b2d80fa83644151f190
                        • Instruction Fuzzy Hash: BE026EB6A04109BBDB04EFA5DC51EEE77F5AF8D254F108669F818AB740E7319A04CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: bkdisabledimage$bkhotimage$bknormalimage$bkpushedimage$button1disabledimage$button1hotimage$button1normalimage$button1pushedimage$button2disabledimage$button2hotimage$button2normalimage$button2pushedimage$hor$linesize$raildisabledimage$railhotimage$railnormalimage$railpushedimage$range$showbutton1$showbutton2$thumbdisabledimage$thumbhotimage$thumbnormalimage$thumbpushedimage$true$value
                        • API String ID: 3832890014-956292628
                        • Opcode ID: 637cf2090283f41591e5eb01b540f5d57e6d5d724f056ce3d40ebb8e09b2e206
                        • Instruction ID: 0b13ab7bd0ebd14c2cb40996cfbb4dd52f861a87104833fab4bfdbca94d11505
                        • Opcode Fuzzy Hash: 637cf2090283f41591e5eb01b540f5d57e6d5d724f056ce3d40ebb8e09b2e206
                        • Instruction Fuzzy Hash: CDB18EB2B04106F7DB04CF65DC91EEF77A96F59349F008519BD299BB40EB30EA088766
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: bindtabindex$bindtablayoutname$disabledbkcolor$disabledimage$focuedfont$focusedimage$focusedtextcolor$hotbkcolor$hotfont$hotforeimage$hotimage$hottextcolor$normalimage$pushedbkcolor$pushedfont$pushedimage$pushedtextcolor$statecount$stateimage
                        • API String ID: 3832890014-3678212032
                        • Opcode ID: d2555cc98e410a84eec918fc34f7fc7026895ce5ae0de24d23cfaba968d10b83
                        • Instruction ID: cbe6c65534459ac634876dac436e24843af8b398334c5bbee65b36c03a7d224f
                        • Opcode Fuzzy Hash: d2555cc98e410a84eec918fc34f7fc7026895ce5ae0de24d23cfaba968d10b83
                        • Instruction Fuzzy Hash: 6BD171B6A05109BBDB04DFA5DC94E9E77B9AF4D304F108519F9189B744EB31EE04CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: align$center$dragable$endellipsis$focusedimage$font$hotimage$left$normalimage$pushedimage$right$scale$sepimage$sepwidth$showhtml$textcolor$textpadding$true
                        • API String ID: 3832890014-2664051919
                        • Opcode ID: 17a8ee818e72d098a33a677e0141683b541142ffaa543dc8c4ee5a95588557fa
                        • Instruction ID: 3e3fb19e172ba1ff6576b2364a362a96bc65db3889746b831739d67b25762fa2
                        • Opcode Fuzzy Hash: 17a8ee818e72d098a33a677e0141683b541142ffaa543dc8c4ee5a95588557fa
                        • Instruction Fuzzy Hash: CCC167B5D14205BBEB04CF64DC50FEE77B6AF49314F448129E918AB341EB31E984CBA1
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                        • lstrlenW.KERNEL32(?), ref: 004063F8
                        • GetVersionExW.KERNEL32(?), ref: 00406456
                          • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                        • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                        • FreeLibrary.KERNEL32(00000000), ref: 00406500
                        • GlobalFree.KERNEL32(?), ref: 00406509
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                        • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                        • API String ID: 20674999-2124804629
                        • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                        • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                        • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                        • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                        APIs
                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                        • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                        • GetSysColor.USER32(?), ref: 004041DB
                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                        • lstrlenW.KERNEL32(?), ref: 00404202
                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                          • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                          • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                          • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                        • GetDlgItem.USER32(?,0000040A), ref: 00404276
                        • SendMessageW.USER32(00000000), ref: 0040427D
                        • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                        • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                        • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                        • SetCursor.USER32(00000000), ref: 004042FE
                        • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                        • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                        • SetCursor.USER32(00000000), ref: 00404322
                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                        • String ID: F$N$open
                        • API String ID: 3928313111-1104729357
                        • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                        • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                        • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                        • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                        APIs
                        • GetCursorPos.USER32(00000000), ref: 6CFA0D0A
                        • SendMessageW.USER32(?,00000202,00000000,00000000), ref: 6CFA0D3F
                        • GlobalLock.KERNEL32(00000000), ref: 6CFA0D74
                        • 73A1A570.USER32(00000000), ref: 6CFA0D90
                        • GlobalUnlock.KERNEL32(?), ref: 6CFA0DEE
                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 6CFA0E0F
                        • DeleteObject.GDI32(00000000), ref: 6CFA0E22
                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 6CFA0E63
                        • DeleteObject.GDI32(00000000), ref: 6CFA0E76
                        • GetEnhMetaFileHeader.GDI32(?,0000006C,?), ref: 6CFA0EAE
                        • 73A1A570.USER32(?), ref: 6CFA0EBE
                        • SelectObject.GDI32(?,?), ref: 6CFA0FDC
                        • PlayEnhMetaFile.GDI32(?,?,?), ref: 6CFA0FF4
                        • SelectObject.GDI32(?,?), ref: 6CFA1002
                        • DeleteDC.GDI32(?), ref: 6CFA100F
                        • SendMessageW.USER32(?,00000172,00000000,?), ref: 6CFA103E
                        • DeleteObject.GDI32(00000000), ref: 6CFA1051
                        • GlobalLock.KERNEL32(?), ref: 6CFA1080
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 6CFA10A6
                        • DragQueryFileW.SHELL32(00000000,00000000,?,00000208), ref: 6CFA10D0
                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00000050), ref: 6CFA10E7
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 6CFA1114
                        • DeleteObject.GDI32(00000000), ref: 6CFA1130
                        • GlobalUnlock.KERNEL32(?), ref: 6CFA113D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$DeleteMessageSend$FileGlobal$A570DragLockMetaQuerySelectUnlock$CursorHeaderImageLoadPlay
                        • String ID:
                        • API String ID: 156693821-0
                        • Opcode ID: df33628a3318c1e26b0a7dec68734c5b41ed32f7ca60689863d1c7a3cc29d8ec
                        • Instruction ID: 43ebda5a33f7da839ae1e1d71f94d641cead4b8ca871c53256dc720a7259c5e1
                        • Opcode Fuzzy Hash: df33628a3318c1e26b0a7dec68734c5b41ed32f7ca60689863d1c7a3cc29d8ec
                        • Instruction Fuzzy Hash: C4E14075E01218EFDB14DFA0CD89BADB775FF49305F218199E919AB280C7709A85CF50
                        APIs
                        • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                        • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                        • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                          • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                          • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                        • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                        • wsprintfA.USER32 ref: 00406B79
                        • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                          • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                          • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                        • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                        • CloseHandle.KERNEL32(?), ref: 00406C88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                        • String ID: ^F$%s=%s$NUL$[Rename]$plF
                        • API String ID: 565278875-3368763019
                        • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                        • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                        • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                        • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: forecolor2$hor$ishor$isstretchfore$max$min$true$value
                        • API String ID: 3832890014-980700665
                        • Opcode ID: 9f962f9121f9e2a016ddb346317a2fd604ca2ca995984a6b59b68f46a1a6549e
                        • Instruction ID: be6ddeacb98f32a34db077fea0ed8df0b0b2f9b179ab382d5c718741ddb0c7a8
                        • Opcode Fuzzy Hash: 9f962f9121f9e2a016ddb346317a2fd604ca2ca995984a6b59b68f46a1a6549e
                        • Instruction Fuzzy Hash: D95160B6904108BBDB24CFB5DC84E9E73B9AF49205F10C269F9289B750EB34EA45C761
                        APIs
                        • _memset.LIBCMT ref: 6CF9E4E8
                        • GetStockObject.GDI32(00000011), ref: 6CF9E4F8
                        • GetObjectW.GDI32(00000000), ref: 6CF9E4FF
                        • lstrlenW.KERNEL32(00000000), ref: 6CF9E509
                        • _memset.LIBCMT ref: 6CF9E527
                        • _wcsncat.LIBCMT ref: 6CF9E53C
                        • _wcsncpy.LIBCMT ref: 6CF9E551
                        • CreateFontIndirectW.GDI32(00000000), ref: 6CF9E5A8
                        • DeleteObject.GDI32(000A0DE0), ref: 6CF9E5CF
                        • _memset.LIBCMT ref: 6CF9E618
                        • SelectObject.GDI32(00000000,00000000), ref: 6CF9E640
                        • GetTextMetricsW.GDI32(00000000,6D04B28C), ref: 6CF9E65E
                        • SelectObject.GDI32(00000000,?), ref: 6CF9E678
                        • DeleteObject.GDI32(?), ref: 6CF9E690
                        • _memset.LIBCMT ref: 6CF9E706
                        • SelectObject.GDI32(00000000,00000000), ref: 6CF9E72E
                        • GetTextMetricsW.GDI32(00000000,?), ref: 6CF9E754
                        • SelectObject.GDI32(00000000,?), ref: 6CF9E76E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$Select_memset$DeleteMetricsText$CreateFontIndirectStock_wcsncat_wcsncpylstrlen
                        • String ID:
                        • API String ID: 489608762-2974417871
                        • Opcode ID: 2fd65bde0c8216d3a06dda7d7fe53de8f1358fc6c409b52556931587fd6d7214
                        • Instruction ID: 489578f4a04f0096b66cc7c08be0fdb4b2a31e0dc5f3d590e0c4a46dd748803a
                        • Opcode Fuzzy Hash: 2fd65bde0c8216d3a06dda7d7fe53de8f1358fc6c409b52556931587fd6d7214
                        • Instruction Fuzzy Hash: 4E814F75A01388DFDB14DFA4C994FEE7BB5AF49304F1441A9E9099B382D7309A84CF52
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: sendmove$step$thumbhotimage$thumbimage$thumbpushedimage$thumbsize$true
                        • API String ID: 3832890014-1594985145
                        • Opcode ID: f5a5d738ae4d010f27d5703624d866cf387393c834b203c961a238513accdd2f
                        • Instruction ID: a86c8dfe4e83c50f2046168ba4be23d7798a61efe1071bb05ddd40902d973004
                        • Opcode Fuzzy Hash: f5a5d738ae4d010f27d5703624d866cf387393c834b203c961a238513accdd2f
                        • Instruction Fuzzy Hash: 504144B6A04208BBDB04DFA5DC40EEF77F8EF49344F008519B92897790EB31AA05CB65
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$_memset$DeleteSelect$CreateFontIndirectMetricsStockText__itow_malloc_wcsncat_wcsncpylstrlen
                        • String ID:
                        • API String ID: 235911522-0
                        • Opcode ID: c088b83e11e68b2323b000f1ee46215ae86194b2c38a253e217a4a0d26cac93e
                        • Instruction ID: f97b158415854f693dc0557c6fb78998f18fb7183ca738dbd18a9d0a2f5c7efd
                        • Opcode Fuzzy Hash: c088b83e11e68b2323b000f1ee46215ae86194b2c38a253e217a4a0d26cac93e
                        • Instruction Fuzzy Hash: 82E16DB1D01219DBEB18CF64D980BEEB7B5BF49304F1481E9E549A7780DB709A84CFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Delete
                        • String ID:
                        • API String ID: 1035893169-0
                        • Opcode ID: 101366d0fc4c30f9bf1c4397e4af91de4bb9c2d5d70bda66b939f786f2ea19f0
                        • Instruction ID: c41ecb4466c42c682ca88f0aa5c4632b2ba1be24e7be605fbc5e4c393c4410b3
                        • Opcode Fuzzy Hash: 101366d0fc4c30f9bf1c4397e4af91de4bb9c2d5d70bda66b939f786f2ea19f0
                        • Instruction Fuzzy Hash: B6D1F4B5E01209DBDB04DFA8D994BAFBBB5BF8C300F208559E905B7380D775A945CBA0
                        APIs
                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                        • BeginPaint.USER32(?,?), ref: 00401047
                        • GetClientRect.USER32(?,?), ref: 0040105B
                        • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                        • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                        • DeleteObject.GDI32(?), ref: 004010F6
                        • CreateFontIndirectW.GDI32(?), ref: 0040110E
                        • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                        • SelectObject.GDI32(00000000,?), ref: 00401149
                        • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                        • SelectObject.GDI32(00000000,00000000), ref: 00401169
                        • DeleteObject.GDI32(?), ref: 0040116E
                        • EndPaint.USER32(?,?), ref: 00401177
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                        • String ID: F
                        • API String ID: 941294808-1304234792
                        • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                        • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                        • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                        • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                        APIs
                        • _memcmp.LIBCMT ref: 6CFF82AF
                        • SysAllocString.OLEAUT32(errorLine), ref: 6CFF82F5
                        • SysAllocString.OLEAUT32(errorCharacter), ref: 6CFF8306
                        • SysAllocString.OLEAUT32(errorCode), ref: 6CFF8317
                        • SysAllocString.OLEAUT32(errorMessage), ref: 6CFF8328
                        • SysAllocString.OLEAUT32(errorUrl), ref: 6CFF8339
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocString$_memcmp
                        • String ID: ($errorCharacter$errorCode$errorLine$errorMessage$errorUrl
                        • API String ID: 3266598443-2821095632
                        • Opcode ID: f8716b0b74952b043ce0361401ff2c157e16f81f5ec684c799c39a1eea2bd1ae
                        • Instruction ID: c1979b2985ce464bf239f6011d2a282f0e15f14ea97b3277465477578ce97708
                        • Opcode Fuzzy Hash: f8716b0b74952b043ce0361401ff2c157e16f81f5ec684c799c39a1eea2bd1ae
                        • Instruction Fuzzy Hash: 05610D75E00219EFDB44CFA4C884BAEB7B5FF49304F208159E919A73A1D770A945CF91
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF70E1F
                        • GlobalFree.KERNEL32 ref: 6CF70E2F
                        • _memset.LIBCMT ref: 6CF70E61
                        • lstrcpyW.KERNEL32(?,?), ref: 6CF70E7F
                        • GlobalFree.KERNEL32 ref: 6CF70E8F
                        • _memset.LIBCMT ref: 6CF70EE0
                        • SHBrowseForFolderW.SHELL32(?), ref: 6CF70EED
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF70F10
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF70F28
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 6CF70F5B
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF70F76
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF70F8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$lstrcpyn$AllocFree_memset$BrowseFolderFromListPathlstrcpy
                        • String ID: @
                        • API String ID: 2971311640-2766056989
                        • Opcode ID: 54795fabb5fed06c259e2321284bb3ab6fb6f9a62e1547f8fa975d6fc0e89beb
                        • Instruction ID: 14e4f2041299231cb09a5334c70f575f5e9626ffaa425f2f93b1b70c11332822
                        • Opcode Fuzzy Hash: 54795fabb5fed06c259e2321284bb3ab6fb6f9a62e1547f8fa975d6fc0e89beb
                        • Instruction Fuzzy Hash: 4A5125B6905341DFC724DF68D584AAAB7F9EFC9314F104A2EF94987240E770A948CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8!$return
                        • API String ID: 0-1804769167
                        • Opcode ID: 6dfcbcb4621d3068cae841be017b41699b3ffd577e70ab6391970a7e7e78e1a7
                        • Instruction ID: 4c390427e19da1d7bb9639053be5be08c98eedd36acd939096ab3c662f053ca1
                        • Opcode Fuzzy Hash: 6dfcbcb4621d3068cae841be017b41699b3ffd577e70ab6391970a7e7e78e1a7
                        • Instruction Fuzzy Hash: 31C1FC74E04209AFEB08CF99C894BADBBB6FF88305F20C559E9159B385C734E946CB50
                        APIs
                        • _memset.LIBCMT ref: 6CF8BD16
                        • GetClassInfoExW.USER32(00000000,?,00000030), ref: 6CF8BD2F
                        • GetClassInfoExW.USER32(00000000,?,00000030), ref: 6CF8BD47
                        • RegisterClassExW.USER32(00000030), ref: 6CF8BD7A
                        • GetLastError.KERNEL32 ref: 6CF8BD8C
                        • _memset.LIBCMT ref: 6CF8BDC5
                        • GetClassInfoExW.USER32(00000000,00000000), ref: 6CF8BDE8
                        • GetClassInfoExW.USER32(00000000,00000000), ref: 6CF8BE0A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Class$Info$_memset$ErrorLastRegister
                        • String ID: 0$0
                        • API String ID: 3232360322-203156872
                        • Opcode ID: 8f413ee0bae34592debb1ab9db79b82d4f2677b30ff59983c1e2240ceb5150ce
                        • Instruction ID: 52884e14e1806d64715ff72a76edf1a7d6f5fd91dd79a4683a8f7e405cff644f
                        • Opcode Fuzzy Hash: 8f413ee0bae34592debb1ab9db79b82d4f2677b30ff59983c1e2240ceb5150ce
                        • Instruction Fuzzy Hash: E751F575A02208EFDB14DFA5C885BEDBBB4BF49304F348659E905A7362DB30AA45CF50
                        APIs
                        • PtInRect.USER32(?,?,00000000), ref: 6CFEE62F
                        • LoadCursorW.USER32(00000000,00007F89), ref: 6CFEE640
                        • SetCursor.USER32(00000000), ref: 6CFEE647
                        • PtInRect.USER32(?,?,?), ref: 6CFEE6B3
                        • PtInRect.USER32(?,?,?), ref: 6CFEE73B
                          • Part of subcall function 6CFEF6A0: _memset.LIBCMT ref: 6CFEF6B1
                        • PtInRect.USER32(?,?,?), ref: 6CFEE8EF
                        • PtInRect.USER32(?,?,?), ref: 6CFEE940
                        • PtInRect.USER32(?,?,?), ref: 6CFEE9B0
