Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PARATRANSFARI REMINDER.exe

Overview

General Information

Sample name:PARATRANSFARI REMINDER.exe
Analysis ID:1580086
MD5:7d142eb549dacdfc9c357f482d5bf921
SHA1:57ef6110732b2d91f90c785a3fbba4a0112cdc87
SHA256:36b641ba0f1f45fc6bb9c6fb4f74b2a07318b5f4a420d9fbe9b59e1ac2ce3bc4
Tags:exeuser-TeamDreier
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PARATRANSFARI REMINDER.exe (PID: 2752 cmdline: "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe" MD5: 7D142EB549DACDFC9C357F482D5BF921)
    • RegSvcs.exe (PID: 1520 cmdline: "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • cmd.exe (PID: 1372 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 1968 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7535953552:AAEceAC130pKqikyDX9W3q553FopjnWE5ro/sendMessage?chat_id=1981459653", "Token": "7535953552:AAEceAC130pKqikyDX9W3q553FopjnWE5ro", "Chat_id": "1981459653", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1484a:$a1: get_encryptedPassword
      • 0x14b36:$a2: get_encryptedUsername
      • 0x14656:$a3: get_timePasswordChanged
      • 0x14751:$a4: get_passwordField
      • 0x14860:$a5: set_encryptedPassword
      • 0x15ef2:$a7: get_logins
      • 0x15e55:$a10: KeyLoggerEventArgs
      • 0x15ac0:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x1981c:$x1: $%SMTPDV$
      • 0x18200:$x2: $#TheHashHere%&
      • 0x197c4:$x3: %FTPDV$
      • 0x181a0:$x4: $%TelegramDv$
      • 0x15ac0:$x5: KeyLoggerEventArgs
      • 0x15e55:$x5: KeyLoggerEventArgs
      • 0x197e8:$m2: Clipboard Logs ID
      • 0x19a26:$m2: Screenshot Logs ID
      • 0x19b36:$m2: keystroke Logs ID
      • 0x19e10:$m3: SnakePW
      • 0x199fe:$m4: \SnakeKeylogger\
      00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12c4a:$a1: get_encryptedPassword
            • 0x12f36:$a2: get_encryptedUsername
            • 0x12a56:$a3: get_timePasswordChanged
            • 0x12b51:$a4: get_passwordField
            • 0x12c60:$a5: set_encryptedPassword
            • 0x142f2:$a7: get_logins
            • 0x14255:$a10: KeyLoggerEventArgs
            • 0x13ec0:$a11: KeyLoggerEventArgsEventHandler
            0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a5d2:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x19804:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19c37:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ac76:$a5: \Kometa\User Data\Default\Login Data
            0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x13825:$s1: UnHook
            • 0x1382c:$s2: SetHook
            • 0x13834:$s3: CallNextHook
            • 0x13841:$s4: _hook
            Click to see the 15 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-23T21:50:26.292911+010028033053Unknown Traffic192.168.2.549720104.21.67.152443TCP
            2024-12-23T21:50:30.546086+010028033053Unknown Traffic192.168.2.549734104.21.67.152443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-23T21:50:21.215308+010028032742Potentially Bad Traffic192.168.2.549704132.226.8.16980TCP
            2024-12-23T21:50:24.668403+010028032742Potentially Bad Traffic192.168.2.549704132.226.8.16980TCP
            2024-12-23T21:50:28.871550+010028032742Potentially Bad Traffic192.168.2.549726132.226.8.16980TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7535953552:AAEceAC130pKqikyDX9W3q553FopjnWE5ro/sendMessage?chat_id=1981459653", "Token": "7535953552:AAEceAC130pKqikyDX9W3q553FopjnWE5ro", "Chat_id": "1981459653", "Version": "5.1"}
            Source: PARATRANSFARI REMINDER.exeReversingLabs: Detection: 28%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: PARATRANSFARI REMINDER.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: PARATRANSFARI REMINDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49706 version: TLS 1.0
            Source: Binary string: wntdll.pdbUGP source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109970967.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, PARATRANSFARI REMINDER.exe, 00000000.00000003.2110254293.0000000003E70000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109970967.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, PARATRANSFARI REMINDER.exe, 00000000.00000003.2110254293.0000000003E70000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F4449B
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F4C7E8
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4C75D FindFirstFileW,FindClose,0_2_00F4C75D
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4F021
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4F17E
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F4F47F
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F43833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F43833
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F43B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F43B56
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F4BD48

            Networking

            barindex
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49726 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49720 -> 104.21.67.152:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49734 -> 104.21.67.152:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49706 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F52404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00F52404
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F5407C
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F5427A
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F5407C
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00F4003A
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F6CB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F6CB26

            System Summary

            barindex
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: This is a third-party compiled AutoIt script.0_2_00EE3B4C
            Source: PARATRANSFARI REMINDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_821ba9ad-f
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_82eb9a40-a
            Source: PARATRANSFARI REMINDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6cfe0ca3-f
            Source: PARATRANSFARI REMINDER.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_e3336fb5-2
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4A279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00F4A279
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F38638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F38638
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F45264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F45264
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EEE8000_2_00EEE800
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0DAF50_2_00F0DAF5
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EEE0600_2_00EEE060
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF41400_2_00EF4140
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F023450_2_00F02345
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F604650_2_00F60465
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F164520_2_00F16452
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F125AE0_2_00F125AE
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0277A0_2_00F0277A
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F608E20_2_00F608E2
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF68410_2_00EF6841
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F169C40_2_00F169C4
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF89680_2_00EF8968
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F489320_2_00F48932
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F3E9280_2_00F3E928
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F1890F0_2_00F1890F
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0CCA10_2_00F0CCA1
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F16F360_2_00F16F36
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF70FE0_2_00EF70FE
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF31900_2_00EF3190
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE12870_2_00EE1287
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0F3590_2_00F0F359
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F033070_2_00F03307
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF56800_2_00EF5680
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F016040_2_00F01604
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EF58C00_2_00EF58C0
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F078130_2_00F07813
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F01AF80_2_00F01AF8
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F19C350_2_00F19C35
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EEFE400_2_00EEFE40
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F67E0D0_2_00F67E0D
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0BF260_2_00F0BF26
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F01F100_2_00F01F10
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_016591980_2_01659198
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5B3282_2_02C5B328
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C561082_2_02C56108
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5C7902_2_02C5C790
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5C4B32_2_02C5C4B3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C54AD92_2_02C54AD9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5CA702_2_02C5CA70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5BBD32_2_02C5BBD3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C568802_2_02C56880
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C598582_2_02C59858
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5BEB02_2_02C5BEB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5CD532_2_02C5CD53
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C5B4F32_2_02C5B4F3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C535732_2_02C53573
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: String function: 00F00C63 appears 70 times
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: String function: 00EE7F41 appears 35 times
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: String function: 00F08A80 appears 42 times
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109088646.000000000410D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PARATRANSFARI REMINDER.exe
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109832755.0000000003F63000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PARATRANSFARI REMINDER.exe
            Source: PARATRANSFARI REMINDER.exe, 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PARATRANSFARI REMINDER.exe
            Source: PARATRANSFARI REMINDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@8/5@2/2
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4A0F4 GetLastError,FormatMessageW,0_2_00F4A0F4
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F384F3 AdjustTokenPrivileges,CloseHandle,0_2_00F384F3
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F38AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F38AA3
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4B3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F4B3BF
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5EF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F5EF21
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F584D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00F584D0
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00EE4FE9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1852:120:WilError_03
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeFile created: C:\Users\user\AppData\Local\Temp\aut24E5.tmpJump to behavior
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PARATRANSFARI REMINDER.exeReversingLabs: Detection: 28%
            Source: unknownProcess created: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: PARATRANSFARI REMINDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109970967.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, PARATRANSFARI REMINDER.exe, 00000000.00000003.2110254293.0000000003E70000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: PARATRANSFARI REMINDER.exe, 00000000.00000003.2109970967.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp, PARATRANSFARI REMINDER.exe, 00000000.00000003.2110254293.0000000003E70000.00000004.00001000.00020000.00000000.sdmp
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: PARATRANSFARI REMINDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5C104 LoadLibraryA,GetProcAddress,0_2_00F5C104
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F08AC5 push ecx; ret 0_2_00F08AD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02C524B9 push 8BFFFFFFh; retf 2_2_02C524BF
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00EE4A35
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F653DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F653DF
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F03307 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00F03307
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeAPI/Special instruction interceptor: Address: 1658DBC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599193Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598954Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598835Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598718Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598505Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598032Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597907Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597782Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595993Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1392Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8429Jump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98765
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeAPI coverage: 4.7 %
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F4449B
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F4C7E8
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4C75D FindFirstFileW,FindClose,0_2_00F4C75D
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4F021
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4F17E
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F4F47F
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F43833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F43833
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F43B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F43B56
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F4BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F4BD48
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EE4AFE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599193Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598954Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598835Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598718Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598505Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598032Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597907Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597782Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595993Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
            Source: RegSvcs.exe, 00000002.00000002.2545787334.0000000006270000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RegSvcs.exe, 00000002.00000002.2544081217.00000000010CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeAPI call chain: ExitProcess graph end nodegraph_0-97792
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeAPI call chain: ExitProcess graph end nodegraph_0-97560
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5401F BlockInput,0_2_00F5401F
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00EE3B4C
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F15BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F15BFC
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5C104 LoadLibraryA,GetProcAddress,0_2_00F5C104
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_01659028 mov eax, dword ptr fs:[00000030h]0_2_01659028
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_01659088 mov eax, dword ptr fs:[00000030h]0_2_01659088
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_01657A18 mov eax, dword ptr fs:[00000030h]0_2_01657A18