                        • PtInRect.USER32(?,?,?), ref: 6CFEEA50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$Cursor$Load_memset
                        • String ID: link$listitemchecked
                        • API String ID: 1396307209-30625825
                        • Opcode ID: a2b404409ffe00f147fec37b03e8edeabd5481ef884eede281a721a2ebe0c912
                        • Instruction ID: c5442ba22402f823636c41dd2bca7e99732dc779096e4088f524588959e487b1
                        • Opcode Fuzzy Hash: a2b404409ffe00f147fec37b03e8edeabd5481ef884eede281a721a2ebe0c912
                        • Instruction Fuzzy Hash: 7D02F375A04609EFDB04CF98D890EAEB7B2FF89314F188268E5159B751D730AD86CF90
                        APIs
                        • SelectObject.GDI32(?,00000000), ref: 6CFC1DF9
                        • SelectObject.GDI32(?,00000000), ref: 6CFC1EC7
                        • 73A24D40.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6CFC1EF1
                        • SelectObject.GDI32(?,?), ref: 6CFC1F36
                        • DeleteDC.GDI32(?), ref: 6CFC1F40
                        • GdiFlush.GDI32 ref: 6CFC1F46
                        • SelectObject.GDI32(?,?), ref: 6CFC1F54
                        • DeleteObject.GDI32(00000000), ref: 6CFC1F5E
                        • DeleteDC.GDI32(?), ref: 6CFC1F68
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$Select$Delete$Flush
                        • String ID: (
                        • API String ID: 3202616065-3887548279
                        • Opcode ID: 8788dd1bf1fb2a505616a39cae790a437c4c26a8090981f26899490eabddaac9
                        • Instruction ID: 51a077cab3b0495b4b300aabddc3f0c754a2d1ce69dd91ee099ecc2a89ee66e3
                        • Opcode Fuzzy Hash: 8788dd1bf1fb2a505616a39cae790a437c4c26a8090981f26899490eabddaac9
                        • Instruction Fuzzy Hash: 1A61A3B5E01209EFCF04DFA8D994BAEBBB5BF88304F108519E919A7240D734A945CF61
                        APIs
                        • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                        • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                        • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                        • RegCloseKey.ADVAPI32(?), ref: 004029E4
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        Strings
                        • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                        • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                        • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                        • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                        • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                        • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrlen$CloseCreateValuewvsprintf
                        • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                        • API String ID: 1641139501-220328614
                        • Opcode ID: 88e4ee1587b6acc04eade602774f77907f811befdb6ad9f01a68df4d4fc2eb7d
                        • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                        • Opcode Fuzzy Hash: 88e4ee1587b6acc04eade602774f77907f811befdb6ad9f01a68df4d4fc2eb7d
                        • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF71051
                        • GlobalFree.KERNEL32 ref: 6CF7105D
                        • _memset.LIBCMT ref: 6CF710B5
                        • SHBrowseForFolderW.SHELL32(?), ref: 6CF710C2
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF710E5
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF710FC
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 6CF7112A
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF71145
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF7115D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Globallstrcpyn$Alloc$BrowseFolderFreeFromListPath_memset
                        • String ID: @
                        • API String ID: 4260312955-2766056989
                        • Opcode ID: ab0073e9efc28a63ffdaa4986b6d58ae086ea2a2b56b48178d3d7ca254a9d46b
                        • Instruction ID: 9df70922e99de6a3bed11f8274f8e9ee60be66f187678dc383f911251d35ac1d
                        • Opcode Fuzzy Hash: ab0073e9efc28a63ffdaa4986b6d58ae086ea2a2b56b48178d3d7ca254a9d46b
                        • Instruction Fuzzy Hash: 444125B1505301DFCB14EF28D985A9AB7F8EBC9714F108A2EF54987350E770E948CBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$CharNext_wcstoul$__fassign
                        • String ID: disabledtextcolor$font$textcolor
                        • API String ID: 2265040770-51903553
                        • Opcode ID: 14be05346f97a35a9ab67283bed6ca2f093144579346e1afc616faa417683b21
                        • Instruction ID: 297aa1234a67a48b00d416c891cb72a66c8458a5e0e290085d49736b167b28ad
                        • Opcode Fuzzy Hash: 14be05346f97a35a9ab67283bed6ca2f093144579346e1afc616faa417683b21
                        • Instruction Fuzzy Hash: F93130B5D04208BBEF04DFA4DD44FAE77B9AF89304F20C559F9189B280E7349A04CBA1
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF6FD45
                        • GlobalFree.KERNEL32 ref: 6CF6FD51
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF6FD87
                        • GlobalFree.KERNEL32 ref: 6CF6FD94
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF6FDCE
                        • GlobalFree.KERNEL32 ref: 6CF6FDDB
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF6FE15
                        • GlobalFree.KERNEL32 ref: 6CF6FE25
                        • IsWindow.USER32(?), ref: 6CF6FE3F
                        • SetTimer.USER32(?,00000000,00000000,00000000), ref: 6CF6FE67
                        • SetTimer.USER32(?,00000000,00000000,00000000), ref: 6CF6FEB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGloballstrcpyn$Timer$Window
                        • String ID:
                        • API String ID: 4073460630-0
                        • Opcode ID: ec1a67c90fe7f78a616723eb73665824e564e9f6139a5d9219711835869e8cf8
                        • Instruction ID: 0bcd5ab3e9e711f0abcc1f91fab8d1443ee5af6db0f3d3f4330c18fa737b7aa1
                        • Opcode Fuzzy Hash: ec1a67c90fe7f78a616723eb73665824e564e9f6139a5d9219711835869e8cf8
                        • Instruction Fuzzy Hash: 7A51B271A01214DFCB64EF29C980FDA77B8FF8A714F204599E245A7A41DB70AD84CFA0
                        APIs
                        • std::exception::exception.LIBCMT ref: 6CF78A07
                        • __CxxThrowException@8.LIBCMT ref: 6CF78A1C
                        • std::exception::exception.LIBCMT ref: 6CF78AAF
                        • __CxxThrowException@8.LIBCMT ref: 6CF78AC4
                        Strings
                        • Type is not convertible to UInt64, xrefs: 6CF78AA8
                        • Real out of UInt64 range, xrefs: 6CF78A74
                        • Negative integer can not be converted to UInt64, xrefs: 6CF78A00
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throwstd::exception::exception
                        • String ID: Negative integer can not be converted to UInt64$Real out of UInt64 range$Type is not convertible to UInt64
                        • API String ID: 3728558374-2599800953
                        • Opcode ID: 3d469ef026abe9d1a441f1509606ed4036ba2f181ccaca28293f5da19c7def93
                        • Instruction ID: 20cfb49e5d90496235d796a3d4d573406e063f946fc23976cc426ef54e268366
                        • Opcode Fuzzy Hash: 3d469ef026abe9d1a441f1509606ed4036ba2f181ccaca28293f5da19c7def93
                        • Instruction Fuzzy Hash: FF31B471A0120DABEF24DFE5E545BEEB7B4EF49304F2042DED804B2650D7325A55CB61
                        APIs
                        • std::exception::exception.LIBCMT ref: 6CF788F5
                        • __CxxThrowException@8.LIBCMT ref: 6CF7890A
                        • std::exception::exception.LIBCMT ref: 6CF78981
                        • __CxxThrowException@8.LIBCMT ref: 6CF78996
                        Strings
                        • Type is not convertible to Int64, xrefs: 6CF7897A
                        • unsigned integer out of Int64 range, xrefs: 6CF788EE
                        • Real out of Int64 range, xrefs: 6CF78946
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throwstd::exception::exception
                        • String ID: Real out of Int64 range$Type is not convertible to Int64$unsigned integer out of Int64 range
                        • API String ID: 3728558374-1238791498
                        • Opcode ID: 8375be8fb7bc49fde0740ae818ef5e1128f4b7ff5d2e7bfa75a5c0f1875457f4
                        • Instruction ID: ed9285c4d09153084efdfe53b9404fcbfa8aca6ff4fea464fd7b968a33458e6e
                        • Opcode Fuzzy Hash: 8375be8fb7bc49fde0740ae818ef5e1128f4b7ff5d2e7bfa75a5c0f1875457f4
                        • Instruction Fuzzy Hash: 0321E57190110DDB9B10CBE4E945BEEB774EB4A314F2046DFD418A3A90DB318615CB72
                        APIs
                        • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                        • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                        • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                        • lstrcatW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                        • lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),?,?,00406300,00000000), ref: 004061CE
                        • WriteFile.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                        • String ID: @bG$File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1)
                        • API String ID: 3734993849-1405478896
                        • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                        • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                        • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                        • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: autoplay$autosize$bkimage$true
                        • API String ID: 3832890014-909319370
                        • Opcode ID: ebf0ebe206b3448ccc7401b6658e0a949df204eaab3291ffbb80ee503564b284
                        • Instruction ID: aa624e47f295b0b9739b0fcc10daf36ca5caf3ec855e94f0fe4af16aa37c75db
                        • Opcode Fuzzy Hash: ebf0ebe206b3448ccc7401b6658e0a949df204eaab3291ffbb80ee503564b284
                        • Instruction Fuzzy Hash: 23115EF1A08208BBEF04DBA5ED91EAE73A96F49245F108559B91C87350FB30EA04C761
                        APIs
                          • Part of subcall function 6CF95A40: CharNextW.USER32(00000000,00000000,?,00000000,E243FD3F), ref: 6CF95B51
                          • Part of subcall function 6CF95A40: CharNextW.USER32(00000000,00000000,?,00000000,E243FD3F), ref: 6CF95B80
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CFBA53D
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,?,00000000,00000000,E243FD3F), ref: 6CFBA560
                        • GetFileSize.KERNEL32(000000FF,00000000), ref: 6CFBA592
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CFBA654
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?,?,6D03A17C,6D02AEC8), ref: 6CFBA8F1
                        • GetFileSize.KERNEL32(000000FF,00000000,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,?,?,?,00000000,E243FD3F), ref: 6CFBA914
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        • ReadFile.KERNEL32(000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,?), ref: 6CFBA965
                        • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,?,?,?,00000000,E243FD3F), ref: 6CFBA972
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: File$DebugHeap$CharCreateNextSizeStringString::_std::_$CloseHandleRead_free
                        • String ID:
                        • API String ID: 441641967-0
                        • Opcode ID: 95c762f18a44ea26cd14cabd8eda98f2f6fba3ecfcf39014f10afc5b0db7835f
                        • Instruction ID: 5d9872d4310718a30ccf3d968151bf8744ca17757f06a64b62502f237cc7cf81
                        • Opcode Fuzzy Hash: 95c762f18a44ea26cd14cabd8eda98f2f6fba3ecfcf39014f10afc5b0db7835f
                        • Instruction Fuzzy Hash: C0F15AB0D05218DBDB24DBA4DD45BEEB7B4AF44308F1042D9D20A77680DB756B89CFA2
                        APIs
                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,6CFD127E,00000000,E243FD3F), ref: 6CF9ED4B
                        • GetFileSize.KERNEL32(000000FF,00000000), ref: 6CF9ED80
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CF9EE48
                        • CreateFileW.KERNEL32(6CFD127E,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?,6D03A17C,6D02AEC8,6CFD127E), ref: 6CF9F0EB
                        • GetFileSize.KERNEL32(000000FF,00000000,?,?,?,?,?,?,6D03A17C,6D02AEC8,6CFD127E,000000FF,?,?,00000000,E243FD3F), ref: 6CF9F10E
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        • ReadFile.KERNEL32(000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,6CFD127E,000000FF), ref: 6CF9F15F
                        • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,6CFD127E,000000FF,?,?,00000000,E243FD3F), ref: 6CF9F16C
                        • AddFontMemResourceEx.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,6D03A17C,6D02AEC8,6CFD127E,000000FF), ref: 6CF9F1B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: File$CreateDebugHeapSize$CloseFontHandleReadResourceStringString::__freestd::_
                        • String ID:
                        • API String ID: 4282563726-0
                        • Opcode ID: 792ddfa91bc4ac2fe058a586323b39312043020f8177c418edfd48bbc31bcf2e
                        • Instruction ID: 4fc2a3f5b7a67c54c0d955bacfdf5f0a584f328d424932543898f296be66a487
                        • Opcode Fuzzy Hash: 792ddfa91bc4ac2fe058a586323b39312043020f8177c418edfd48bbc31bcf2e
                        • Instruction Fuzzy Hash: C6E11AB1D01218DBEF64DB64DC44BEEB7B5AF44318F2082D9E11967680DB705B88CFA6
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF6C409
                        • __CxxThrowException@8.LIBCMT ref: 6CF6C41E
                        • std::exception::exception.LIBCMT ref: 6CF6C42D
                        • __CxxThrowException@8.LIBCMT ref: 6CF6C442
                        • std::exception::exception.LIBCMT ref: 6CF6C451
                        • __CxxThrowException@8.LIBCMT ref: 6CF6C466
                        • std::exception::exception.LIBCMT ref: 6CF6C475
                        • __CxxThrowException@8.LIBCMT ref: 6CF6C48A
                        • std::exception::exception.LIBCMT ref: 6CF6C499
                        • __CxxThrowException@8.LIBCMT ref: 6CF6C4AE
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8B0
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8CA
                          • Part of subcall function 6CF7C861: __CxxThrowException@8.LIBCMT ref: 6CF7C8DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                        • String ID:
                        • API String ID: 2621100827-0
                        • Opcode ID: 98789ab34e48563927e6eb5b552af0e1e37041b9a65638be89243978c0691e09
                        • Instruction ID: b87adcd26f41f7be21479bb4c5483d264e590ab9c8c9332931658447630b6793
                        • Opcode Fuzzy Hash: 98789ab34e48563927e6eb5b552af0e1e37041b9a65638be89243978c0691e09
                        • Instruction Fuzzy Hash: 328139B19017449FD721DF69C444BEABBE0BF59304F54C95ED8AAA7701EB30A508CBA2
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF61EF6
                        • __CxxThrowException@8.LIBCMT ref: 6CF61F0B
                        • std::exception::exception.LIBCMT ref: 6CF61F1A
                        • __CxxThrowException@8.LIBCMT ref: 6CF61F2F
                        • std::exception::exception.LIBCMT ref: 6CF61F3E
                        • __CxxThrowException@8.LIBCMT ref: 6CF61F53
                        • std::exception::exception.LIBCMT ref: 6CF61F62
                        • __CxxThrowException@8.LIBCMT ref: 6CF61F77
                        • std::exception::exception.LIBCMT ref: 6CF61F86
                        • __CxxThrowException@8.LIBCMT ref: 6CF61F9B
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8B0
                          • Part of subcall function 6CF7C861: std::exception::exception.LIBCMT ref: 6CF7C8CA
                          • Part of subcall function 6CF7C861: __CxxThrowException@8.LIBCMT ref: 6CF7C8DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                        • String ID:
                        • API String ID: 2621100827-0
                        • Opcode ID: 56c914a97d086034f148216e17a1df1b1e8a80cc3f8cce88ae2f35f16c4e6001
                        • Instruction ID: db3ce2cc4671254af53128ca852f57d7d2cea897a015c4464b1ae26dfcf7e4c1
                        • Opcode Fuzzy Hash: 56c914a97d086034f148216e17a1df1b1e8a80cc3f8cce88ae2f35f16c4e6001
                        • Instruction Fuzzy Hash: B4518DB1901704DFC761CF69D980AEEBBF0FF58600F54866EE449A7B51E731A908CB62
                        APIs
                        • MonitorFromWindow.USER32(00000000,00000001), ref: 6CFFC8FF
                        • GetMonitorInfoW.USER32(00000000), ref: 6CFFC906
                        • GetWindowRect.USER32(00000000), ref: 6CFFCA94
                        • MapWindowPoints.USER32(00000000), ref: 6CFFCADE
                        • GetWindowRect.USER32(00000000,00000000), ref: 6CFFCBB9
                        • MoveWindow.USER32(FFFFFFFF,?,?,?,?), ref: 6CFFCD73
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$MonitorRect$FromInfoMovePoints
                        • String ID: ($MenuElement
                        • API String ID: 2634076724-3031226456
                        • Opcode ID: 380706f7346b6cc6c972e9be4683504f7cfec73a6f7fbc2b026ac9220ac75e9c
                        • Instruction ID: c0ddf747cad7b15f63852b4895b944856a12cfdf27663d032d46f70175973eb7
                        • Opcode Fuzzy Hash: 380706f7346b6cc6c972e9be4683504f7cfec73a6f7fbc2b026ac9220ac75e9c
                        • Instruction Fuzzy Hash: E4029374E042688FDB28CF98C994BDDB7B1BF89304F1481A9D519AB355DB306E86CF90
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                        • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                        • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                        • GlobalFree.KERNEL32(00000000), ref: 00402F17
                        • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                        • DeleteFileW.KERNEL32(?), ref: 00402F56
                        Strings
                        • created uninstaller: %d, "%s", xrefs: 00402F3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                        • String ID: created uninstaller: %d, "%s"
                        • API String ID: 3294113728-3145124454
                        • Opcode ID: 425adf467cb2c86b17273659995b3ed8045270cb1554a1bec104c33d48d0e7ae
                        • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                        • Opcode Fuzzy Hash: 425adf467cb2c86b17273659995b3ed8045270cb1554a1bec104c33d48d0e7ae
                        • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                        APIs
                          • Part of subcall function 6CF8C9B0: _wcslen.LIBCMT ref: 6CF8C9BD
                        • _wcslen.LIBCMT ref: 6CF8C9F8
                        • _malloc.LIBCMT ref: 6CF8CA20
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        • _wcscpy.LIBCMT ref: 6CF8CA3A
                        • _wcscat.LIBCMT ref: 6CF8CA4C
                        • _wcscat.LIBCMT ref: 6CF8CA7B
                        • _free.LIBCMT ref: 6CF8CA98
                        • _wcscat.LIBCMT ref: 6CF8CAB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _wcscat$_wcslen$AllocateHeap_free_malloc_wcscpy
                        • String ID: ?
                        • API String ID: 3373672540-1684325040
                        • Opcode ID: 1eff190317c42efdf50057d75f0da352851831f57c92b7e1028e0c35714c2136
                        • Instruction ID: 7d3b675f2579f691c8c4f408612ac76515321f8a2dcb28d69e8f3d9a38b2389b
                        • Opcode Fuzzy Hash: 1eff190317c42efdf50057d75f0da352851831f57c92b7e1028e0c35714c2136
                        • Instruction Fuzzy Hash: 9B3114B5E05208EFDB04DFA8D891D9EB7B5EF49308F1441A8E909AB700E731EA55CB91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$__fassign$_memset
                        • String ID: Default$Font$Image$Style
                        • API String ID: 4232687799-1745633971
                        • Opcode ID: 150fc99b664d1a204c52007f106f1a3c8a7534ce7c05dd73007adfc477f3914b
                        • Instruction ID: 07b8a6aa5cc5c1d6046fcc438e2450ed3255a9f16017333114e940654022b84a
                        • Opcode Fuzzy Hash: 150fc99b664d1a204c52007f106f1a3c8a7534ce7c05dd73007adfc477f3914b
                        • Instruction Fuzzy Hash: 9801CCB1D0411996EF248A20DC55BBB73B26F91205F1846E9D90953A80EB33AE58CAE1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$CharNext__fassign
                        • String ID:
                        • API String ID: 3170261096-0
                        • Opcode ID: 34da8000f445b1908d7baa84d8fb6b52ef566aa960d555c9ec28565a4fe85862
                        • Instruction ID: b696ff742f430d94723672abaa802f31ab1bee635093fa326603fbfeca4f9afb
                        • Opcode Fuzzy Hash: 34da8000f445b1908d7baa84d8fb6b52ef566aa960d555c9ec28565a4fe85862
                        • Instruction Fuzzy Hash: 99D15AB5A05169CBDB14CF25D890BEEB7B2BF85304F1081D9E849AB740DB30AE95CF91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$CharNext__fassign
                        • String ID:
                        • API String ID: 3170261096-0
                        • Opcode ID: 467c6e0afe294e38f2c25249ddfcf6cc004b50960beb5cc2b1631f68aa995e83
                        • Instruction ID: a058481970e8f6e69040f90a89ac772c4b5490523603e54bb9e116577b08869d
                        • Opcode Fuzzy Hash: 467c6e0afe294e38f2c25249ddfcf6cc004b50960beb5cc2b1631f68aa995e83
                        • Instruction Fuzzy Hash: E1C18FB5E041598BDB14CF65D890BEEB7B1BF85304F1081D9E84AAB740DB34AE95CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$Mode
                        • String ID:
                        • API String ID: 3279056331-0
                        • Opcode ID: d2bcb055ef642ee4a7a8d6a1ae63258eeed9bfb31d54b27261c37fb628f0ea8b
                        • Instruction ID: d5eb39dc0bb2af3118213423542674ec28b3fe085c1d86f2235f1fb5683de6ab
                        • Opcode Fuzzy Hash: d2bcb055ef642ee4a7a8d6a1ae63258eeed9bfb31d54b27261c37fb628f0ea8b
                        • Instruction Fuzzy Hash: 7FC18FB5A04169CBDB18CF25DC90BEEB7B1AF85305F1081D9E44ABB680DB349E95CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$CharNext__fassign
                        • String ID:
                        • API String ID: 3170261096-0
                        • Opcode ID: 6b0cb7c70d7acc016cb0d1bd8b85d3a60ed9e715b22fa55d529227f68a897717
                        • Instruction ID: 772c0b0e1a4d56394f5ecc7a8fae32b9730af54d5fbaa6c55ff0423baf20660b
                        • Opcode Fuzzy Hash: 6b0cb7c70d7acc016cb0d1bd8b85d3a60ed9e715b22fa55d529227f68a897717
                        • Instruction Fuzzy Hash: 99C16EB5A041699BDB14CF25DC90BEEB7B1BF85304F1081D9E84ABB640DB309E99CF91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 4646cfe65b599575e1d7ab05af9833a4cc928617717895434b101d411332641e
                        • Instruction ID: 227d0c44f5c0c00749fcf1d2e9866c83c9862737b76b128c32bf27fe3e78a8a6
                        • Opcode Fuzzy Hash: 4646cfe65b599575e1d7ab05af9833a4cc928617717895434b101d411332641e
                        • Instruction Fuzzy Hash: EF714CB599020AFBFB05CF64C881BAE37B0FB46304F508518F9159B390D379E994CBA8
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF723D4
                        • GlobalFree.KERNEL32 ref: 6CF723E4
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF7241B
                        • GlobalFree.KERNEL32 ref: 6CF7242C
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF72465
                        • GlobalFree.KERNEL32 ref: 6CF72476
                        • wsprintfW.USER32 ref: 6CF724BE
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF724DD
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF724F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Globallstrcpyn$Free$Allocwsprintf
                        • String ID:
                        • API String ID: 2453304079-0
                        • Opcode ID: 752f79c33eec7e93b02696ed95d6592212b9f53ab8a116d530f2d2004a99b747
                        • Instruction ID: cbbbc54eff257541a0f28cdd4cf8c3ce5b6704c5f820913b163b3b281348a476
                        • Opcode Fuzzy Hash: 752f79c33eec7e93b02696ed95d6592212b9f53ab8a116d530f2d2004a99b747
                        • Instruction Fuzzy Hash: 3E51AC72504301CFCB24EF68E884A9AB7F8FFC9314F104A2EE59587740D771A988CBA1
                        APIs
                        • PtInRect.USER32(?,?,?), ref: 6CFF88FC
                        • LoadCursorW.USER32(00000000,00007F89), ref: 6CFF890D
                        • SetCursor.USER32(00000000), ref: 6CFF8914
                        • PtInRect.USER32(?,?,?), ref: 6CFF8984
                        • PtInRect.USER32(?,?,?), ref: 6CFF89FC
                        • PtInRect.USER32(?,?,?), ref: 6CFF8AAC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$Cursor$Load
                        • String ID: link
                        • API String ID: 1264107634-917281265
                        • Opcode ID: 9f485841b770dc05d8fa2b9f6ecb111a074c9fb674093785f596c67bc2e24a5c
                        • Instruction ID: 04fce0c779886a11ef5df9f13f8e9d5641bfe083055245c22f18678933a72118
                        • Opcode Fuzzy Hash: 9f485841b770dc05d8fa2b9f6ecb111a074c9fb674093785f596c67bc2e24a5c
                        • Instruction Fuzzy Hash: BEA12174A0420ADFDB08CF89C495AAFB7B1FF46314F548259E525ABB65C730E982CF90
                        APIs
                        • CharNextW.USER32(6CFCF034,?,6CFCFD34,6CFCF036,6CFCF036), ref: 6CFD0161
                        • CharNextW.USER32(6CFCF036,6CFCF036,6CFCF036,6CFCFD34,00000022,6CFCF036,?,6CFCFD34,6CFCF036,6CFCF036), ref: 6CFD01D3
                        Strings
                        • Expected attribute value, xrefs: 6CFD0273
                        • Error while parsing attributes, xrefs: 6CFD01F3
                        • Error while parsing attribute string, xrefs: 6CFD02BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CharNext
                        • String ID: Error while parsing attribute string$Error while parsing attributes$Expected attribute value
                        • API String ID: 3213498283-2127762582
                        • Opcode ID: 12003965d743afd6d44b7290757c0fc7f9acd454cc927292aafca884a3304f62
                        • Instruction ID: dff65bd2148920d7dca8ac74cd2ddd4adc32b1adfa714b99ee7939a027c1d9b5
                        • Opcode Fuzzy Hash: 12003965d743afd6d44b7290757c0fc7f9acd454cc927292aafca884a3304f62
                        • Instruction Fuzzy Hash: 7D91F338601245EFCB08CF55C4D09AE7BB2FF8A354B258199F89A8F764D770E981DB90
                        APIs
                        • MonitorFromWindow.USER32(00000000,00000001), ref: 6CFFC647
                        • GetMonitorInfoW.USER32(00000000), ref: 6CFFC64E
                          • Part of subcall function 6CF977F0: SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,?,00000016,00000000,?,6CFD1441,00000000,?,00000000,?), ref: 6CF97841
                        • Mailbox.LIBCMTD ref: 6CFFC6EE
                        • SetForegroundWindow.USER32(00000001), ref: 6CFFC780
                        • MoveWindow.USER32(00000001,?,?,00000000,00000000,00000000), ref: 6CFFC7AC
                        • SetWindowPos.USER32(00000001,000000FF,?,?,00000000,?), ref: 6CFFC816
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$Monitor$ForegroundFromInfoMailboxMove
                        • String ID: (
                        • API String ID: 286081148-3887548279
                        • Opcode ID: 7bc4a18db34b21aa22712961edd52866db811d3b9b3767e803d4dd9a4ea7652a
                        • Instruction ID: 82884f42c1591282eb3c29bae2fce9f51a93bbc777789926bc7896c8a45947da
                        • Opcode Fuzzy Hash: 7bc4a18db34b21aa22712961edd52866db811d3b9b3767e803d4dd9a4ea7652a
                        • Instruction Fuzzy Hash: 1881A175E012189FCB18DFA8D990BDEBBB5BF88304F208299E51AA7355DB306A45CF50
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6A99C
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6A9BF
                        • std::bad_exception::bad_exception.LIBCMT ref: 6CF6AA40
                        • __CxxThrowException@8.LIBCMT ref: 6CF6AA4E
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6AA61
                        • std::locale::facet::_Facet_Register.LIBCPMT ref: 6CF6AA7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                        • String ID: bad cast
                        • API String ID: 2427920155-3145022300
                        • Opcode ID: 0639ed60e7ddb341529af80b77f43d2f4c3e97d7b570aab337caa2d0af130dec
                        • Instruction ID: 18c3e0599714498965580151b6a7a423dca179681803f982ef24aa46995f531a
                        • Opcode Fuzzy Hash: 0639ed60e7ddb341529af80b77f43d2f4c3e97d7b570aab337caa2d0af130dec
                        • Instruction Fuzzy Hash: 58317031804215DBDB24EF56DA80BEEB7F4EB05324F15426AD816A7A90DB30AD45CBA1
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6AB7C
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6AB9F
                        • std::bad_exception::bad_exception.LIBCMT ref: 6CF6AC20
                        • __CxxThrowException@8.LIBCMT ref: 6CF6AC2E
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF6AC41
                        • std::locale::facet::_Facet_Register.LIBCPMT ref: 6CF6AC5B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                        • String ID: bad cast
                        • API String ID: 2427920155-3145022300
                        • Opcode ID: ce9d47679183e988cb942c6c73598a81b81f78e4b7a2d6871c3f6ba56bc4a915
                        • Instruction ID: 3ef934b1474a654b1ca7de5fb258f5ee191bc7119bbf92b26d6eaa963cbf12a1
                        • Opcode Fuzzy Hash: ce9d47679183e988cb942c6c73598a81b81f78e4b7a2d6871c3f6ba56bc4a915
                        • Instruction Fuzzy Hash: C831CE31800215DFDB24DF66D980FEEB7F4EB05728F15526AD826A7B80DB30AD45CBA1
                        APIs
                        • LoadCursorW.USER32(00000000,00007F01), ref: 6D0106BD
                        • SetCursor.USER32(00000000), ref: 6D0106C4
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • PtInRect.USER32(?,?,?), ref: 6D0108AB
                        • GetWindowTextLengthW.USER32(00000000), ref: 6D0108C4
                        • SendMessageW.USER32(00000000,000000B1,00000000,00000000), ref: 6D0108F4
                        • SendMessageW.USER32(00000000,000000B1,00000000,00000000), ref: 6D01097C
                        • SendMessageW.USER32(00000000,00000201,?), ref: 6D0109BA
                        • PtInRect.USER32(?,?,?), ref: 6D010A09
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$CursorRect$LengthLoadTextWindow_malloc
                        • String ID:
                        • API String ID: 3472238731-0
                        • Opcode ID: 665766a7d85b20c2d36c4decfe30b68cf3c3c83973ccd24f846c7df846103c45
                        • Instruction ID: a7ba1d1e66ce96474225c9d1313cc23c81300b8cdbd183a07ce29637ae48136c
                        • Opcode Fuzzy Hash: 665766a7d85b20c2d36c4decfe30b68cf3c3c83973ccd24f846c7df846103c45
                        • Instruction Fuzzy Hash: 60F1CA34A08105DFEB04DFA9C894BEEB7B2BF89305F54C169E855AB391CB34A945CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ObjectSelect
                        • String ID:
                        • API String ID: 1517587568-0
                        • Opcode ID: 0ef97b5ff27f91663cd1cbf58f55dd70308402121e25d2a838bf4d9bbfe2661a
                        • Instruction ID: 40fc3c22b807b4bb0f1c8c21114ee96aa024a8aa5580d1970b453270168cca27
                        • Opcode Fuzzy Hash: 0ef97b5ff27f91663cd1cbf58f55dd70308402121e25d2a838bf4d9bbfe2661a
                        • Instruction Fuzzy Hash: B7F14B75E051299FDB14DF25CC90BEEB7B6AF84304F1082D9E449A7680DB31AE95CF90
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF67F08
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A806
                          • Part of subcall function 6CF7A7F1: __CxxThrowException@8.LIBCMT ref: 6CF7A81B
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A82C
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF67F26
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF67F41
                        • _memmove.LIBCMT ref: 6CF67FA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                        • String ID: invalid string position$null$string too long
                        • API String ID: 443534600-1829795388
                        • Opcode ID: a006c55f80490a0e9d7a8464cc4eba3800e47f71cce6d136b71a3f3896e7bf70
                        • Instruction ID: 844ed9155b0d402aa28b38f40549dfc729eaa60bc86758526f50a21d165b4519
                        • Opcode Fuzzy Hash: a006c55f80490a0e9d7a8464cc4eba3800e47f71cce6d136b71a3f3896e7bf70
                        • Instruction Fuzzy Hash: 52217E323042009BD725CE6DE890E2AB7E5AB95714B214A2FF4968BF81D761E845C7A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: disabledimage$focusedimage$hotimage$nativebkcolor$normalimage
                        • API String ID: 0-2366741308
                        • Opcode ID: 8c1192c757eb81ccb724b332944aed94fda73dc970eb320773b7ee155241f32a
                        • Instruction ID: 91862dfe000c6b3279bd74481070448df1ff9238bb9739e4a6d53dd38cd5992b
                        • Opcode Fuzzy Hash: 8c1192c757eb81ccb724b332944aed94fda73dc970eb320773b7ee155241f32a
                        • Instruction Fuzzy Hash: EE315276E48208BBDB44DFA5DC80E9E7BB9AF48314F10C118F9199B644EB30EA04CB51
                        APIs
                        • SelectObject.GDI32(40750C45,000A0DE0), ref: 6CF9E418
                        • GetTextMetricsW.GDI32(?,6D04B28C), ref: 6CF9E430
                        • SelectObject.GDI32(?,?), ref: 6CF9E444
                        • SelectObject.GDI32(40750C45,000090B9), ref: 6CF9E473
                        • GetTextMetricsW.GDI32(40750C45,6CF9ECB5), ref: 6CF9E490
                        • SelectObject.GDI32(40750C45,?), ref: 6CF9E4A4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ObjectSelect$MetricsText
                        • String ID:
                        • API String ID: 3697559710-2974417871
                        • Opcode ID: 0ce89019157fe6a9122ec5f23bd49abfa830fc19059c15b241558dbdeec8ea83
                        • Instruction ID: 3a1169ca01258913cf421b659d977c34537b90141b1f35caf801316316de9b63
                        • Opcode Fuzzy Hash: 0ce89019157fe6a9122ec5f23bd49abfa830fc19059c15b241558dbdeec8ea83
                        • Instruction Fuzzy Hash: AC212975E01104EFDB04DBA8C898FAEB3B5FB88305F14C1A9E91997381D734AA45CF91
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF709AF
                        • GlobalFree.KERNEL32 ref: 6CF709BB
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF709F6
                        • GlobalFree.KERNEL32 ref: 6CF70A03
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF70A3F
                        • GlobalFree.KERNEL32 ref: 6CF70A4C
                        • GetClientRect.USER32(00000000,?), ref: 6CF70A97
                        • InvalidateRect.USER32(00000000,00000001,00000001), ref: 6CF70AA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGloballstrcpyn$Rect$ClientInvalidate
                        • String ID:
                        • API String ID: 4036540652-0
                        • Opcode ID: 7a9d405de76073f2bb3616b5a2a7695ceb2f3e364a0e0b29d39e61cb75ddb2c0
                        • Instruction ID: 2093cb814e89e6ae7dfbe4e8c19674110b39238bcc056cf2ea4b6c25e02e6993
                        • Opcode Fuzzy Hash: 7a9d405de76073f2bb3616b5a2a7695ceb2f3e364a0e0b29d39e61cb75ddb2c0
                        • Instruction Fuzzy Hash: 6041BA72901340DFDB25DF28E980F9BB7F8BF8A714F10891AE85587640DB71E944CBA1
                        APIs
                        • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                        • GetSysColor.USER32(00000000), ref: 00403E2C
                        • SetTextColor.GDI32(?,00000000), ref: 00403E38
                        • SetBkMode.GDI32(?,?), ref: 00403E44
                        • GetSysColor.USER32(?), ref: 00403E57
                        • SetBkColor.GDI32(?,?), ref: 00403E67
                        • DeleteObject.GDI32(?), ref: 00403E81
                        • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                        • String ID:
                        • API String ID: 2320649405-0
                        • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                        • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                        • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                        • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                        APIs
                        • LoadLibraryW.KERNEL32(00000000), ref: 6D00F03F
                        • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 6D00F05E
                        • CoCreateInstance.COMBASE(?,00000000,00000017,6D0361F0,00000000), ref: 6D00F0CD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AddressCreateInstanceLibraryLoadProc
                        • String ID: DllGetClassObject$UIActiveX$showactivex
                        • API String ID: 3919134875-1617538497
                        • Opcode ID: 4136bcf3668e97fa6da682afd4cc046713982366145c82943486a45a3c8bee09