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F381D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00F381D4
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0A2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F0A2D5
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F0A2A4 SetUnhandledExceptionFilter,0_2_00F0A2A4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B25008Jump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F38A73 LogonUserW,0_2_00F38A73
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00EE3B4C
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00EE4A35
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F44CFA mouse_event,0_2_00F44CFA
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F381D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00F381D4
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F44A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F44A08
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F087AB cpuid 0_2_00F087AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F15007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F15007
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F2215F GetUserNameW,0_2_00F2215F
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F140BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F140BA
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00EE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EE4AFE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTR
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_81
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_XP
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_XPe
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_VISTA
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_7
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: WIN_8
            Source: PARATRANSFARI REMINDER.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.PARATRANSFARI REMINDER.exe.3aa0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PARATRANSFARI REMINDER.exe PID: 2752, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1520, type: MEMORYSTR
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F56399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00F56399
            Source: C:\Users\user\Desktop\PARATRANSFARI REMINDER.exeCode function: 0_2_00F5685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F5685D
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS126
            System Information Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            1
            Masquerading
            LSA Secrets131
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Valid Accounts
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PARATRANSFARI REMINDER.exe29%ReversingLabsWin32.Trojan.AutoitInject
            PARATRANSFARI REMINDER.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            104.21.67.152
            truefalse
              high
              checkip.dyndns.com
              132.226.8.169
              truefalse
                high
                checkip.dyndns.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                    high
                    https://reallyfreegeoip.org/xml/8.46.123.189false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2544810443.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qPARATRANSFARI REMINDER.exe, 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2544810443.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://reallyfreegeoip.org/xml/PARATRANSFARI REMINDER.exe, 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2544810443.0000000002D59000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      132.226.8.169
                                      checkip.dyndns.comUnited States
                                      16989UTMEMUSfalse
                                      104.21.67.152
                                      reallyfreegeoip.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1580086
                                      Start date and time:2024-12-23 21:49:07 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 45s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:PARATRANSFARI REMINDER.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@8/5@2/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 62
                                      • Number of non-executed functions: 266
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target RegSvcs.exe, PID 1520 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • VT rate limit hit for: PARATRANSFARI REMINDER.exe
                                      TimeTypeDescription
                                      15:50:23API Interceptor215x Sleep call for process: RegSvcs.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      132.226.8.169F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      CITAS_pif.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      conferma..exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      file.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      reallyfreegeoip.orgMT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 104.21.67.152
                                      Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                      • 172.67.177.134
                                      rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                      • 172.67.177.134
                                      Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                      • 172.67.177.134
                                      Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 104.21.67.152
                                      YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                      • 172.67.177.134
                                      PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 104.21.67.152
                                      PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 172.67.177.134
                                      Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 104.21.67.152
                                      checkip.dyndns.comMT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 193.122.130.0
                                      Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                      • 193.122.130.0
                                      rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                      • 193.122.130.0
                                      Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                      • 158.101.44.242
                                      Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                      • 158.101.44.242
                                      Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                      • 158.101.44.242
                                      YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                      • 193.122.6.168
                                      PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 132.226.247.73
                                      PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 193.122.6.168
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUShttps://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                      • 172.67.74.152
                                      Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                      • 104.18.20.226
                                      Play Aud.htmlGet hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
                                      • 104.18.35.227
                                      Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                      • 104.20.87.8
                                      vFile__0054seconds__Airborn.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      https://jkqbjwq.maxiite.comGet hashmaliciousUnknownBrowse
                                      • 104.16.123.96
                                      [External] 120112 Manual Policies Overview Guide_ 8VM8-WZPT3L-LYH1.emlGet hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      https://jkqbjwq.maxiite.comGet hashmaliciousHTMLPhisherBrowse