                        • Instruction ID: 5113eb43602de3c510f77e227a7c689af087fe9f99ce196ef0602ec1e7f22c68
                        • Opcode Fuzzy Hash: 4136bcf3668e97fa6da682afd4cc046713982366145c82943486a45a3c8bee09
                        • Instruction Fuzzy Hash: 4D02E874A00609DFDB08CF98C894FAEBBB5FF88315F148269E515AB391C735A942CF94
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 6CF97040
                        • RemoveFontMemResourceEx.GDI32(?,00000000,00000000,00000000,00000000,00000000), ref: 6CF9710A
                        • DeleteDC.GDI32(00000000), ref: 6CF97128
                        • DeleteDC.GDI32(00000000), ref: 6CF97144
                        • DeleteObject.GDI32(00000000), ref: 6CF97160
                        • DeleteObject.GDI32(00000000), ref: 6CF9717C
                        • DeleteObject.GDI32(00000000), ref: 6CF971D7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Delete$Object$FontRemoveResource
                        • String ID:
                        • API String ID: 1657001981-0
                        • Opcode ID: 2831eefa517d983d9b958218a973cf006f2f07df8d4f69cbd778c69f6e90294f
                        • Instruction ID: 5be5e09ac7483ed05185ac18f8a3dd7aafe526629418ed8cb0af06afd7c6ad04
                        • Opcode Fuzzy Hash: 2831eefa517d983d9b958218a973cf006f2f07df8d4f69cbd778c69f6e90294f
                        • Instruction Fuzzy Hash: 71F10C70E05248DBEF08DB98C9A4BEEB7B1EF8430CF244169D1066B781CB756E46CB95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: source$source='%d,%d,%d,%d' dest='%d,%d,%d,%d'
                        • API String ID: 0-1800100143
                        • Opcode ID: a3bc263554a728433494731337da7deefedfb65a0c464da665d7cff6d4052171
                        • Instruction ID: 78dac6f7e83f2828b664c246c28efb8f0a1d9cecd4e4f2138cd54b8b9615084c
                        • Opcode Fuzzy Hash: a3bc263554a728433494731337da7deefedfb65a0c464da665d7cff6d4052171
                        • Instruction Fuzzy Hash: BED125709052599FDB29CB98CD90BEEB3B5FB49304F5042E9D50AAB390DB706E84CF90
                        APIs
                        • OffsetRect.USER32(00000000,?,00000000), ref: 6CFCE303
                        • OffsetRect.USER32(00000000,00000000,?), ref: 6CFCE352
                        • OffsetRect.USER32(00000000,?,?), ref: 6CFCE39F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: OffsetRect
                        • String ID:
                        • API String ID: 177026234-0
                        • Opcode ID: ef7d93e1615edd272f323bad3f8624fa0611d7b3aebdb80b296ca6fc3f9ee7b7
                        • Instruction ID: 25b2fa027c5b5fdad228a56e188b93646ba9068a3dcf3c050b60752cb4f050c4
                        • Opcode Fuzzy Hash: ef7d93e1615edd272f323bad3f8624fa0611d7b3aebdb80b296ca6fc3f9ee7b7
                        • Instruction Fuzzy Hash: B4C1C375E00209DFCB14CFA8C995AEEFBB1BF88304F248269D915AB355DB30A941CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 474e97de5e8f3dfd103972b36db357444f9c138b3c71fa8efbf2bb29466bbe56
                        • Instruction ID: 82879cd9cdf8d6c5f41ce275eaa9d64ea9529ee4f8c0789de527435e02a14664
                        • Opcode Fuzzy Hash: 474e97de5e8f3dfd103972b36db357444f9c138b3c71fa8efbf2bb29466bbe56
                        • Instruction Fuzzy Hash: 7FB17FB5A041698BDB14CF25DC90BEEB7B1AF85304F1081D9E44ABB740DB30AE99CF90
                        APIs
                        • CharNextW.USER32(00000000,-00000001,00000000,00000000,00000000,-00000001), ref: 6CFC09E6
                        • CharNextW.USER32(00000000,-00000001,00000000,00000000,00000000,-00000001), ref: 6CFC09F5
                        • _memmove.LIBCMT ref: 6CFC173C
                        • _memmove.LIBCMT ref: 6CFC1779
                        • _memmove.LIBCMT ref: 6CFC17B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove$CharNext
                        • String ID:
                        • API String ID: 135983253-0
                        • Opcode ID: f8edf6d1e4c99712bce565ddcb68cbc9cff3e0b890f62d38c20ab01e75a6b0ad
                        • Instruction ID: 863edfba1738b4ac4aa45eb1aac24714b4d44b8efdce3e9f901006c874375b82
                        • Opcode Fuzzy Hash: f8edf6d1e4c99712bce565ddcb68cbc9cff3e0b890f62d38c20ab01e75a6b0ad
                        • Instruction Fuzzy Hash: FBB16FB5E041699BDB14CF25DC90BEEB7B1AF85304F1081D9E44ABB640DB34AE99CF90
                        APIs
                        • MulDiv.KERNEL32(00000000,00000064,00000000), ref: 6CFFAE4B
                        • MulDiv.KERNEL32(?,00000064,00000000), ref: 6CFFAE79
                        • MulDiv.KERNEL32(00000000,00000064,00000000), ref: 6CFFAEA4
                        • MulDiv.KERNEL32(?,00000064,00000000), ref: 6CFFAECF
                          • Part of subcall function 6CF8D450: _memset.LIBCMT ref: 6CF8D4A7
                          • Part of subcall function 6CF8D450: _vswprintf_s.LIBCMT ref: 6CF8D4D7
                        Strings
                        • dest='%d,%d,%d,%d', xrefs: 6CFFAF08
                        • dest='%d,%d,%d,%d' source='%d,%d,%d,%d', xrefs: 6CFFAF40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset_vswprintf_s
                        • String ID: dest='%d,%d,%d,%d'$dest='%d,%d,%d,%d' source='%d,%d,%d,%d'
                        • API String ID: 1381849029-1766977312
                        • Opcode ID: 192dd72079752d40741c651ed52d0604b1f4cc3ad7384122b732572dcfaf50a7
                        • Instruction ID: ed215d4fe7c2b09ffdde6c11aad389b889cc2d0358552edafe5663ad68f17176
                        • Opcode Fuzzy Hash: 192dd72079752d40741c651ed52d0604b1f4cc3ad7384122b732572dcfaf50a7
                        • Instruction Fuzzy Hash: 34B1B275A006199FDF08CFA8C994AEEB7B6BF8C304F148169D819BB355DB35A901CF60
                        APIs
                        • PtInRect.USER32(?,?,?), ref: 6D008A42
                        • LoadCursorW.USER32(00000000,00007F89), ref: 6D008A53
                        • SetCursor.USER32(00000000), ref: 6D008A5A
                        • PtInRect.USER32(?,?,?), ref: 6D008AC6
                        • PtInRect.USER32(?,FFFFFFFF,00000000), ref: 6D008B4E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$Cursor$Load
                        • String ID: link
                        • API String ID: 1264107634-917281265
                        • Opcode ID: 6ab8c7b2676cc97e5dcb7a9edce9f99c19bd162e1081c93a7cc4e8583b1e1b21
                        • Instruction ID: 9b74f353083304eda1fa8670a2d7a53c9bc0d2be2260cd7f7cc459db45f61165
                        • Opcode Fuzzy Hash: 6ab8c7b2676cc97e5dcb7a9edce9f99c19bd162e1081c93a7cc4e8583b1e1b21
                        • Instruction Fuzzy Hash: 8571EE74A0410AEFFB04DF88C594BAEB7B2BF45305F648268E515AB791C770AE41CFA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$_free
                        • String ID: click$itemselect$textchanged
                        • API String ID: 209974405-2202503670
                        • Opcode ID: a39bba4b4719e4ec70a9353d9e16c4d822c04cd307857fc339062e541abbdec3
                        • Instruction ID: 38e7cd7e594ec7a0f4ae097c5c459b2fe284a8944f214370b4a461826a56e259
                        • Opcode Fuzzy Hash: a39bba4b4719e4ec70a9353d9e16c4d822c04cd307857fc339062e541abbdec3
                        • Instruction Fuzzy Hash: CE517F75A002089FDB14EB61C884FEAF3B8FF49314F108699D56957B81DB30AA45CBE0
                        APIs
                        • GetClientRect.USER32(00000000,6D00DD05), ref: 6D00E10E
                        • GetGUIThreadInfo.USER32(00000000,00000030), ref: 6D00E192
                        • ClientToScreen.USER32(00000000,?), ref: 6D00E1B6
                        • ScreenToClient.USER32(00000000), ref: 6D00E1E1
                        • PtInRect.USER32(?,?,?), ref: 6D00E1F3
                          • Part of subcall function 6CFBD570: CreatePenIndirect.GDI32(?), ref: 6CFBD5C7
                          • Part of subcall function 6CFBD570: SelectObject.GDI32(?,?), ref: 6CFBD5D8
                          • Part of subcall function 6CFBD570: MoveToEx.GDI32(?,00000000,?,00000000), ref: 6CFBD602
                          • Part of subcall function 6CFBD570: LineTo.GDI32(?,?,?), ref: 6CFBD61A
                          • Part of subcall function 6CFBD570: SelectObject.GDI32(?,?), ref: 6CFBD628
                          • Part of subcall function 6CFBD570: DeleteObject.GDI32(?), ref: 6CFBD632
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ClientObject$RectScreenSelect$CreateDeleteIndirectInfoLineMoveThread
                        • String ID: 0
                        • API String ID: 3254868366-4108050209
                        • Opcode ID: 47dcdd26aa9176dbe0d979b36e5c7c92c4813059be11b18dc49f42c8f6b36ba8
                        • Instruction ID: 289911584b92236edcc58c8c96c8d01cf9b9e88e099f2458550ca013aaed13b7
                        • Opcode Fuzzy Hash: 47dcdd26aa9176dbe0d979b36e5c7c92c4813059be11b18dc49f42c8f6b36ba8
                        • Instruction Fuzzy Hash: 6B5193B5E112089FDB18DF98C994F9DB7B6BF88300F208159E915AB395D730E942CFA0
                        APIs
                        • OleDuplicateData.OLE32(?,0000003F,00000000), ref: 6CFD6CA5
                        • OleDuplicateData.OLE32(?,00000000,00000000), ref: 6CFD6CC6
                        • OleDuplicateData.OLE32(?,00000000,00000000), ref: 6CFD6CE7
                        • OleDuplicateData.OLE32(?,00000000,00000000), ref: 6CFD6D05
                        • OleDuplicateData.OLE32(?,00000000,00000000), ref: 6CFD6D23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DataDuplicate
                        • String ID: ?
                        • API String ID: 3352741105-1684325040
                        • Opcode ID: 6a88c401dfb01664e245a6f4449440666ddbaaac4e9b98fd988777c5f95af444
                        • Instruction ID: 03cce967916e5c197242931ac08f77f207e68f6b8e214f774e2a9d9db23a853b
                        • Opcode Fuzzy Hash: 6a88c401dfb01664e245a6f4449440666ddbaaac4e9b98fd988777c5f95af444
                        • Instruction Fuzzy Hash: A3518078600209EFCB04CF54D594A6ABBB6FF8A310F25C599FC598B355D731E982CB90
                        APIs
                          • Part of subcall function 6CF8C980: _free.LIBCMT ref: 6CF8C99A
                        • lstrcpynW.KERNEL32(?,?,00000080,?), ref: 6CF71E9F
                        • GlobalFree.KERNEL32 ref: 6CF71EAC
                        • wsprintfW.USER32 ref: 6CF71EFC
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF71F1A
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF71F31
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Globallstrcpyn$AllocFree_freewsprintf
                        • String ID: logo.ico
                        • API String ID: 1028138156-87942624
                        • Opcode ID: 4d5d9a81430c432f8030d864616a63194024cfa0e8e58b2800374860ec386f2f
                        • Instruction ID: c081a5184512f84731e58d05f173bfd2b4989d240ef36706cc9cd82ac899d034
                        • Opcode Fuzzy Hash: 4d5d9a81430c432f8030d864616a63194024cfa0e8e58b2800374860ec386f2f
                        • Instruction Fuzzy Hash: CE415A75601208DFDB14EF64C990FEEB7B9FB99304F104599E90997790EB70A988CBA0
                        APIs
                        • LoadCursorW.USER32(00000000,?), ref: 6CFC7DBC
                        • SetCursor.USER32(00000000,?,6CFCB863,?), ref: 6CFC7DC3
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6CFC7DD2
                        • SetCursor.USER32(00000000,?,6CFCB863,?), ref: 6CFC7DD9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Cursor$Load
                        • String ID: menu$timer
                        • API String ID: 1675784387-2593718399
                        • Opcode ID: 151bb494f3861f2785e3dcbaa6ee67c4f811020e5d0e79e1f01cc2f105a9cdb2
                        • Instruction ID: d17bc278eca2857387686ac47b05f917da2fd51d253043351fa0e0a0afa5c1a7
                        • Opcode Fuzzy Hash: 151bb494f3861f2785e3dcbaa6ee67c4f811020e5d0e79e1f01cc2f105a9cdb2
                        • Instruction Fuzzy Hash: 8A410835704105EFDB08CF98C990FAEB7B6BF8A304F644199E9099B791C731AE41DB91
                        APIs
                        • GetFileAttributesW.KERNEL32(00000000), ref: 6CFDEA1D
                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 6CFDEA2E
                        • _memmove.LIBCMT ref: 6CFDEABC
                        • _wcscpy.LIBCMT ref: 6CFDEB12
                        • _wcscat.LIBCMT ref: 6CFDEB25
                        • GetFileAttributesW.KERNEL32(?), ref: 6CFDEB34
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 6CFDEB48
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AttributesCreateDirectoryFile$_memmove_wcscat_wcscpy
                        • String ID:
                        • API String ID: 2338554099-0
                        • Opcode ID: 1c19844620437a9fd7c786082129c7871277636a168854b53bb07bdabf4d4baf
                        • Instruction ID: dd938782a7d3482c1d343b2f45d982fac08173eb80e3d57483f517a17f58fefa
                        • Opcode Fuzzy Hash: 1c19844620437a9fd7c786082129c7871277636a168854b53bb07bdabf4d4baf
                        • Instruction Fuzzy Hash: 6D416DB1D0011CEBCB18CF64D884AEDB7B5BF99314F5486D9E9199B680DB30AB84CF90
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF76DB2
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A806
                          • Part of subcall function 6CF7A7F1: __CxxThrowException@8.LIBCMT ref: 6CF7A81B
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A82C
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF76DC8
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF76DE3
                        • _memmove.LIBCMT ref: 6CF76E47
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                        • String ID: invalid string position$string too long
                        • API String ID: 443534600-4289949731
                        • Opcode ID: 0bf71d3d6722a080aa535bd6c0e10ec8180165a6661a0eb8dc5cc259704d4cc7
                        • Instruction ID: d5b91e56e577a394a233f9beeca7bf11b84f54b34e78c3ef00cb89934f88c261
                        • Opcode Fuzzy Hash: 0bf71d3d6722a080aa535bd6c0e10ec8180165a6661a0eb8dc5cc259704d4cc7
                        • Instruction Fuzzy Hash: FD21F4323001015BD7259F6DF8D0BAABBA6BF91269B64061BF515CBF81C721E894C3B5
                        APIs
                        • GetClipBox.GDI32(6CFC9EE5,00000000), ref: 6CFB8F1A
                        • CreateRectRgnIndirect.GDI32(00000000), ref: 6CFB8F24
                        • CreateRectRgnIndirect.GDI32(?), ref: 6CFB8F34
                        • CreateRoundRectRgn.GDI32(?,?,?,?,?,?), ref: 6CFB8F5E
                        • CombineRgn.GDI32(?,?,?,00000001), ref: 6CFB8F7B
                        • ExtSelectClipRgn.GDI32(6CFC9EE5,?,00000001), ref: 6CFB8F8E
                        • DeleteObject.GDI32(?), ref: 6CFB8FBB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CreateRect$ClipIndirect$CombineDeleteObjectRoundSelect
                        • String ID:
                        • API String ID: 2381484079-0
                        • Opcode ID: a9ba6cf34c85f65dc44863694384809c2f104038ef8777261299c7fde3605c81
                        • Instruction ID: 25eda804341aae549eb505695fe5fa55350d19b8d8be77426bc418aefb19447a
                        • Opcode Fuzzy Hash: a9ba6cf34c85f65dc44863694384809c2f104038ef8777261299c7fde3605c81
                        • Instruction Fuzzy Hash: 253182B5A01208EFCB44DF98C994EAE7BF5BF8C304B209159FA0997341D734E945CBA0
                        APIs
                        • lstrlenW.KERNEL32(00445D80,00428BB1,74DF23A0,00000000), ref: 00404FD6
                        • lstrlenW.KERNEL32(004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FE6
                        • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FF9
                        • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                        • String ID:
                        • API String ID: 2740478559-0
                        • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                        • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                        • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                        • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98
                        APIs
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00428BB1,74DF23A0,00000000), ref: 00404FD6
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FE6
                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FF9
                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                          • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                          • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                        • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                        Strings
                        • Exec: success ("%s"), xrefs: 00402263
                        • Exec: failed createprocess ("%s"), xrefs: 004022C2
                        • Exec: command="%s", xrefs: 00402241
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                        • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                        • API String ID: 2014279497-3433828417
                        • Opcode ID: b07d39edd45b6d2841688a986433f0381924528bdc22dd5a03576e07f79a18b6
                        • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                        • Opcode Fuzzy Hash: b07d39edd45b6d2841688a986433f0381924528bdc22dd5a03576e07f79a18b6
                        • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                        APIs
                        • _free.LIBCMT ref: 6CF784C0
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        • std::exception::exception.LIBCMT ref: 6CF784E0
                        • __CxxThrowException@8.LIBCMT ref: 6CF784F5
                        • _malloc.LIBCMT ref: 6CF78511
                        • _memmove.LIBCMT ref: 6CF7852B
                        Strings
                        • Comments must start with /, xrefs: 6CF784D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorException@8FreeHeapLastThrow_free_malloc_memmovestd::exception::exception
                        • String ID: Comments must start with /
                        • API String ID: 3800161811-656592030
                        • Opcode ID: 9312605a7a7d15e5fb2eb3d27fef34dbd61caa43aa7a48ab2c3e5ebd9473b673
                        • Instruction ID: ade33099ec66f4dbe1a8675c2203682850ef96aa2ecf868f121694ae7eb6c48b
                        • Opcode Fuzzy Hash: 9312605a7a7d15e5fb2eb3d27fef34dbd61caa43aa7a48ab2c3e5ebd9473b673
                        • Instruction Fuzzy Hash: 5D110471800215ABDB21DF69E844FDB7BB89F42258B148267E845AF600E770E619CBF1
                        APIs
                          • Part of subcall function 6CFA21E0: LoadLibraryW.KERNEL32(Shcore.dll,?,6CF7011B,00000002), ref: 6CFA21FE
                          • Part of subcall function 6CFA21E0: GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 6CFA2216
                        • LoadLibraryA.KERNEL32(user32.dll,?,00000002), ref: 6CF7012C
                        • GetProcAddress.KERNEL32(00000000,SetProcessDPIAware), ref: 6CF7013E
                        • FreeLibrary.KERNEL32(00000000,?,00000002), ref: 6CF7014B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Library$AddressLoadProc$Free
                        • String ID: SetProcessDPIAware$user32.dll
                        • API String ID: 1413238409-1137607222
                        • Opcode ID: 3b687c12ba8d36797486a877c003045770cc7cc7fb6099d77d634c86485e4399
                        • Instruction ID: 10d3c7ed29e351ad28c3c1d6a68b98971b5524b5496d9b621ef8561eff1092fd
                        • Opcode Fuzzy Hash: 3b687c12ba8d36797486a877c003045770cc7cc7fb6099d77d634c86485e4399
                        • Instruction Fuzzy Hash: F4F0A932B0611457DA10576DBC09BFEB3ADCFC5126F1502A7FC0DD2740DF91891685E1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: IList$IListOwner$List
                        • API String ID: 3832890014-3096783137
                        • Opcode ID: df73d55f3cbb0cf7fcf2475e929d996f4487f76b50a2702434f8d59c83b129dd
                        • Instruction ID: a3b24723f1f613da0697349e4d3a7c1a804325292fa5f09a65edaa4b881af027
                        • Opcode Fuzzy Hash: df73d55f3cbb0cf7fcf2475e929d996f4487f76b50a2702434f8d59c83b129dd
                        • Instruction Fuzzy Hash: 47112AB4D0810DFBFB04CF96D954BEEB7B4AB46309F1084A9D8046B680E735AB54CB90
                        APIs
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                        • GetMessagePos.USER32 ref: 0040489D
                        • ScreenToClient.USER32(?,?), ref: 004048B5
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Message$Send$ClientScreen
                        • String ID: f
                        • API String ID: 41195575-1993550816
                        • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                        • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                        • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                        • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$__fassign
                        • String ID: sepheight$sepimm$true
                        • API String ID: 2467191783-591816474
                        • Opcode ID: ffae46b786f3ae6388a8f9b1c12cd373aa147b8ae10878582d237162411bbc33
                        • Instruction ID: 4151ec7f67773768280c21ec375704c9b99fd5b03db40632ba5fdbd2c5fcd892
                        • Opcode Fuzzy Hash: ffae46b786f3ae6388a8f9b1c12cd373aa147b8ae10878582d237162411bbc33
                        • Instruction Fuzzy Hash: CC01FDB2A04108B7DB04DBA4EC49DEF77B8AF49204F008119B81887750EB32EE04D7A6
                        APIs
                        • lstrcmpiW.KERNEL32(?,showtime), ref: 6D012780
                        • lstrcmpiW.KERNEL32(?,true), ref: 6D012793
                        • lstrcmpiW.KERNEL32(?,readonly), ref: 6D0127B5
                        • lstrcmpiW.KERNEL32(?,true), ref: 6D0127C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrcmpi
                        • String ID: readonly$showtime$true
                        • API String ID: 1586166983-2494685488
                        • Opcode ID: 0813e8e7d76695150cb54d4ced02f7e6849fc129e70299e7271211e102fa8390
                        • Instruction ID: 0184f57d00f5789085fe7b4d0de2073502e150925db6bc1b171daf64f7bddec5
                        • Opcode Fuzzy Hash: 0813e8e7d76695150cb54d4ced02f7e6849fc129e70299e7271211e102fa8390
                        • Instruction Fuzzy Hash: 67018F75A19108BBAB14DFB5DE85FAF77B9BF86340B208158F909C7250DB34DA04D7A0
                        APIs
                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                        • MulDiv.KERNEL32(02D51ED6,00000064,02D51EDA), ref: 00403295
                        • wsprintfW.USER32 ref: 004032A5
                        • SetWindowTextW.USER32(?,?), ref: 004032B5
                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                        Strings
                        • verifying installer: %d%%, xrefs: 0040329F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Text$ItemTimerWindowwsprintf
                        • String ID: verifying installer: %d%%
                        • API String ID: 1451636040-82062127
                        • Opcode ID: 6e71b36604eb8168b9de070626c23bed7d900371b4c5136878c27d07ffa20f21
                        • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                        • Opcode Fuzzy Hash: 6e71b36604eb8168b9de070626c23bed7d900371b4c5136878c27d07ffa20f21
                        • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                        APIs
                        • __getptd.LIBCMT ref: 6CF7F018
                          • Part of subcall function 6CF8132F: __getptd_noexit.LIBCMT ref: 6CF81332
                          • Part of subcall function 6CF8132F: __amsg_exit.LIBCMT ref: 6CF8133F
                        • __getptd.LIBCMT ref: 6CF7F029
                        • __getptd.LIBCMT ref: 6CF7F037
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: MOC$RCC$csm
                        • API String ID: 803148776-2671469338
                        • Opcode ID: ecc59315e9d46fd33402cfd58b4de6f82dcd8e458b7157c143ed673569efd570
                        • Instruction ID: 3459ba579ab1687c7d6dae4e4df265b18517bad35c23853465919ba0112899cf
                        • Opcode Fuzzy Hash: ecc59315e9d46fd33402cfd58b4de6f82dcd8e458b7157c143ed673569efd570
                        • Instruction Fuzzy Hash: 91E09A306012088EC320AB78D049BA837E9BB4930DF6996E6D51CCBB22C728E4849963
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6D025CB2
                        • __CxxThrowException@8.LIBCMT ref: 6D025CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID:
                        • API String ID: 4063778783-0
                        • Opcode ID: aa9a8f3a43c5978e449e0e4e3c43db1b1d4cb283d06bd1c9918d01fd953f620d
                        • Instruction ID: 552e660ab6078d0d44158a1a147d76db4ad614b7c785b82576feab28fee06f66
                        • Opcode Fuzzy Hash: aa9a8f3a43c5978e449e0e4e3c43db1b1d4cb283d06bd1c9918d01fd953f620d
                        • Instruction Fuzzy Hash: 3341D3B1D02209DFDB54EFE9D944FEEBBB4AB15300F44456AD81887742E730A658CBA2
                        APIs
                        • _memset.LIBCMT ref: 6CFAE6F9
                          • Part of subcall function 6CFADC70: _memset.LIBCMT ref: 6CFADC92
                          • Part of subcall function 6CFADC70: _memset.LIBCMT ref: 6CFADCA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: bad codelengths
                        • API String ID: 2102423945-697342978
                        • Opcode ID: aa2f24aa11aa97b6f7d4a88d76cc73a289a1dcce7600cdbab700a2d5a7b7a7ab
                        • Instruction ID: fca58248ba4bc752aa51067257e014ce17a3398a27b39a97c22c5bbdd7c38b35
                        • Opcode Fuzzy Hash: aa2f24aa11aa97b6f7d4a88d76cc73a289a1dcce7600cdbab700a2d5a7b7a7ab
                        • Instruction Fuzzy Hash: EBF1FA75A01259DFDB54CF58C880ADDBBB1BB88354F1482A9E80D9B746D731EE92CF80
                        APIs
                        • PtInRect.USER32(?,?,?), ref: 6D006A8E
                        • PtInRect.USER32(?,?,?), ref: 6D006CE3
                        • LoadCursorW.USER32(00000000,00007F84), ref: 6D006CF4
                        • SetCursor.USER32(00000000), ref: 6D006CFB
                          • Part of subcall function 6CFC7AD0: IntersectRect.USER32(?,?,?), ref: 6CFC7B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect$Cursor$IntersectLoad
                        • String ID: headerclick
                        • API String ID: 2196809944-1247266998
                        • Opcode ID: 3360027cf324e2a695450769901eebd67b8353525a078d57aa2ee9954e8cc060
                        • Instruction ID: ff7b6f8a4168e6a96f41dd1717b97c8e214d39bccf809a6107acf00f4f0c1575
                        • Opcode Fuzzy Hash: 3360027cf324e2a695450769901eebd67b8353525a078d57aa2ee9954e8cc060
                        • Instruction Fuzzy Hash: 13E1D874A05209EFEB08DF98D590AADBBB2FF89314F548169E405AF755CB31AD81CF80
                        APIs
                        • __getptd.LIBCMT ref: 6CF80991
                          • Part of subcall function 6CF8132F: __getptd_noexit.LIBCMT ref: 6CF81332
                          • Part of subcall function 6CF8132F: __amsg_exit.LIBCMT ref: 6CF8133F
                        • __amsg_exit.LIBCMT ref: 6CF809B1
                        • __lock.LIBCMT ref: 6CF809C1
                        • InterlockedDecrement.KERNEL32(?), ref: 6CF809DE
                        • _free.LIBCMT ref: 6CF809F1
                        • InterlockedIncrement.KERNEL32(02CF1658), ref: 6CF80A09
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                        • String ID:
                        • API String ID: 3470314060-0
                        • Opcode ID: ddf428729fa9a0e9998d54c79238122497e9bb373a0294ee91315dcc404fc215
                        • Instruction ID: 54d4468ac3da7b32e55ee6f1ccaa483830efda27e8e12955a8c77c5cc2852cf0
                        • Opcode Fuzzy Hash: ddf428729fa9a0e9998d54c79238122497e9bb373a0294ee91315dcc404fc215
                        • Instruction Fuzzy Hash: A7019632D43A65DBEF21AF158444B9DB770BF41728F614115E850A7F80CB74A985CBD1
                        APIs
                        • CreateSolidBrush.GDI32(000000FF), ref: 6CF6E565
                        • SelectObject.GDI32(00000000,00000000), ref: 6CF6E577
                        • Rectangle.GDI32(00000000,?,?,?,?), ref: 6CF6E58D
                        • SetTextColor.GDI32(00000000,00FFFFFF), ref: 6CF6E599
                        • SetBkMode.GDI32(00000000,00000001), ref: 6CF6E5A2
                        • TextOutW.GDI32(00000000,-00000003,?,00000000,00000000), ref: 6CF6E5C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Text$BrushColorCreateModeObjectRectangleSelectSolid
                        • String ID:
                        • API String ID: 3754304910-0
                        • Opcode ID: 0d6c0df7b546a29bf73f72bf6d8f32ba198da1eb024be54875d0f996fc6ca7a5
                        • Instruction ID: c4a025c4d80f42a4be356833029084718c42ab53ec8ebed67b4cc2aa388f7392
                        • Opcode Fuzzy Hash: 0d6c0df7b546a29bf73f72bf6d8f32ba198da1eb024be54875d0f996fc6ca7a5
                        • Instruction Fuzzy Hash: 1901FF74541204EFDB14DB24CDC9F7F77B9EF8AB00B10855DFA4AD2684D77498498B21
                        APIs
                          • Part of subcall function 6CFA4680: _malloc.LIBCMT ref: 6CFA4687
                        • _memset.LIBCMT ref: 6CFB4F2A
                        • _free.LIBCMT ref: 6CFB4F56
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free_malloc_memset
                        • String ID: \$bad file$too large
                        • API String ID: 639621159-1129545092
                        • Opcode ID: 808f6470ea9ab12c2b7623a5e65935fb94a18a971e118f8f3d54347d079ec623
                        • Instruction ID: b72038b22048faed44c17bc9f6cee54844350c36493532903935908d5a77975c
                        • Opcode Fuzzy Hash: 808f6470ea9ab12c2b7623a5e65935fb94a18a971e118f8f3d54347d079ec623
                        • Instruction Fuzzy Hash: F46142B5A00209EFDB04DF98D980BEE7BB5BF49308F148168E8099B741D735EA85CB91
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66BA4
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66BBF
                        • _memmove.LIBCMT ref: 6CF66C15
                          • Part of subcall function 6CF67EF0: std::_Xinvalid_argument.LIBCPMT ref: 6CF67F08
                          • Part of subcall function 6CF67EF0: std::_Xinvalid_argument.LIBCPMT ref: 6CF67F26
                          • Part of subcall function 6CF67EF0: std::_Xinvalid_argument.LIBCPMT ref: 6CF67F41
                          • Part of subcall function 6CF67EF0: _memmove.LIBCMT ref: 6CF67FA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$_memmove
                        • String ID: null$string too long
                        • API String ID: 2168136238-3995189588
                        • Opcode ID: eaadd801780c5e5e7361eeba3eebd2d6d2eb38811d25851632bdfffd2db4a5f8
                        • Instruction ID: aefb62e0f22f6bb77a3b3539043b975719a6cc7987813153abb2540f87cdfe23
                        • Opcode Fuzzy Hash: eaadd801780c5e5e7361eeba3eebd2d6d2eb38811d25851632bdfffd2db4a5f8
                        • Instruction Fuzzy Hash: F831E4723016109BE720CE6EE890A9FF3E9EF91368720462FF156CBE41C772984083A1
                        APIs
                        • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                        • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                        • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                        • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Char$Next$Prev
                        • String ID: *?|<>/":
                        • API String ID: 589700163-165019052
                        • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                        • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                        • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                        • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bb5a228d3e41a3945fc06308282805203889a7ffb8b427ecc5820832f5948f35
                        • Instruction ID: ff9fcf115100764549f25132d41cd599f966643f4afb0e7d8feb2fd6e5927257
                        • Opcode Fuzzy Hash: bb5a228d3e41a3945fc06308282805203889a7ffb8b427ecc5820832f5948f35
                        • Instruction Fuzzy Hash: 5BF10D74A04259DFDB04CF99C890A9EB7B6FF89304F248169E8059FBA5C772AD45CF80
                        APIs
                        • SaveDC.GDI32(?), ref: 6CFF0A47
                        • SetStretchBltMode.GDI32(?,00000004), ref: 6CFF0A56
                        • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000001,00000168,000000C8,00CC0020), ref: 6CFF0AAE
                        • StretchBlt.GDI32(?,?,?,?,?,?,00000000,000000D2,000000C8,?,00CC0020), ref: 6CFF0B17
                        • RestoreDC.GDI32(?,?), ref: 6CFF0C76
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Stretch$ModeRestoreSave
                        • String ID:
                        • API String ID: 1863604132-0
                        • Opcode ID: 5d81c407f646ab8e41ad4791f0bb38f67f9747ac1e4edb0810d6938ce9c8de5a
                        • Instruction ID: a7d3ab13ae875669f09440a462c154f6ae3c0df055850f47b65b4a098259226b
                        • Opcode Fuzzy Hash: 5d81c407f646ab8e41ad4791f0bb38f67f9747ac1e4edb0810d6938ce9c8de5a
                        • Instruction Fuzzy Hash: 0081DDB5A00505DFDB08CF98C894FEFB7B5BB88301F148269E915AB385DA35A806CF64
                        APIs
                          • Part of subcall function 6CF62410: OutputDebugStringW.KERNELBASE(00000000), ref: 6CF624B7
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF7081A
                        • lstrcpynW.KERNEL32(00000004,?,00002004), ref: 6CF70830
                        • GlobalAlloc.KERNEL32(00000040,0000200C), ref: 6CF7084A
                        • lstrcpynW.KERNEL32(00000004,ui_properties,00002004), ref: 6CF7085E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AllocGloballstrcpyn$DebugOutputString
                        • String ID: ui_properties
                        • API String ID: 3644820488-2455482335
                        • Opcode ID: 005b58aa8aaf45d3b0eca4f9a301b012371451f442bf3aa279f420987586c61f
                        • Instruction ID: 24fccf1222c40ef902673153a9f5881077290b0e2bd0c6805227ddb43ab4ddd6
                        • Opcode Fuzzy Hash: 005b58aa8aaf45d3b0eca4f9a301b012371451f442bf3aa279f420987586c61f
                        • Instruction Fuzzy Hash: B95136B1508380DFD320DF68C880B5BBBF9BBC9714F104A2EE59987751D774A848CBA2
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Window
                        • String ID:
                        • API String ID: 2353593579-0
                        • Opcode ID: fe0822d134302824ff3233bf7cf4024f226aff926cef9f095174179fc377a4f3
                        • Instruction ID: 50e2bf463bfd6ad857ab08bd2c4a8d1c7a0e5c21ab64515dee8afb6869e93736
                        • Opcode Fuzzy Hash: fe0822d134302824ff3233bf7cf4024f226aff926cef9f095174179fc377a4f3
                        • Instruction Fuzzy Hash: CB610C74A003189FDB98DF18C890B99B7B6FF88314F1086D9E5199B791CB31AE85CF91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset$Smanip
                        • String ID:
                        • API String ID: 343480837-0
                        • Opcode ID: eb3f940afbf20ce479a9f405a5a18e45f679d55363f6ffacc7b80b93fbbcad05
                        • Instruction ID: d40245a0b4415ff80c3ddeeccd29e8b798b6caaa5c5f504cc3a47a11a17dd868
                        • Opcode Fuzzy Hash: eb3f940afbf20ce479a9f405a5a18e45f679d55363f6ffacc7b80b93fbbcad05
                        • Instruction Fuzzy Hash: C0711CB4E0124ADFEB04DF98C494BAFB771AF45308F1482A9D9652B7C2C77A6406CF91
                        APIs
                        • _wcslen.LIBCMT ref: 6CFCEE48