                                      • 172.66.43.2
                                      https://qulatrics.com/Get hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      UTMEMUSInvoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 132.226.247.73
                                      F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                      • 132.226.8.169
                                      D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                      • 132.226.247.73
                                      0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 132.226.247.73
                                      sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 132.240.253.211
                                      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 132.244.23.61
                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 132.226.8.169
                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                      • 132.226.247.73
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      54328bd36c14bd82ddaa0c04b25ed9adMT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 104.21.67.152
                                      Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                      • 104.21.67.152
                                      Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                      • 104.21.67.152
                                      Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 104.21.67.152
                                      YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.67.152
                                      PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 104.21.67.152
                                      No context
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1039
                                      Entropy (8bit):5.353332853270839
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                                      MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                                      SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                                      SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                                      SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                                      Process:C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):133632
                                      Entropy (8bit):6.883236208601841
                                      Encrypted:false
                                      SSDEEP:3072:fUGkdZZSOXHLxDGgxrNBFhmcfs7QnbdL2klNYdbmVeytxVnvCE/i+mMjUo4FIfAZ:fUHvcgeKnnvtqcWgg
                                      MD5:670AD47C5A67F2239FE57CB7270E6526
                                      SHA1:2F5E0FE7E894DC25BAD628198A6BA3E8ED0CA286
                                      SHA-256:FC828B5CDDC402D4C9BFB9473AD1766F28A57CB03E45A949107053645D6992D0
                                      SHA-512:CED6E1341EFF7E6506B74F0CB8F5A58B7DCE06BE3EBCAAF4D3A9EBC7070E473165111F429E878DA5FE08697B48CE4818831D8BF030E4D0D03DED3A390029C075
                                      Malicious:false
                                      Reputation:low
                                      Preview:...2SCUC2GSG..UE.N2PCUC6.SGTEUEIN2PCUC6GSGTEUEIN2PCUC6GSGTEU.IN2^\.M6.Z.u.T..of8*&cF5< &$8e*/\>,!cT"s5!+u,'nv..u.Y#6iYH_aIN2PCUCf.SG.DVE.c.6CUC6GSGT.UGHE3.CU.7GSSTEUEIN.BAUC.GSGtGUEI.2PcUC6ESGPEUEIN2PGUC6GSGTE5GIN0PCUC6GQG..UEYN2@CUC6WSGDEUEIN2@CUC6GSGTEUE.\0P.UC6GsET.EEIN2PCUC6GSGTEUEIN2.AUO6GSGTEUEIN2PCUC6GSGTEUEIN2PCUC6GSGTEUEIN2PCUC6GSGTEUeIN:PCUC6GSGTEUMiN2.CUC6GSGTEUEg:W(7UC6..FTEuEIN.QCUA6GSGTEUEIN2PCUc6G3i&6'&IN2.SUC6gQGTWUEI.3PCUC6GSGTEUEI.2P.{1S+<$TEYEIN2.AUC4GSG\GUEIN2PCUC6GSG.EU.IN2PCUC6GSGTEUEI. RCUC6G.GTEWELN.qBUO.GSDTEU.IN4.cTC.GSGTEUEIN2PCUC6GSGTEUEIN2PCUC6GSGTEUEIN2PCU.K.\..<6.2PCUC6FQDPC]MIN2PCUC69SGT.UEI.2PCbC6GvGTE8EIN.PCU=6GS9TEU!IN2"CUCWGSG.EUE&N2P-UC69SGT[WmiN2ZisC4orGTOUo.=.PC_.7GSC'fUEC.0PCQ0.GSM.FUEM=.PC_.2GSC'cUEC.7PCQilGP.BCUER!.PC_C5.FATENooN0xyUC<GyaTF.PON2KiwC4.ZGTA..:S2PE}.6GY3]EUG.D2PG.]4o.GTO.g7^2PG~C.e-VTEQnId..QUC2lSmv;FEIJ.Piw="GSC.E.[K.&PCQi.9FGTA~EclLFCUG.Gye*RUEMe2z]W.!GSC~C.'I<.LC%@Y.SGRm.EID.0CUE6miG*eUEML].CUI.m.GVmVDID2R@(u6GWEP8bEIJ..CW8.G
                                      Process:C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):15016
                                      Entropy (8bit):7.580050133799729
                                      Encrypted:false
                                      SSDEEP:384:M9/RwgFdNQgZsxLOxw37junLf4vg72MHwob6g3xGThQ/:MR/fQgOOQfgs62wp5J
                                      MD5:AEE9E0F4D81212B9B569D56CD96116F8
                                      SHA1:6F971D04B6D5F54425FBDA94DC09438E0C69D67F
                                      SHA-256:8D57A899E04C2DD00BE749BB22D99020D34BC8FFB5C698B66E172964D6836C1D
                                      SHA-512:AD1070246356770A421AE7AC9C0F0297EC067311608E7450C512F2997909ACA390FAF2BE1DA39D70DC93B12B88DB5CB0D933E127E9E15828C5119597F5E33D05
                                      Malicious:false
                                      Reputation:low
                                      Preview:EA06.....Zo.........SP.n......5e...`.....|....T...3...(.6&.....9vp.=...G.....7@..9......$..k...........c}V.....?.P...p...Y@Q?.{..'..c.D.&.N. .'.9e.D.&`...D..' ...D...s...D...S.(......sP...h...M.Q?.y..G.c.D....Q.......O......60..........vh...0.7..!.....)^...t.C........$..C......l>[......!....|.0...&d.....Hz..a....l?..uo.....P......V0....j......|......l.....A.?.. Bg.8.l.E..Ed.L...?.. Bg.....Y..>@.............@..'.....8|.?..u.........l. O..]e...O..!e...& ....#s.......3.Y....9.......9..M.7?............l?...F..........C7....g .........x2..8.a...?..j..+4.....W?..j....Y..M. ?.0....Q...d}S0{.......M.".@...Z........V....n.....Q>...'.N...r..(.-........0W.........(....... 6..p.....6zh......?.....O8....lCN....i..?..8}@L..E.i.....61...f#q....>.N....4..M.Q?.q.........D..0N..V.A..M.>K0i..d.h.&...%.Y...|.*..<..aw.].3c..H.@B?...G..1...' ....k|.A.O..#.....}V`....#..H|.P!..d....0z....Y..>K..G.*/....G.7c.H..b....W..1....?.01..b.!...@.?..o.F|....p9......S.!..nb.!....zb0..
                                      Process:C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):87720
                                      Entropy (8bit):7.912040740665648
                                      Encrypted:false
                                      SSDEEP:1536:WUzL4ovoJ+0FMXm0Xci3dUVpwet8A8e7/t5/4mg9c1citARrj3rF9+9VZHrTnJ:1zLYJ+0FF0MOUVpwetOKtZ4P9di48/Zh
                                      MD5:1C3B0D6A24957F0B799A5DBC124194C8
                                      SHA1:5D9009FB19D1A6287C0F20BA10D028D98A5003A6
                                      SHA-256:F9D856CE653AD92189D907AD24BFD5E5D38D405C8C59D1B9CC24D9317EA6685A
                                      SHA-512:5E1E2150D7622B9B16FB1235E45FA3F74876C6D43F042B6088D7F0AC4519F2D3CA287EA74279F2F3AD7CBB0ED329BD6FEE7D9CFD2BF7D708326D861B6FCAC431
                                      Malicious:false
                                      Reputation:low
                                      Preview:EA06.....D..*...C.Q.t}^.E..U...m....Z......8......+..}6m.b...'.o.N%Rk..k<.I...,._\.K$6:...5....=....]e....Y.W. .y.@.tx...E.X..`..ij.zE.g...v.z=N...e..U.......<.L..0..S...%.G....I.L.)qQ..8.Z-f.2....z....[....x..B.....NU....Pj......?..i....m4.`...y.^Q7..4z.5R.u.<8...V.......y..M6.....L....h.J....<|.!...1...J....i....x.Q.%..............}...*.Ze;eq.Ui.z=N..<u)4.b.T..?.../w\......b.=.5F.P..i.......0.LP.@........`..z..N@....i".-*..DL.h..............i.......O.....B._...9=..E......%G..z.j...=... [..Oc..f....G.nhT:...!....9..A.Qi..}:ax..hs.=..T.j...t.i...z...A...U9.B.}.M....v.U..h.N...4...!...o^../.8.[V.Qj6.M.!........;.Qi4..B.w..!....[.....RsF.Z/.[...F..h..=..*..Z.Y..W..@.K...'..!t....Y....+o.I.F...d..i.....2....i1.l6.V....$.@.]f.z...8..<..5..8..%...V.O.L/.*...Y.[m..db.0.............uZ...Th..X..6....+of.V..*.j...#.ZeT*...3..a....b.:..4..^.Z.h.j4.QI.M.VZ..k:...nP.=Qe....Xj.._8....... ..@..x..d.T.....x...z4....f....ff.9.d.x..j.....@.N..MK...%.D..q..