                        • CharNextW.USER32(6CFA1E42,?,?,?,?,6CFCEDC8,?,?,6CFA1E42,?,?,?,00000000), ref: 6CFCEE8B
                        • _wcslen.LIBCMT ref: 6CFCEEB7
                        • CharNextW.USER32(6CFA1E42,?,?,?,6CFCEDC8,?,?,6CFA1E42,?,?,?,00000000), ref: 6CFCEEEE
                        • _wcslen.LIBCMT ref: 6CFCEF4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _wcslen$CharNext
                        • String ID:
                        • API String ID: 110608216-0
                        • Opcode ID: 7c2d5bce05c20c2be5e3b09a1b4d0912324735b641d45aaf0460e6d5fcb0675c
                        • Instruction ID: a53a45d73dfdfa5529bc8321a645bbf192f38729412efcc15c098cd78648660d
                        • Opcode Fuzzy Hash: 7c2d5bce05c20c2be5e3b09a1b4d0912324735b641d45aaf0460e6d5fcb0675c
                        • Instruction Fuzzy Hash: 9151D9B5B0010ADFCB04CF98C2858AEB7B2FF89304F258199D845AB755DB31AE41DBA1
                        APIs
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                        • RegCloseKey.ADVAPI32(?), ref: 00401504
                        • RegCloseKey.ADVAPI32(?), ref: 00401529
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Close$DeleteEnumOpen
                        • String ID:
                        • API String ID: 1912718029-0
                        • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                        • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                        • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                        • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                        APIs
                        • _memset.LIBCMT ref: 6CFA26AC
                        • VerSetConditionMask.NTDLL(00000000,00000000,00000002,00000003), ref: 6CFA26D5
                        • VerSetConditionMask.NTDLL(00000000), ref: 6CFA26DD
                        • VerSetConditionMask.NTDLL(00000000), ref: 6CFA26E5
                        • VerifyVersionInfoW.KERNEL32(0000011C,00000023,?,6CFA21F5), ref: 6CFA271E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ConditionMask$InfoVerifyVersion_memset
                        • String ID:
                        • API String ID: 3299124433-0
                        • Opcode ID: 21e82d46449f7164485e61f90a04f63a4990b69f39b7de8d17fadebe8f1fcf16
                        • Instruction ID: 0581b0dc706ecb9b86d67283669c9b48bc4be333abc6e05391591f5d250ff1d8
                        • Opcode Fuzzy Hash: 21e82d46449f7164485e61f90a04f63a4990b69f39b7de8d17fadebe8f1fcf16
                        • Instruction Fuzzy Hash: FA21EAB1E51218AADB64DFA5CC16BEEB7B4AF48700F508499E609AA280E7744A44CF94
                        APIs
                        • GlobalAlloc.KERNEL32(00000000,6CFBA9C3,?,?,?,?,6CFBA9C3,00000000,00000000), ref: 6CFBAA4C
                        • GlobalLock.KERNEL32(00000000), ref: 6CFBAA59
                        • _memmove.LIBCMT ref: 6CFBAA6E
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 6CFBAA87
                        • GlobalUnlock.KERNEL32(00000000), ref: 6CFBAACF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$AllocCreateLockStreamUnlock_memmove
                        • String ID:
                        • API String ID: 1569918835-0
                        • Opcode ID: e89fa3bcd17fc6296a15dcdb2675852ad2402b06d66c575adffbf4defe8fa000
                        • Instruction ID: fdb910281cf984b90f905fd7aefbc4de8549c656f67bc901fa777c1ba8cbd04f
                        • Opcode Fuzzy Hash: e89fa3bcd17fc6296a15dcdb2675852ad2402b06d66c575adffbf4defe8fa000
                        • Instruction Fuzzy Hash: CD11EA75E00209EFCB04DFA4C844BAEB7B8FF48304F108559E919A7340D7359A45CF51
                        APIs
                        • MoveToEx.GDI32(00000000,?,?,6D049BF8), ref: 6CF6E605
                        • LineTo.GDI32(00000000,?,?), ref: 6CF6E617
                        • LineTo.GDI32(00000000,?,?), ref: 6CF6E61F
                        • LineTo.GDI32(00000000,?,?), ref: 6CF6E627
                        • LineTo.GDI32(00000000,?,?), ref: 6CF6E62F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Line$Move
                        • String ID:
                        • API String ID: 3367123170-0
                        • Opcode ID: a5b36daa4c49e24ff4c6e1dc0f0651dbbecabc77b1d8c7189f81364340a35a1d
                        • Instruction ID: 6ed7a62ed57c81dcc006f0a4efbe7a78f4cec0d2080012c43443f5cc621d37f7
                        • Opcode Fuzzy Hash: a5b36daa4c49e24ff4c6e1dc0f0651dbbecabc77b1d8c7189f81364340a35a1d
                        • Instruction Fuzzy Hash: AF01D376901118AF8B05DF8ACCC4CBFFBBCFF89220B558159EA08A7211D630AD018BF5
                        APIs
                        • GetDlgItem.USER32(?), ref: 004020A3
                        • GetClientRect.USER32(00000000,?), ref: 004020B0
                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                        • DeleteObject.GDI32(00000000), ref: 004020EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                        • String ID:
                        • API String ID: 1849352358-0
                        • Opcode ID: fbfd7a6a6085d398f7947defe9e72fce66e027f12e5118b4d0e8a3d4981e6075
                        • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                        • Opcode Fuzzy Hash: fbfd7a6a6085d398f7947defe9e72fce66e027f12e5118b4d0e8a3d4981e6075
                        • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                        APIs
                          • Part of subcall function 6CF61850: std::_Lockit::_Lockit.LIBCPMT ref: 6CF61861
                          • Part of subcall function 6CF77F70: std::_Lockit::_Lockit.LIBCPMT ref: 6CF77F9C
                          • Part of subcall function 6CF77F70: std::_Lockit::_Lockit.LIBCPMT ref: 6CF77FBF
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6CF76FB8
                        • _localeconv.LIBCMT ref: 6CF7702E
                        • _strcspn.LIBCMT ref: 6CF7714A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: LockitLockit::_std::_$_localeconv_strcspn
                        • String ID: e
                        • API String ID: 331173946-4024072794
                        • Opcode ID: 18f40f194ea8bfbe5b6132b42b20870b99c6281bafb72dadfbe3e14560f39c63
                        • Instruction ID: 7da293fb3d1ef8f910b4e2935119d3d473e6cb2e53d209da8022010dadd84762
                        • Opcode Fuzzy Hash: 18f40f194ea8bfbe5b6132b42b20870b99c6281bafb72dadfbe3e14560f39c63
                        • Instruction Fuzzy Hash: 94124B75E102488FDB15CFA8D980ADEBBB5EF4C304F15826AE819AB751D730AD05CFA0
                        APIs
                          • Part of subcall function 6CF8C420: _malloc.LIBCMT ref: 6CF8C450
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                          • Part of subcall function 6CFF4750: _memset.LIBCMT ref: 6CFF47C1
                        • __wcsicoll.LIBCMT ref: 6CFE4D2F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _malloc$__wcsicoll_memset
                        • String ID: TreeNodeUI$align$left
                        • API String ID: 2308959471-55002490
                        • Opcode ID: f1b4e85378db6183a1bb90849131a59bc62cebade467a93d2ed8e81af2d11291
                        • Instruction ID: aa19dc661b7afc79296b6cd521d3d591702fd7e6f50da2d7d25e276e5fc0f8f1
                        • Opcode Fuzzy Hash: f1b4e85378db6183a1bb90849131a59bc62cebade467a93d2ed8e81af2d11291
                        • Instruction Fuzzy Hash: D5F1B874E01109DFDB08CF94D594BAEF7B2FF88304F148269E919AB7A1CB366945CB90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CountStateTick
                        • String ID: RichEditUI$WkeWebkitUI
                        • API String ID: 2629120050-4103725270
                        • Opcode ID: 24d551acdd83a9fb6863e4f6d5e79b091d7270d4ea41ad54ec2e2225050e88ef
                        • Instruction ID: 61814161108cc4796234617423ca48fbbee267d340e208358a4347021a1f416d
                        • Opcode Fuzzy Hash: 24d551acdd83a9fb6863e4f6d5e79b091d7270d4ea41ad54ec2e2225050e88ef
                        • Instruction Fuzzy Hash: B8A12D74A01205DFDF08CF95D490AEEB7B1FF89304F14826AE859AB761DB71A981CF90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID: bad codelengths$bad sizes
                        • API String ID: 2102423945-2666559174
                        • Opcode ID: e51ed98144e9a11ebf1466190d1976638b3b705680335c2bfcdbb3a8b638a81e
                        • Instruction ID: ac93d84b5f2c96d5e43ff3694653c33b1526552cbacb852bc2140151ad44b4b3
                        • Opcode Fuzzy Hash: e51ed98144e9a11ebf1466190d1976638b3b705680335c2bfcdbb3a8b638a81e
                        • Instruction Fuzzy Hash: 3DA12774A00258CFDB14CF88C990BDDB7B2FF89304F1481A8D95AAB749D774AA99CF41
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: swprintf
                        • String ID: $$%$+
                        • API String ID: 233258989-3202472541
                        • Opcode ID: b73b6cfec274752b59046f24017120ea6a816d69a34458135a7be2241708a4e8
                        • Instruction ID: c0ec827b42b05813bdc472bd2a7f04e51d5db1105dfd4cb815478c3e84722571
                        • Opcode Fuzzy Hash: b73b6cfec274752b59046f24017120ea6a816d69a34458135a7be2241708a4e8
                        • Instruction Fuzzy Hash: A6519C73A493005AEB299F18E5807CB7BF5AB46740F149A5FF880D3791E725C84887E2
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 6D018ADD
                          • Part of subcall function 6D01BED0: __87except.LIBCMT ref: 6D01BF0B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorHandling__87except__start
                        • String ID: pow
                        • API String ID: 2905807303-2276729525
                        • Opcode ID: 032e842fed3110766de197a618141366459662f96ed815e04c814167120951d0
                        • Instruction ID: 35568ea7b0755981e55806898dc5ecfdac6aab39997c8da14d4d26c7f2df7c8a
                        • Opcode Fuzzy Hash: 032e842fed3110766de197a618141366459662f96ed815e04c814167120951d0
                        • Instruction Fuzzy Hash: 6E515B7191C207A7F702ABD8CD513AE7BF4AB02710F508D68F4D5822D8EF35C5D88A96
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: swprintf
                        • String ID: $$%$+
                        • API String ID: 233258989-3202472541
                        • Opcode ID: c75a1d25a8ce30dd2a5ca606239695c808ee7bbe626089161810fe33e9ec7b2c
                        • Instruction ID: 4ad87759305eaf292d4c6f46d666be03784a6c53afb357cb196a6ec16f811d7c
                        • Opcode Fuzzy Hash: c75a1d25a8ce30dd2a5ca606239695c808ee7bbe626089161810fe33e9ec7b2c
                        • Instruction Fuzzy Hash: 1D514873A093409AD7258F58E980BCB7BF5EB46305F149A5BF880D3791E735884587E2
                        APIs
                        • MonitorFromWindow.USER32(?,00000001), ref: 6CF944A7
                        • GetMonitorInfoW.USER32(00000000), ref: 6CF944AE
                        • OffsetRect.USER32(?,?,?), ref: 6CF944E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Monitor$FromInfoOffsetRectWindow
                        • String ID: (
                        • API String ID: 1360704185-3887548279
                        • Opcode ID: 17e33d7f26059eeb78e8bca84680fb53cce287eba9bf4a6e3abdc1991f910945
                        • Instruction ID: ec9df9c2989acde0b5f0485db59a852530c5348bc0da3e917a1e4ab4f6a01d2c
                        • Opcode Fuzzy Hash: 17e33d7f26059eeb78e8bca84680fb53cce287eba9bf4a6e3abdc1991f910945
                        • Instruction Fuzzy Hash: BA516EB5D00209DFDB18CFA9C990AAEBBF1BF48304F20866AD415A7351D730AA45CF64
                        APIs
                        • IsZoomed.USER32(00000000), ref: 6CF94619
                        • IsZoomed.USER32(00000000), ref: 6CF94642
                          • Part of subcall function 6CF8C0A0: SendMessageW.USER32(?,00000000,00000010,6CF94609), ref: 6CF8C0BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Zoomed$MessageSend
                        • String ID: maxbtn$restorebtn
                        • API String ID: 239802086-341968062
                        • Opcode ID: b41be20924e18a23ebf02241d4fe3b6e1b71401f40b6616f7453c89f2e6e9e11
                        • Instruction ID: ea6eef07a73f76ec3469fe3dd8d3abc7fb9dfaacc6f11d12f021241c26012171
                        • Opcode Fuzzy Hash: b41be20924e18a23ebf02241d4fe3b6e1b71401f40b6616f7453c89f2e6e9e11
                        • Instruction Fuzzy Hash: C8410B74A01109EFEB04DF94C991BAEB771BF44308F208569D426AB790DB706A40CF61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID:
                        • String ID: textchanged
                        • API String ID: 0-1330398090
                        • Opcode ID: 80c110b8fb3cf43a7268b31aaf5ca9adf3d65eb2df5822b5ba8be136f6a90c8e
                        • Instruction ID: fdbef50ebeb5fe9e1b6617eaaa43a424edaeb1646552579e3af5debe22b88fc4
                        • Opcode Fuzzy Hash: 80c110b8fb3cf43a7268b31aaf5ca9adf3d65eb2df5822b5ba8be136f6a90c8e
                        • Instruction Fuzzy Hash: 8631F274B1521ADFDB08DF98C990BAEB7B1BF88304F204959E551AB741CB30E945CBA0
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66084
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7B9
                          • Part of subcall function 6CF7A7A4: __CxxThrowException@8.LIBCMT ref: 6CF7A7CE
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7DF
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF6609F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                        • String ID: string too long
                        • API String ID: 963545896-2556327735
                        • Opcode ID: 1ee426b9c55dc2d96c8c254a21a96cb400b1cd187bdb4490ad1a1e32cdeb1ce8
                        • Instruction ID: 5075d4bad874c26973dbd13ee80df93b7181c620b72d58c0279ccb2b85cbd8ef
                        • Opcode Fuzzy Hash: 1ee426b9c55dc2d96c8c254a21a96cb400b1cd187bdb4490ad1a1e32cdeb1ce8
                        • Instruction Fuzzy Hash: 4221F8763087909BD7318E1DD850A2AB7F99F96A14F110A2EF5D2CBF92C772D844C3A1
                        APIs
                        • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                        • wsprintfW.USER32 ref: 00404483
                        • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: ItemTextlstrlenwsprintf
                        • String ID: %u.%u%s%s
                        • API String ID: 3540041739-3551169577
                        • Opcode ID: dfea5b50e45ff8be8bfc9556fdf0d102cde058af48904552fdcaee68f5e7691e
                        • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                        • Opcode Fuzzy Hash: dfea5b50e45ff8be8bfc9556fdf0d102cde058af48904552fdcaee68f5e7691e
                        • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                        APIs
                        • __wcsicoll.LIBCMT ref: 6CFFBC61
                        • __wcsicoll.LIBCMT ref: 6CFFBCBB
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$_malloc
                        • String ID: Menu$MenuElement
                        • API String ID: 3028118121-135141346
                        • Opcode ID: f489252e1bb71994702208b466949c193fab90b663dc98b9ba2b1e8801bcfb85
                        • Instruction ID: 7c81bd85069b73fc5d7162258b5e4f8f9b00441a87edc3466c485460b1d6889a
                        • Opcode Fuzzy Hash: f489252e1bb71994702208b466949c193fab90b663dc98b9ba2b1e8801bcfb85
                        • Instruction Fuzzy Hash: 77215CB1D04209DBDB10DFA8C954BDEBBF0EB09354F104669E824BBB90E7355A05CBA1
                        APIs
                          • Part of subcall function 00401553: RegOpenKeyExW.KERNELBASE(?,00000000,00000022,00000000,?,?), ref: 0040158B
                        • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        Strings
                        • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                        • DeleteRegKey: "%s\%s", xrefs: 00402843
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                        • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                        • API String ID: 1697273262-1764544995
                        • Opcode ID: c31ef68b78af8176afdd907103d282dc2699cb0537778d61dc9e8deda1771df0
                        • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                        • Opcode Fuzzy Hash: c31ef68b78af8176afdd907103d282dc2699cb0537778d61dc9e8deda1771df0
                        • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                        APIs
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                          • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                          • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                        • lstrlenW.KERNEL32 ref: 004026B4
                        • lstrlenW.KERNEL32(00000000), ref: 004026C1
                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                        • String ID: CopyFiles "%s"->"%s"
                        • API String ID: 2577523808-3778932970
                        • Opcode ID: 76b1160061a8bcde82d673e25faa9719cd8acd17af1c4b15f649e1f749d05235
                        • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                        • Opcode Fuzzy Hash: 76b1160061a8bcde82d673e25faa9719cd8acd17af1c4b15f649e1f749d05235
                        • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll$__fassign
                        • String ID: Image$name
                        • API String ID: 2467191783-1833322134
                        • Opcode ID: 5df80941129d6a7853b1393d066237029e1f52c716a7458a1091bd49344f5215
                        • Instruction ID: c55e95e38be6057326b235d70afacd26693fa3e34e00fa80d723e4d5167f74e5
                        • Opcode Fuzzy Hash: 5df80941129d6a7853b1393d066237029e1f52c716a7458a1091bd49344f5215
                        • Instruction Fuzzy Hash: D3211A71D08A688ADB65CF24DD647EBB7B0FB40309F1445D9D04EA6680EB797E88CF90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrcatwsprintf
                        • String ID: %02x%c$...
                        • API String ID: 3065427908-1057055748
                        • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                        • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                        • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                        • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                        APIs
                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                        • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: PrivateProfileStringWritelstrcpyn
                        • String ID: <RM>$ShowPage$WriteINIStr: wrote [%s] %s=%s in %s
                        • API String ID: 247603264-4061174037
                        • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                        • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                        • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                        • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 00405083
                          • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                        • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                        • String ID: Section: "%s"$Skipping section: "%s"
                        • API String ID: 2266616436-4211696005
                        • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                        • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                        • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                        • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                        APIs
                        • _memset.LIBCMT ref: 6CFD2AF0
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6CFD2B31
                        • RegisterClassExW.USER32(00000030), ref: 6CFD2B5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ClassCursorLoadRegister_memset
                        • String ID: 0
                        • API String ID: 2700477685-4108050209
                        • Opcode ID: 770d566ba00494411457c176d63a48671cfdaf5789f263f6491bdd745d1c6dd0
                        • Instruction ID: ae5c7d061c57bcd5937865167e0a1653a8cb182b56fd10d8c2b71b2b3202164c
                        • Opcode Fuzzy Hash: 770d566ba00494411457c176d63a48671cfdaf5789f263f6491bdd745d1c6dd0
                        • Instruction Fuzzy Hash: 32112DB4D153089BEB00DF94C955BEEBBB4BB45304F208148E8146B380D7BA5608CFA5
                        APIs
                        • LoadLibraryW.KERNEL32(Shcore.dll,?,6CF7011B,00000002), ref: 6CFA21FE
                        • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 6CFA2216
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: SetProcessDpiAwareness$Shcore.dll
                        • API String ID: 2574300362-999387375
                        • Opcode ID: f5e595b494c486cb8da4cfccd3121a2ea9cea6fee7744299ed569f8ed62c1c2a
                        • Instruction ID: df9fd55923d59087a47e24ddd1611e3491232230376eb6b4e5e58c9fdc156468
                        • Opcode Fuzzy Hash: f5e595b494c486cb8da4cfccd3121a2ea9cea6fee7744299ed569f8ed62c1c2a
                        • Instruction Fuzzy Hash: 2E01DA74E05209EBEB04DFE6C488B9EFBB4BF48304F208599E81997750D7359A85CB90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: Container$IContainer
                        • API String ID: 3832890014-2633171450
                        • Opcode ID: 2f261fd32f391cc8f50018caa28b5becbface832012d810d0c2f89d9aa7e7dad
                        • Instruction ID: cfe55739c2e6f91e5bfe6857438da9a320d084ba8a2021635287e737aa613b14
                        • Opcode Fuzzy Hash: 2f261fd32f391cc8f50018caa28b5becbface832012d810d0c2f89d9aa7e7dad
                        • Instruction Fuzzy Hash: C5F04FB1F04109EBDB00CF98D954BDFB7B9AB11349F109599E8049B740E330BE44C792
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: Combo$IListOwner
                        • API String ID: 3832890014-3568159877
                        • Opcode ID: bb1ab02747251185abb6c554d7819d6536c705fb33ef7d2acd71fecbe4dcbb97
                        • Instruction ID: 29ab3869ad5207146a402d2352a996997009024ab61fd46f0a4eb4a7d9536736
                        • Opcode Fuzzy Hash: bb1ab02747251185abb6c554d7819d6536c705fb33ef7d2acd71fecbe4dcbb97
                        • Instruction Fuzzy Hash: DEF049B4E08209FBEB14CBD4DD40B9DB7F8AB4A309F5082A8E8046B350E771EA54C795
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: animation_direction$vertical
                        • API String ID: 3832890014-2065563771
                        • Opcode ID: 1ca1b71ed8327c5c54c908c309a6465c5beed96fd593e45351f224470673295a
                        • Instruction ID: 215d0d62a79c036c4fa5ba169966d5608279c0f8096ca3c67b5388aa3868431f
                        • Opcode Fuzzy Hash: 1ca1b71ed8327c5c54c908c309a6465c5beed96fd593e45351f224470673295a
                        • Instruction Fuzzy Hash: 09F0A7B1904108BBCB04CB95DC40E9E77B89B46304F008698FD1887741E732EA1487E4
                        APIs
                        • PtInRect.USER32(?,?,00000003), ref: 6CFF29E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Rect
                        • String ID:
                        • API String ID: 400858303-0
                        • Opcode ID: a0f994200f0a4c08233bfc58a98500ef92ce7e72786673e74289eb85ba665d3d
                        • Instruction ID: f5e1a7235f6bfcabee0f1b1d05bf213980988234c3117c390e519bf56490a95a
                        • Opcode Fuzzy Hash: a0f994200f0a4c08233bfc58a98500ef92ce7e72786673e74289eb85ba665d3d
                        • Instruction Fuzzy Hash: 1512AC75E01149CFCB24DFA8C494A9DF7B2FF89304F248269D865AB766DB31A846CF40
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove_strpbrk
                        • String ID:
                        • API String ID: 1758035326-0
                        • Opcode ID: 416549fa5de29a775d1f6b57dd5e334b681cf1486a64927401a5d0ce5a606cf8
                        • Instruction ID: 10ca7557e3d61835714eb13ce76be14a836038c2a5829ef06217ce45439a92c1
                        • Opcode Fuzzy Hash: 416549fa5de29a775d1f6b57dd5e334b681cf1486a64927401a5d0ce5a606cf8
                        • Instruction Fuzzy Hash: 5DC1F3B1D00249DFDB20CFA8E884BDEBBB4EF05308F14816AE455AB781D771D949CBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                        • String ID:
                        • API String ID: 2782032738-0
                        • Opcode ID: 8a5368d134481dfc1ac6ff2f04e20732f090f3986a8d2edf82540c275bdfde9c
                        • Instruction ID: ff1df46a9d0ad73b26b187ebf4255c3b35f1dd67955373012ee12c05827f6780
                        • Opcode Fuzzy Hash: 8a5368d134481dfc1ac6ff2f04e20732f090f3986a8d2edf82540c275bdfde9c
                        • Instruction Fuzzy Hash: 8741E671A017049FDF34EFB9E844AAF7BB5AF80368F24862BD42497A40D771E954CB60
                        APIs
                        • std::_DebugHeapString::_DebugHeapString.LIBCPMTD ref: 6CF6451F
                          • Part of subcall function 6CF642C0: _memset.LIBCMT ref: 6CF6439C
                          • Part of subcall function 6CF642C0: _memset.LIBCMT ref: 6CF64404
                        • lstrlen.KERNEL32(E243FD3F,02CF2A64,6D03A180,6D03A17C,00000000,6D03A17C,E243FD3F,00000000,02CF3288), ref: 6CF64557
                        • __alloca_probe_16.LIBCMT ref: 6CF6456B
                        • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000001), ref: 6CF64589
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: DebugHeap_memset$ByteCharMultiStringString::_Wide__alloca_probe_16lstrlenstd::_
                        • String ID:
                        • API String ID: 3975281319-0
                        • Opcode ID: 815a69db8d9e1f5dd3e4287e4806587fac41e3411f5572aa7c7036394bc54798
                        • Instruction ID: 1e4df2de57a42657f17af52a7a9be17c287c609ee80679bbdcd6aca562b49ae6
                        • Opcode Fuzzy Hash: 815a69db8d9e1f5dd3e4287e4806587fac41e3411f5572aa7c7036394bc54798
                        • Instruction Fuzzy Hash: 3B41D231D01219DBEB50DB65CC50FEEBBB5EF49314F1046A9D829A77C0DB70AA48CBA1
                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6D018660
                          • Part of subcall function 6CF7AEF3: __getptd.LIBCMT ref: 6CF7AF06
                        • __isctype_l.LIBCMT ref: 6D018683
                          • Part of subcall function 6CF87CDC: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6CF87CEB
                          • Part of subcall function 6CF7EF1D: __getptd_noexit.LIBCMT ref: 6CF7EF1D
                        • __isleadbyte_l.LIBCMT ref: 6D0186E4
                        • ___crtLCMapStringA.LIBCMT ref: 6D018735
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Locale$UpdateUpdate::_$String___crt__getptd__getptd_noexit__isctype_l__isleadbyte_l
                        • String ID:
                        • API String ID: 1963401427-0
                        • Opcode ID: 6eef88952b45381a9a2943befd018f11ef96aac713e729d73a6585ac4c78cf63
                        • Instruction ID: 7bac07b86aaefc287b0b1f7a98a6e1fc551f61a3aa93e9d66ddd325d5998ae1c
                        • Opcode Fuzzy Hash: 6eef88952b45381a9a2943befd018f11ef96aac713e729d73a6585ac4c78cf63
                        • Instruction Fuzzy Hash: 1E319031A0824ABEEF01CBA4CC85FFE7BB4AB01308F5481A9E5649B1D2DB31D645DB61
                        APIs
                          • Part of subcall function 6CF98060: GetKeyState.USER32(00000011), ref: 6CF9806D
                          • Part of subcall function 6CF98060: GetKeyState.USER32(00000001), ref: 6CF98083
                          • Part of subcall function 6CF98060: GetKeyState.USER32(00000002), ref: 6CF9809B
                          • Part of subcall function 6CF98060: GetKeyState.USER32(00000010), ref: 6CF980B3
                          • Part of subcall function 6CF98060: GetKeyState.USER32(00000012), ref: 6CF980C9
                        • GetTickCount.KERNEL32 ref: 6CF98618
                        • GetActiveWindow.USER32 ref: 6CF986C4
                        • GetWindow.USER32(?,00000004), ref: 6CF986E7
                        • SetFocus.USER32(00000000), ref: 6CF986FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: State$Window$ActiveCountFocusTick
                        • String ID:
                        • API String ID: 206295357-0
                        • Opcode ID: 69973243926f7b4bd8d4d25ad390017deee913ee7789aae1b6f0b8bc41cc2a63
                        • Instruction ID: 449f15f453838d09e652c9bda4f31d0b56b20219f254f8bd44c3ff5dba82ae58
                        • Opcode Fuzzy Hash: 69973243926f7b4bd8d4d25ad390017deee913ee7789aae1b6f0b8bc41cc2a63
                        • Instruction Fuzzy Hash: 11417A74E052188FEB19CF94C885BD9B7B1FF48304F2082AAD809AB755D7356A81DF50
                        APIs
                        • SelectObject.GDI32(?,?), ref: 6CFF020F
                        • GetObjectW.GDI32(?,00000018,?), ref: 6CFF022A
                        • _malloc.LIBCMT ref: 6CFF024A
                          • Part of subcall function 6CF7CD40: __FF_MSGBANNER.LIBCMT ref: 6CF7CD59
                          • Part of subcall function 6CF7CD40: __NMSG_WRITE.LIBCMT ref: 6CF7CD60
                          • Part of subcall function 6CF7CD40: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 6CF7CD85
                        • GetBitmapBits.GDI32(?,?,?), ref: 6CFF0273
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Object$AllocateBitmapBitsHeapSelect_malloc
                        • String ID:
                        • API String ID: 2659638627-0
                        • Opcode ID: 555c80ab6254c7debe1e3d405033179016fa8cb1bee1cd30a4a0f4d103e969a2
                        • Instruction ID: 695e20202ae53d29e8ea6f9434904b22b591e6238c8c9dcc8a569c17d612a43c
                        • Opcode Fuzzy Hash: 555c80ab6254c7debe1e3d405033179016fa8cb1bee1cd30a4a0f4d103e969a2
                        • Instruction Fuzzy Hash: FD21DF74A00604EFCB04DFA8C994A9EBBB5BF88316F1441A8E9459B381D731A985CF50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: From$ProgString_memset_wcsncpy
                        • String ID:
                        • API String ID: 2240319475-0
                        • Opcode ID: b10da6f8e5a389e0627ed5e3ff2b7cecfc6a2a89ac6b189dce34d971138b4497
                        • Instruction ID: b8352dcb068076d50ccaa3c369c7cb5bfbccf647bf120ade3cfa38599b55ca14
                        • Opcode Fuzzy Hash: b10da6f8e5a389e0627ed5e3ff2b7cecfc6a2a89ac6b189dce34d971138b4497
                        • Instruction Fuzzy Hash: 8B21EA71D042189BDB64DFA8D941BADB7B5BB48300F4085EAE50EB7240EB709A84CFA0
                        APIs
                        • GetClipBox.GDI32(6CF91B88,00000000), ref: 6CFB8E7A
                        • CreateRectRgnIndirect.GDI32(00000000), ref: 6CFB8E84
                        • CreateRectRgnIndirect.GDI32(?), ref: 6CFB8E94
                        • ExtSelectClipRgn.GDI32(6CF91B88,?,00000001), ref: 6CFB8EAD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ClipCreateIndirectRect$Select
                        • String ID:
                        • API String ID: 4223180713-0
                        • Opcode ID: 1e462cc064f01cb61db1c866f4893b086155c1b6edb0ce7e7597b24d4a28e218
                        • Instruction ID: 7c87f62061027a169d0a23ff001b6ca41e2ffca415184c2587d62a8baaa8a253
                        • Opcode Fuzzy Hash: 1e462cc064f01cb61db1c866f4893b086155c1b6edb0ce7e7597b24d4a28e218
                        • Instruction Fuzzy Hash: C621C9B4900209DFCB44DF68C594A9EBBF5FF88304B20855AED199B341D735EA56CFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                        • Instruction ID: 0dac57095f7608ba47102c14a722c9b91818809c659b40023dc67b9cf24b8f9f
                        • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                        • Instruction Fuzzy Hash: AC11397244824ABBDF025EC5DC41EEE3FA2BB19254F658419FA2859021C737C5BAAB81
                        APIs
                        • GetDC.USER32(?), ref: 00402100
                        • GetDeviceCaps.GDI32(00000000), ref: 00402107
                        • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00428BB1,74DF23A0,00000000), ref: 00406902
                        • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                        • String ID:
                        • API String ID: 1599320355-0
                        • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                        • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                        • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                        • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                        APIs
                          • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                        • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                        • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                        • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrcpyn$CreateFilelstrcmp
                        • String ID: Version
                        • API String ID: 512980652-315105994
                        • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                        • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                        • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                        • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                        APIs
                        • std::exception::exception.LIBCMT ref: 6CF6AE9F
                          • Part of subcall function 6CF7B28C: std::exception::_Copy_str.LIBCMT ref: 6CF7B2A7
                        • __CxxThrowException@8.LIBCMT ref: 6CF6AE90
                          • Part of subcall function 6CF7D3D1: RaiseException.KERNEL32(?,?,6CF7C8E0,E243FD3F,?,?,?,?,6CF7C8E0,E243FD3F,6D042A94,6D049FF4,E243FD3F,-00000898,00000002,?), ref: 6CF7D413
                        • __CxxThrowException@8.LIBCMT ref: 6CF6AEB4
                        • std::exception::exception.LIBCMT ref: 6CF6AECA
                          • Part of subcall function 6CF7B373: std::exception::operator=.LIBCMT ref: 6CF7B38C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaisestd::exception::_std::exception::operator=
                        • String ID:
                        • API String ID: 3186241058-0
                        • Opcode ID: 964f2c940c39114844f3296e68432f9dee055b88bacdfa34edf4e486f5948e3b
                        • Instruction ID: 896e5c60f64b907e8c309e4bd1cdfad6c818271e053c365d0a13988aa52c324f
                        • Opcode Fuzzy Hash: 964f2c940c39114844f3296e68432f9dee055b88bacdfa34edf4e486f5948e3b
                        • Instruction Fuzzy Hash: C1F012B1D002086B9764DFE5E848DDF7BACDF08150F14482AF90497A00D774D5488BB1
                        APIs
                        • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                        • GetTickCount.KERNEL32 ref: 00403303
                        • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                        • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                        • String ID:
                        • API String ID: 2102729457-0
                        • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                        • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                        • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                        • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                        • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                        • GlobalFree.KERNEL32(00000000), ref: 004063CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                        • String ID:
                        • API String ID: 2883127279-0
                        • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                        • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                        • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                        • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                        APIs
                          • Part of subcall function 6CFC7D80: LoadCursorW.USER32(00000000,?), ref: 6CFC7DBC
                          • Part of subcall function 6CFC7D80: SetCursor.USER32(00000000,?,6CFCB863,?), ref: 6CFC7DC3
                        • Mailbox.LIBCMTD ref: 6CFF047A
                        • Mailbox.LIBCMTD ref: 6CFF0847
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: CursorMailbox$Load
                        • String ID: colorchanged
                        • API String ID: 3629072254-2145305739
                        • Opcode ID: 9b22d9c97f9892d7abf7565604e7706c451b22809d9a1e794ed6c06cc08a3d6f
                        • Instruction ID: 78820572235a6d6a8d4116855b39ac528c4fc3b991fc3a68c3a134f589637c3f