                                      Process:C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe
                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                      Category:dropped
                                      Size (bytes):172054
                                      Entropy (8bit):3.1808056039274404
                                      Encrypted:false
                                      SSDEEP:48:sb3feqfCpfS6ftqfA0f9fWf9fZ1fi20fq0fFfY6fofi51fK0fi0fCfZ1fK0f70f1:iaNhCHcZLfaDfJQNy7HaPRCkJ0FZIklX
                                      MD5:576E98A040D48134C692B7E435EA8EA0
                                      SHA1:090BED4664A92142D4306A7AF73B4049FE86ACD0
                                      SHA-256:BB22880EA5D017D0778B0CE950B9C322D407F463FA5C7A7EF1299AAA18B5646C
                                      SHA-512:659F76B11CC0DFB65761DCE1E705884A44BFA6DD74AB6FC521FCEA92A461D331D3222568F658441A23EC78E5116A1AF32AE24CA2229E9E16640AC80BD9B0D97D
                                      Malicious:false
                                      Preview:hixjs0hixjsxhixjs5hixjs5hixjs8hixjsbhixjsehixjschixjs8hixjs1hixjsehixjschixjschixjschixjs0hixjs2hixjs0hixjs0hixjs0hixjs0hixjs5hixjs6hixjs5hixjs7hixjsbhixjs8hixjs6hixjsbhixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjs4hixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjs6hixjsbhixjsahixjs7hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjs8hixjsbhixjs8hixjs6hixjsehixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjsahixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjschixjsbhixjsahixjs6hixjschixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjsehixjsbhixjs8hixjs3hixjs3hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs9hixjs0hixjsbhixjs9hixjs3hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixj
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.878654092976613
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:PARATRANSFARI REMINDER.exe
                                      File size:982'528 bytes
                                      MD5:7d142eb549dacdfc9c357f482d5bf921
                                      SHA1:57ef6110732b2d91f90c785a3fbba4a0112cdc87
                                      SHA256:36b641ba0f1f45fc6bb9c6fb4f74b2a07318b5f4a420d9fbe9b59e1ac2ce3bc4
                                      SHA512:77d59910817caeaa0f8b10d46fb9cf849784d98550040fa6c97a65cbc5a13207f8e8c83edc60608ff5ffba61061704ca5ecfe8c7f01961ddd5dfc987994e26b1
                                      SSDEEP:12288:yCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBga1Tc4lB6e8X:yCdxte/80jYLT3U1jfsWahT76bzZJoQ
                                      TLSH:2025AE2273DDC370CB669173BF69B7016EBF78614630B85B2F880D7DA950162262DB63
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                      Icon Hash:aaf3e3e3938382a0
                                      Entrypoint:0x427f4a
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x67695419 [Mon Dec 23 12:14:17 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                                      Instruction
                                      call 00007F23B07C612Dh
                                      jmp 00007F23B07B8EF4h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push edi
                                      push esi
                                      mov esi, dword ptr [esp+10h]
                                      mov ecx, dword ptr [esp+14h]
                                      mov edi, dword ptr [esp+0Ch]
                                      mov eax, ecx
                                      mov edx, ecx
                                      add eax, esi
                                      cmp edi, esi
                                      jbe 00007F23B07B907Ah
                                      cmp edi, eax
                                      jc 00007F23B07B93DEh
                                      bt dword ptr [004C31FCh], 01h
                                      jnc 00007F23B07B9079h
                                      rep movsb
                                      jmp 00007F23B07B938Ch
                                      cmp ecx, 00000080h
                                      jc 00007F23B07B9244h
                                      mov eax, edi
                                      xor eax, esi
                                      test eax, 0000000Fh
                                      jne 00007F23B07B9080h
                                      bt dword ptr [004BE324h], 01h
                                      jc 00007F23B07B9550h
                                      bt dword ptr [004C31FCh], 00000000h
                                      jnc 00007F23B07B921Dh
                                      test edi, 00000003h
                                      jne 00007F23B07B922Eh
                                      test esi, 00000003h
                                      jne 00007F23B07B920Dh
                                      bt edi, 02h
                                      jnc 00007F23B07B907Fh
                                      mov eax, dword ptr [esi]
                                      sub ecx, 04h
                                      lea esi, dword ptr [esi+04h]
                                      mov dword ptr [edi], eax
                                      lea edi, dword ptr [edi+04h]
                                      bt edi, 03h
                                      jnc 00007F23B07B9083h
                                      movq xmm1, qword ptr [esi]
                                      sub ecx, 08h
                                      lea esi, dword ptr [esi+08h]
                                      movq qword ptr [edi], xmm1
                                      lea edi, dword ptr [edi+08h]
                                      test esi, 00000007h
                                      je 00007F23B07B90D5h
                                      bt esi, 03h
                                      Programming Language:
                                      • [ASM] VS2013 build 21005
                                      • [ C ] VS2013 build 21005
                                      • [C++] VS2013 build 21005
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      • [ASM] VS2013 UPD5 build 40629
                                      • [RES] VS2013 build 21005
                                      • [LNK] VS2013 UPD5 build 40629
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x27578.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x7130.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x8dd2e0x8de00c2c2260508750422d20cd5cbb116b146False0.5729952505506608data6.675875439961112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x8f0000x2e10e0x2e2004513b58651e3d8d87c81a396e5b2f1d1False0.3353340955284553OpenPGP Public Key5.760731648769018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xbe0000x8f740x5200c2de4a3d214eae7e87c7bfc06bd79775False0.1017530487804878data1.1988106744719143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xc70000x275780x276008c4f20cb383359fb2740a601605c1650False0.833048115079365data7.637218589138136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xef0000x71300x72001254908a9a03d2bcf12045d49cd572b9False0.7703536184210527data6.782377328042204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                      RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                      RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                      RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                      RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                      RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                      RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                      RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                      RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                      RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                      RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                      RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                      RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                      RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                      RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                      RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                      RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                      RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                      RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                      RT_RCDATA0xcf7b80x1e83edata1.0003680294423554
                                      RT_GROUP_ICON0xedff80x76dataEnglishGreat Britain0.6610169491525424
                                      RT_GROUP_ICON0xee0700x14dataEnglishGreat Britain1.25
                                      RT_GROUP_ICON0xee0840x14dataEnglishGreat Britain1.15
                                      RT_GROUP_ICON0xee0980x14dataEnglishGreat Britain1.25
                                      RT_VERSION0xee0ac0xdcdataEnglishGreat Britain0.6181818181818182
                                      RT_MANIFEST0xee1880x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                      DLLImport