                        • Opcode Fuzzy Hash: 9b22d9c97f9892d7abf7565604e7706c451b22809d9a1e794ed6c06cc08a3d6f
                        • Instruction Fuzzy Hash: F832FB34A11618DFDB04CF94D994EEEB7B2FF88305F1482A9E8096B755DB71A942CF80
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: read past buffer$zlib corrupt
                        • API String ID: 4104443479-1132150665
                        • Opcode ID: d74f283a0ec629d65c0fe3e19426f6ae0e1cbdbce92a86378960719e9c3386cc
                        • Instruction ID: e2b544cbf09aa1560a7abc6efc8f3484f2fe29a12ec6a607ec446d8e1c2101fc
                        • Opcode Fuzzy Hash: d74f283a0ec629d65c0fe3e19426f6ae0e1cbdbce92a86378960719e9c3386cc
                        • Instruction Fuzzy Hash: 5761F775A04249EFCB04CF98C4909ADBBB2FF89354F14C198E8499B745C731EA92CBD0
                        APIs
                          • Part of subcall function 6CFA4680: _malloc.LIBCMT ref: 6CFA4687
                        • _free.LIBCMT ref: 6CFA46C7
                          • Part of subcall function 6CF7B751: RtlFreeHeap.NTDLL(00000000,00000000,?,6CF81320,00000000), ref: 6CF7B767
                          • Part of subcall function 6CF7B751: GetLastError.KERNEL32(00000000), ref: 6CF7B779
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free_malloc
                        • String ID: outofmem
                        • API String ID: 1323848136-748900114
                        • Opcode ID: ad5045c66debb13b464c526b86f5091101df0747de96535f13913e388ceb0203
                        • Instruction ID: 89feeb8b305d2b0c945d454ae7c2c26b0f2c21c8b71e32cdede0221eb3237684
                        • Opcode Fuzzy Hash: ad5045c66debb13b464c526b86f5091101df0747de96535f13913e388ceb0203
                        • Instruction Fuzzy Hash: 0151377190510ADBCF00CF84EA85AAEBF71FF42304F525695D8507B688CB34AA72CF92
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66EA6
                        • _memmove.LIBCMT ref: 6CF66EFC
                          • Part of subcall function 6CF66240: std::_Xinvalid_argument.LIBCPMT ref: 6CF66257
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$_memmove
                        • String ID: string too long
                        • API String ID: 2168136238-2556327735
                        • Opcode ID: 6ffaacc9f3e52571795b154709b5d618ea96f0eaf37823db3eb272018de06c54
                        • Instruction ID: 89d59984267d2e986308a5300faa1e9cdb39791d6d46db28b10e965945352ff9
                        • Opcode Fuzzy Hash: 6ffaacc9f3e52571795b154709b5d618ea96f0eaf37823db3eb272018de06c54
                        • Instruction Fuzzy Hash: A1316F727001119B8714CA6FE8D08AAB7AAFFE5366314053AF604CBE00D731ECA5C7B5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argument_memmovestd::_
                        • String ID: vector<T> too long
                        • API String ID: 256744135-3788999226
                        • Opcode ID: a748a7ee850725892636f766aa08af9376bb10010f1de4f9b842d43b8d7cde5b
                        • Instruction ID: b3f9a165b5ba3f770fccfced512d7499d74869a2e1e2e2f62bb91815bc44dd60
                        • Opcode Fuzzy Hash: a748a7ee850725892636f766aa08af9376bb10010f1de4f9b842d43b8d7cde5b
                        • Instruction Fuzzy Hash: 25510AB5D04109EFDB14CF99D590AAEFBB1FF89300F10825AE815AB384D731A942CF91
                        APIs
                        • _localeconv.LIBCMT ref: 6CF7825E
                          • Part of subcall function 6CF7CC7D: __getptd.LIBCMT ref: 6CF7CC7D
                          • Part of subcall function 6CF7AC97: ____lc_handle_func.LIBCMT ref: 6CF7AC9A
                          • Part of subcall function 6CF7AC97: ____lc_codepage_func.LIBCMT ref: 6CF7ACA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: ____lc_codepage_func____lc_handle_func__getptd_localeconv
                        • String ID: false$true
                        • API String ID: 679402580-2658103896
                        • Opcode ID: 4ee9368835e4d2b81d5de46b40581e5df7bb82bbd639f80c7983a96f895ab3eb
                        • Instruction ID: 698cbff29cea5b664e485864e15144fa045adcaad6ecf8088dd4051050d81a42
                        • Opcode Fuzzy Hash: 4ee9368835e4d2b81d5de46b40581e5df7bb82bbd639f80c7983a96f895ab3eb
                        • Instruction Fuzzy Hash: 633105B19067C19BD721CF78A480B97BFE4AB06248F25497BC5969BB01E730E508CBB1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66D94
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7B9
                          • Part of subcall function 6CF7A7A4: __CxxThrowException@8.LIBCMT ref: 6CF7A7CE
                          • Part of subcall function 6CF7A7A4: std::exception::exception.LIBCMT ref: 6CF7A7DF
                        • _memmove.LIBCMT ref: 6CF66DDB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                        • String ID: string too long
                        • API String ID: 1785806476-2556327735
                        • Opcode ID: a2e89673163182d5f8221bf0d604b416e11fb33985b9103d48c3d5ed67f91376
                        • Instruction ID: 921214b74a6384476b8e8effad1b6092ca6349cfffd7bb06113b5280e95278a0
                        • Opcode Fuzzy Hash: a2e89673163182d5f8221bf0d604b416e11fb33985b9103d48c3d5ed67f91376
                        • Instruction Fuzzy Hash: 5D1196711082145FE7209E79E8C1B6AB7A8AF51718F240B2FF497C7E81D731E45883A1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66257
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A806
                          • Part of subcall function 6CF7A7F1: __CxxThrowException@8.LIBCMT ref: 6CF7A81B
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A82C
                          • Part of subcall function 6CF66FC0: std::_Xinvalid_argument.LIBCPMT ref: 6CF66FCD
                        • _memmove.LIBCMT ref: 6CF662B7
                        Strings
                        • invalid string position, xrefs: 6CF66252
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                        • String ID: invalid string position
                        • API String ID: 3404309857-1799206989
                        • Opcode ID: 7791aefd0d6e3c6ef7ec4ec634e28051cd80970404cd1986711c1c880733b933
                        • Instruction ID: 1e6c9fac1da3f6bff0972d26c5abe43401f35f5fd65682a47320472cefe5080f
                        • Opcode Fuzzy Hash: 7791aefd0d6e3c6ef7ec4ec634e28051cd80970404cd1986711c1c880733b933
                        • Instruction Fuzzy Hash: 3011E2323152119B8F10DFAEE8C08EAB366BF94328754422AF405CBE40E772E959C7E1
                        APIs
                          • Part of subcall function 6CF7C861: _malloc.LIBCMT ref: 6CF7C87B
                        • std::exception::exception.LIBCMT ref: 6CF729D5
                        • __CxxThrowException@8.LIBCMT ref: 6CF729EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throw_mallocstd::exception::exception
                        • String ID: ream
                        • API String ID: 4063778783-3784047043
                        • Opcode ID: 920f95d1b42ccb21114d153cf6fa813f31fa8687ad79cede55de5c9968b7a6f6
                        • Instruction ID: 00c923139b46ff111da785407168e79ea4f22dd5d02c8985e8851ffc974ce1e6
                        • Opcode Fuzzy Hash: 920f95d1b42ccb21114d153cf6fa813f31fa8687ad79cede55de5c9968b7a6f6
                        • Instruction Fuzzy Hash: 262192B1901609EFCB10DF98D880BDABBF8FF58714F10866AE85997741D774A608CBA1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66156
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A806
                          • Part of subcall function 6CF7A7F1: __CxxThrowException@8.LIBCMT ref: 6CF7A81B
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A82C
                        • _memmove.LIBCMT ref: 6CF6618F
                        Strings
                        • invalid string position, xrefs: 6CF66151
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                        • String ID: invalid string position
                        • API String ID: 1785806476-1799206989
                        • Opcode ID: bd2caf31ac38acab3938b0ebde6104910adea7d525be2a3cb4eb62a07d8ab349
                        • Instruction ID: aefa0acea7325141d1f323981299a169acb3992eef3d7bfdbdc8af657a5ab31d
                        • Opcode Fuzzy Hash: bd2caf31ac38acab3938b0ebde6104910adea7d525be2a3cb4eb62a07d8ab349
                        • Instruction Fuzzy Hash: 65019B323006505BD3218E6DEC9095BB7BADB85B54B25492EF181CBF46D671EC4583E1
                        APIs
                        • IsWindowVisible.USER32(?), ref: 0040492E
                        • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                          • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$CallMessageProcSendVisible
                        • String ID:
                        • API String ID: 3748168415-3916222277
                        • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                        • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                        • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                        • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                        APIs
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00428BB1,74DF23A0,00000000), ref: 00404FD6
                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FE6
                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00428BB1,74DF23A0,00000000), ref: 00404FF9
                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                        • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        Strings
                        • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                        • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                        • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                        • API String ID: 3156913733-2180253247
                        • Opcode ID: 15c68030ebc057a6bcbee2c0ec13fbcebe1f6febf3bc6cb13a7f0169c5a164a4
                        • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                        • Opcode Fuzzy Hash: 15c68030ebc057a6bcbee2c0ec13fbcebe1f6febf3bc6cb13a7f0169c5a164a4
                        • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 6CF66F4F
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A806
                          • Part of subcall function 6CF7A7F1: __CxxThrowException@8.LIBCMT ref: 6CF7A81B
                          • Part of subcall function 6CF7A7F1: std::exception::exception.LIBCMT ref: 6CF7A82C
                        • _memmove.LIBCMT ref: 6CF66F8A
                        Strings
                        • invalid string position, xrefs: 6CF66F4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                        • String ID: invalid string position
                        • API String ID: 1785806476-1799206989
                        • Opcode ID: 5a48c30db64a3b36370962aa90df5e5017746503ac32f63c22c83d8e8e12f7f5
                        • Instruction ID: fb7ce5be37ce208150030d894dbbbdb6bebb0beaa1eee4308c1650bf0977b1f0
                        • Opcode Fuzzy Hash: 5a48c30db64a3b36370962aa90df5e5017746503ac32f63c22c83d8e8e12f7f5
                        • Instruction Fuzzy Hash: 04014C313246118BC320CF7DE98081AB3F6AFC47043244A2DF096CBE59FB31D8468791
                        APIs
                        • std::exception::exception.LIBCMT ref: 6CF78B6B
                        • __CxxThrowException@8.LIBCMT ref: 6CF78B80
                        Strings
                        • Type is not convertible to double, xrefs: 6CF78B64
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Exception@8Throwstd::exception::exception
                        • String ID: Type is not convertible to double
                        • API String ID: 3728558374-279886761
                        • Opcode ID: 445e2c99e0fd23ac735ab107e22629a6b871bd30fc9cdd6dc1e012bf7e44f1b5
                        • Instruction ID: 270bddfc033e61aed1126cfb8a56b41ca492465a03a71159bc09a8df9c16d817
                        • Opcode Fuzzy Hash: 445e2c99e0fd23ac735ab107e22629a6b871bd30fc9cdd6dc1e012bf7e44f1b5
                        • Instruction Fuzzy Hash: ED01C4B1D0520DDFCB14CF98E4657ADBBB4DB4A314F2541CAD80D63750DA310A24C7A1
                        APIs
                        • GetParent.USER32(00000000), ref: 6CFD4971
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: Parent
                        • String ID: #$#
                        • API String ID: 975332729-2529538431
                        • Opcode ID: 19999726ba696aae739f2c9b408acfae1b36c7ebec84c988e2f07ca47e57eed5
                        • Instruction ID: a316688f62c5a57b94cb6de01f2d39e0d3477833dadc5d17375ae82f12dc6851
                        • Opcode Fuzzy Hash: 19999726ba696aae739f2c9b408acfae1b36c7ebec84c988e2f07ca47e57eed5
                        • Instruction Fuzzy Hash: 0501B135505248EFCB04CF55C48059EBF74AF06314B29C1C8D8990B745C731AF81DBD5
                        APIs
                        • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                        • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: Window$EnableShowlstrlenwvsprintf
                        • String ID: HideWindow
                        • API String ID: 1249568736-780306582
                        • Opcode ID: 13cbdd23df18d036de9d5c22efd7f5e469270204adcf9325ac20a19b3184ad94
                        • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                        • Opcode Fuzzy Hash: 13cbdd23df18d036de9d5c22efd7f5e469270204adcf9325ac20a19b3184ad94
                        • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                        APIs
                        • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                        • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: PrivateProfileStringlstrcmp
                        • String ID: !N~
                        • API String ID: 623250636-529124213
                        • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                        • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                        • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                        • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                        APIs
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                        • CloseHandle.KERNEL32(?), ref: 00405C9D
                        Strings
                        • Error launching installer, xrefs: 00405C74
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID: Error launching installer
                        • API String ID: 3712363035-66219284
                        • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                        • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                        • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                        • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                        APIs
                        • lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                        • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                          • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                        Strings
                        • File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1), xrefs: 004062D1, 004062D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: CloseHandlelstrlenwvsprintf
                        • String ID: File: skipped: "C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll" (overwriteflag=1)
                        • API String ID: 3509786178-1122914040
                        • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                        • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                        • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                        • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                        APIs
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF70B40
                        • GlobalFree.KERNEL32 ref: 6CF70B4C
                        • lstrcpynW.KERNEL32(?,?,00000080), ref: 6CF70B7E
                        • GlobalFree.KERNEL32 ref: 6CF70B8B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2904975169.000000006CF61000.00000040.00000001.01000000.00000005.sdmp, Offset: 6CF60000, based on PE: true
                        • Associated: 00000000.00000002.2904959906.000000006CF60000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D047000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05A000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2904975169.000000006D05F000.00000040.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905096444.000000006D061000.00000080.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.2905111806.000000006D062000.00000004.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6cf60000_electrumx64.jbxd
                        Similarity
                        • API ID: FreeGloballstrcpyn
                        • String ID:
                        • API String ID: 1459762280-0
                        • Opcode ID: 427dddcbfa3afc6d9cee047b20ff6636ee5201ab1413be3f17002cdeebbc4f5a
                        • Instruction ID: c35d972cf45c0156e05ea1106b22aef471cdd6157b478518b8459c15ced9c000
                        • Opcode Fuzzy Hash: 427dddcbfa3afc6d9cee047b20ff6636ee5201ab1413be3f17002cdeebbc4f5a
                        • Instruction Fuzzy Hash: A4318271901354DBCB24EF68D980F9AB7B8BF89314F10459AD95497740DBB1EA84CFA0
                        APIs
                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                        • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                        • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                        • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                        Memory Dump Source
                        • Source File: 00000000.00000002.2903919733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2903888749.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903948489.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2903964887.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000534000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2904054393.0000000000536000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_electrumx64.jbxd
                        Similarity
                        • API ID: lstrlen$CharNextlstrcmpi
                        • String ID:
                        • API String ID: 190613189-0
                        • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                        • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                        • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                        • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4