                                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                      PSAPI.DLLGetProcessMemoryInfo
                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                      UxTheme.dllIsThemeActive
                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishGreat Britain
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-23T21:50:21.215308+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.8.16980TCP
                                      2024-12-23T21:50:24.668403+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.8.16980TCP
                                      2024-12-23T21:50:26.292911+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549720104.21.67.152443TCP
                                      2024-12-23T21:50:28.871550+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549726132.226.8.16980TCP
                                      2024-12-23T21:50:30.546086+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549734104.21.67.152443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 23, 2024 21:50:08.112510920 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:08.232198954 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:08.232495070 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:08.233865023 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:08.353511095 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:17.637733936 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:17.641860962 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:17.761907101 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:21.164144039 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:21.215307951 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:21.396969080 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:21.397025108 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:21.397100925 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:21.424149990 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:21.424165964 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:22.684400082 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:22.684472084 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:22.704739094 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:22.704757929 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:22.705821991 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:22.746526957 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:22.786590099 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:22.827334881 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:23.121548891 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:23.121607065 CET44349706104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:23.121674061 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:23.155263901 CET49706443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:23.159275055 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:23.279279947 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:24.628221035 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:24.630983114 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:24.631026030 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:24.631190062 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:24.631480932 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:24.631496906 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:24.668402910 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:25.842658043 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:25.869134903 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:25.869172096 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:26.292953014 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:26.293029070 CET44349720104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:26.293133020 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:26.293716908 CET49720443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:26.296900988 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:26.298132896 CET4972680192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:26.417155981 CET8049704132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:26.417217016 CET4970480192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:26.417777061 CET8049726132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:26.417923927 CET4972680192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:26.418044090 CET4972680192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:26.537578106 CET8049726132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:28.828382015 CET8049726132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:28.862555027 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:28.862584114 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:28.862669945 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:28.866195917 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:28.866215944 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:28.871550083 CET4972680192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:30.078000069 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:30.086370945 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:30.086393118 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:30.546106100 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:30.546349049 CET44349734104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:30.546472073 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:30.547034025 CET49734443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:30.551318884 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:30.670823097 CET8049735132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:30.670897961 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:30.671032906 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:30.790524006 CET8049735132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:35.078701973 CET8049735132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:35.093664885 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:35.121584892 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:35.213968039 CET8049751132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:35.214075089 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:35.214420080 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:35.333955050 CET8049751132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:36.699930906 CET8049751132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:36.700398922 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:36.701158047 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:36.701194048 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:36.701263905 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:36.701492071 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:36.701504946 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:36.746535063 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:36.820378065 CET8049735132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:36.820447922 CET4973580192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.156951904 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:38.171586037 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:38.171619892 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:38.628062963 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:38.628120899 CET44349752104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:38.628209114 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:38.628752947 CET49752443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:38.632405996 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.633661032 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.753305912 CET8049751132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:38.753365993 CET4975180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.753420115 CET8049758132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:38.753530025 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.753669024 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:38.873116970 CET8049758132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:43.162993908 CET8049758132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:43.167542934 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:43.215305090 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:43.287187099 CET8049769132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:43.287262917 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:43.287388086 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:43.406830072 CET8049769132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:44.688441038 CET8049769132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:44.689646006 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:44.689692974 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:44.689754009 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:44.690005064 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:44.690021992 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:44.690066099 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:44.730930090 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:44.821005106 CET8049758132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:44.821070910 CET4975880192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:45.917964935 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:45.919612885 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:45.919656992 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:46.368644953 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:46.368729115 CET44349775104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:46.368876934 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:46.369189978 CET49775443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:46.372195959 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:46.373672962 CET4978180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:46.492909908 CET8049769132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:46.493051052 CET4976980192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:46.493204117 CET8049781132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:46.493334055 CET4978180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:46.493432999 CET4978180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:46.613588095 CET8049781132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:49.083175898 CET8049781132.226.8.169192.168.2.5
                                      Dec 23, 2024 21:50:49.101982117 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:49.102016926 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:49.102086067 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:49.106575012 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:49.106586933 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:49.137185097 CET4978180192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:50.322000980 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:50.324403048 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:50.324426889 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:50.774348974 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:50.774418116 CET44349787104.21.67.152192.168.2.5
                                      Dec 23, 2024 21:50:50.774477005 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:50.774954081 CET49787443192.168.2.5104.21.67.152
                                      Dec 23, 2024 21:50:50.919785976 CET4972680192.168.2.5132.226.8.169
                                      Dec 23, 2024 21:50:50.920523882 CET4978180192.168.2.5132.226.8.169
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 23, 2024 21:50:07.893526077 CET6332253192.168.2.51.1.1.1
                                      Dec 23, 2024 21:50:08.030791998 CET53633221.1.1.1192.168.2.5
                                      Dec 23, 2024 21:50:21.251524925 CET6511753192.168.2.51.1.1.1
                                      Dec 23, 2024 21:50:21.395833015 CET53651171.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 23, 2024 21:50:07.893526077 CET192.168.2.51.1.1.10x253bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:21.251524925 CET192.168.2.51.1.1.10x94b4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:08.030791998 CET1.1.1.1192.168.2.50x253bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:21.395833015 CET1.1.1.1192.168.2.50x94b4No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                      Dec 23, 2024 21:50:21.395833015 CET1.1.1.1192.168.2.50x94b4No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                      • reallyfreegeoip.org
                                      • checkip.dyndns.org
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549704132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:08.233865023 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:17.637733936 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:17 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                      Dec 23, 2024 21:50:17.641860962 CET127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Dec 23, 2024 21:50:21.164144039 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:20 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                      Dec 23, 2024 21:50:23.159275055 CET127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Dec 23, 2024 21:50:24.628221035 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:24 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.549726132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:26.418044090 CET127OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Dec 23, 2024 21:50:28.828382015 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:28 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.549735132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:30.671032906 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:35.078701973 CET697INHTTP/1.1 504 Gateway Time-out
                                      Date: Mon, 23 Dec 2024 20:50:34 GMT
                                      Content-Type: text/html
                                      Content-Length: 557
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                      Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.549751132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:35.214420080 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:36.699930906 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:36 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.549758132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:38.753669024 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:43.162993908 CET697INHTTP/1.1 504 Gateway Time-out
                                      Date: Mon, 23 Dec 2024 20:50:42 GMT
                                      Content-Type: text/html
                                      Content-Length: 557
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                      Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.549769132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:43.287388086 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:44.688441038 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:44 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.549781132.226.8.169801520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 23, 2024 21:50:46.493432999 CET151OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      Dec 23, 2024 21:50:49.083175898 CET273INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:48 GMT
                                      Content-Type: text/html
                                      Content-Length: 104
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549706104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:22 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-12-23 20:50:23 UTC860INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:22 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301812
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jUQsqmc0hQBvrVz7N0irAI0RfP6KlPzm%2BYmUN84LsUds4A%2BTBSnM0K1rUITR5zDX%2BYuCDVekOps944L%2BL2xvb7A%2BzfaFIJWgEc1nFhtdfYkJoD7SniyfdX8I4HJT54aQv8NGEg%2FH"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b393d6b4c440c-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1609&min_rtt=1603&rtt_var=613&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1768625&cwnd=252&unsent_bytes=0&cid=0bf56ef95d6884a3&ts=469&x=0"
                                      2024-12-23 20:50:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.549720104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:25 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      2024-12-23 20:50:26 UTC854INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:26 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301815
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jYlTeikl31vHxwIKY%2FlSLYttXN26UFzQY77I6cRo8GKe8KDvfoUYUoO%2FQIa8ZwyiUIE3wGTBvZnigc1H6usnOT%2FSWtNH3RT73SDhDhCnNjVXk46W5WaBT3iyVdxE7aRslCxAxmfb"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b39513f2c424c-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1645&min_rtt=1605&rtt_var=630&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1819314&cwnd=227&unsent_bytes=0&cid=1ccbdebf821d386e&ts=454&x=0"
                                      2024-12-23 20:50:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.549734104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:30 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      2024-12-23 20:50:30 UTC860INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:30 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301819
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u2EfjKMxiFWfKcHNZzOKjEGxgy2aOQLCt%2FFl7f%2Bg4naj5ADDoxIlQ1wA2rKuA%2BZd0jjOtiRtH%2BN3ZvuypRJCVWA9zbvQzs8sZJXFlg%2BI4PlUhVZZ%2BPtYJx9EeKw9rGw25v7Gl9DQ"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b396bbd1defa5-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1778&min_rtt=1774&rtt_var=673&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1616832&cwnd=200&unsent_bytes=0&cid=d66dae66181b6aaa&ts=456&x=0"
                                      2024-12-23 20:50:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.549752104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:38 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-12-23 20:50:38 UTC856INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:38 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301827
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xyn9AILSXS8%2BTT0kXHQbqE8dGp860G1xZVb9VQKIrpjvljFiJuFMugp%2B98GTKMitKtn54XbYEr%2BvpZGTPy0njzehTwJdhSgG00EhWjB5X8Kbr474nH8wtC3GLSduib%2Bz7gop33Hp"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b399e3d8c42cd-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1648&min_rtt=1631&rtt_var=646&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1649717&cwnd=242&unsent_bytes=0&cid=d44cec9c71f7d6b3&ts=715&x=0"
                                      2024-12-23 20:50:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.549775104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:45 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-12-23 20:50:46 UTC852INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:46 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301835
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5ZNkciMIkwsYoRsUtqNoWso%2BNRxOB5quz4WU9EM1jyzADPmUFXK2cIZ9f3iGHqyBRzvxBHXiFZTrsNjJeap%2FpFBnaZFLp4XQcIbP0l5RdvW6q9hU8KnNUFXDIGklqS1x1AaHmXPg"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b39ceb8ad42a0-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1605&min_rtt=1600&rtt_var=610&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1777236&cwnd=225&unsent_bytes=0&cid=3fbb6d1f2bdb2092&ts=457&x=0"
                                      2024-12-23 20:50:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.549787104.21.67.1524431520C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-23 20:50:50 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                      Host: reallyfreegeoip.org
                                      Connection: Keep-Alive
                                      2024-12-23 20:50:50 UTC860INHTTP/1.1 200 OK
                                      Date: Mon, 23 Dec 2024 20:50:50 GMT
                                      Content-Type: text/xml
                                      Content-Length: 362
                                      Connection: close
                                      Age: 301839
                                      Cache-Control: max-age=31536000
                                      cf-cache-status: HIT
                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qoCvAuBgSq21MK5%2BXMrk8higC%2FsC2D2EpdBgSmPGKOvYZAQQJmrNb08LpPFcKLzRRXYPObsDttTa%2BPRLpoP4pQeGPY028rgzRIlkaA4C77F%2B6RsZa5fW4lvB9f3f%2FzKbS8hwd%2Fe9"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f6b39ea3e090f90-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1470&min_rtt=1455&rtt_var=576&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1852791&cwnd=109&unsent_bytes=0&cid=213730d1bee17813&ts=458&x=0"
                                      2024-12-23 20:50:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:15:50:05
                                      Start date:23/12/2024
                                      Path:C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"
                                      Imagebase:0xee0000
                                      File size:982'528 bytes
                                      MD5 hash:7D142EB549DACDFC9C357F482D5BF921
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2112733507.0000000003AA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:15:50:06
                                      Start date:23/12/2024
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\PARATRANSFARI REMINDER.exe"
                                      Imagebase:0x9e0000
                                      File size:45'984 bytes
                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.2543834958.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2544810443.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:15:50:50
                                      Start date:23/12/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:15:50:50
                                      Start date:23/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:15:50:50
                                      Start date:23/12/2024
                                      Path:C:\Windows\SysWOW64\choice.exe
                                      Wow64 process (32bit):true
                                      Commandline:choice /C Y /N /D Y /T 3
                                      Imagebase:0xb20000
                                      File size:28'160 bytes
                                      MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4.1%
                                        Dynamic/Decrypted Code Coverage:1.3%
                                        Signature Coverage:5.7%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:170
                                        execution_graph 97497 eeb56e 97504 effac4 97497->97504 97499 eeb584 97513 eec707 97499->97513 97501 eeb5ac 97503 eea4e8 97501->97503 97525 f49ed4 89 API calls 4 library calls 97501->97525 97505 effae2 97504->97505 97506 effad0 97504->97506 97507 effae8 97505->97507 97508 effb11 97505->97508 97526 ee9e9c 60 API calls Mailbox 97506->97526 97527 f00f36 97507->97527 97537 ee9e9c 60 API calls Mailbox 97508->97537 97512 effada 97512->97499 97515 eec72c _wcscmp 97513->97515 97566 ee7b76 97513->97566 97519 eec760 Mailbox 97515->97519 97571 ee7f41 97515->97571 97519->97501 97522 f21a06 97524 f21a0a Mailbox 97522->97524 97585 ee9e9c 60 API calls Mailbox 97522->97585 97524->97501 97525->97503 97526->97512 97530 f00f3e 97527->97530 97529 f00f58 97529->97512 97530->97529 97532 f00f5c std::exception::exception 97530->97532 97538 f0588c 97530->97538 97555 f03521 DecodePointer 97530->97555 97556 f0871b RaiseException 97532->97556 97534 f00f86 97557 f08651 58 API calls _free 97534->97557 97536 f00f98 97536->97512 97537->97512 97539 f05907 97538->97539 97551 f05898 97538->97551 97564 f03521 DecodePointer 97539->97564 97541 f0590d 97565 f08ca8 58 API calls __getptd_noexit 97541->97565 97544 f058cb RtlAllocateHeap 97544->97551 97554 f058ff 97544->97554 97546 f058f3 97562 f08ca8 58 API calls __getptd_noexit 97546->97562 97550 f058a3 97550->97551 97558 f0a2eb 58 API calls __NMSG_WRITE 97550->97558 97559 f0a348 58 API calls 6 library calls 97550->97559 97560 f0321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97550->97560 97551->97544 97551->97546 97551->97550 97552 f058f1 97551->97552 97561 f03521 DecodePointer 97551->97561 97563 f08ca8 58 API calls __getptd_noexit 97552->97563 97554->97530 97555->97530 97556->97534 97557->97536 97558->97550 97559->97550 97561->97551 97562->97552 97563->97554 97564->97541 97565->97554 97567 f00f36 Mailbox 59 API calls 97566->97567 97568 ee7b9b 97567->97568 97586 ee8189 97568->97586 97572 ee7f50 __NMSG_WRITE _memmove 97571->97572 97573 f00f36 Mailbox 59 API calls 97572->97573 97574 ee7f8e 97573->97574 97575 ee7c8e 97574->97575 97576 f1efc4 97575->97576 97577 ee7ca0 97575->97577 97595 f37f03 59 API calls _memmove 97576->97595 97589 ee7bb1 97577->97589 97580 ee7cac 97584 ee859a 68 API calls 97580->97584 97581 f1efce 97596 ee81a7 97581->97596 97583 f1efd6 Mailbox 97584->97522 97585->97524 97587 f00f36 Mailbox 59 API calls 97586->97587 97588 ee7baa 97587->97588 97588->97515 97590 ee7bbf 97589->97590 97591 ee7be5 _memmove 97589->97591 97590->97591 97592 f00f36 Mailbox 59 API calls 97590->97592 97591->97580 97591->97591 97593 ee7c34 97592->97593 97594 f00f36 Mailbox 59 API calls 97593->97594 97594->97591 97595->97581 97597 ee81ba 97596->97597 97598 ee81b2 97596->97598 97597->97583 97600 ee80d7 59 API calls 2 library calls 97598->97600 97600->97597 97601 f07dd3 97602 f07ddf __ioinit 97601->97602 97638 f09f88 GetStartupInfoW 97602->97638 97604 f07de4 97640 f08cfc GetProcessHeap 97604->97640 97606 f07e3c 97607 f07e47 97606->97607 97723 f07f23 58 API calls 3 library calls 97606->97723 97641 f09c66 97607->97641 97610 f07e4d 97611 f07e58 __RTC_Initialize 97610->97611 97724 f07f23 58 API calls 3 library calls 97610->97724 97662 f0d752 97611->97662 97614 f07e67 97615 f07e73 GetCommandLineW 97614->97615 97725 f07f23 58 API calls 3 library calls 97614->97725 97681 f150a3 GetEnvironmentStringsW 97615->97681 97619 f07e72 97619->97615 97621 f07e8d 97622 f07e98 97621->97622 97726 f03235 58 API calls 3 library calls 97621->97726 97691 f14ed8 97622->97691 97625 f07e9e 97626 f07ea9 97625->97626 97727 f03235 58 API calls 3 library calls 97625->97727 97705 f0326f 97626->97705 97629 f07eb1 97630 f07ebc __wwincmdln 97629->97630 97728 f03235 58 API calls 3 library calls 97629->97728 97711 ee492e 97630->97711 97633 f07ed0 97634 f07edf 97633->97634 97729 f034d8 58 API calls _doexit 97633->97729 97730 f03260 58 API calls _doexit 97634->97730 97637 f07ee4 __ioinit 97639 f09f9e 97638->97639 97639->97604 97640->97606 97731 f03307 36 API calls 2 library calls 97641->97731 97643 f09c6b 97732 f09ebc InitializeCriticalSectionAndSpinCount __ioinit 97643->97732 97645 f09c70 97646 f09c74 97645->97646 97734 f09f0a TlsAlloc 97645->97734 97733 f09cdc 61 API calls 2 library calls 97646->97733 97649 f09c86 97649->97646 97651 f09c91 97649->97651 97650 f09c79 97650->97610 97735 f08955 97651->97735 97654 f09cd3 97743 f09cdc 61 API calls 2 library calls 97654->97743 97657 f09cb2 97657->97654 97659 f09cb8 97657->97659 97658 f09cd8 97658->97610 97742 f09bb3 58 API calls 4 library calls 97659->97742 97661 f09cc0 GetCurrentThreadId 97661->97610 97663 f0d75e __ioinit 97662->97663 97755 f09d8b 97663->97755 97665 f0d765 97666 f08955 __calloc_crt 58 API calls 97665->97666 97667 f0d776 97666->97667 97668 f0d7e1 GetStartupInfoW 97667->97668 97669 f0d781 __ioinit @_EH4_CallFilterFunc@8 97667->97669 97670 f0d925 97668->97670 97672 f0d7f6 97668->97672 97669->97614 97671 f0d9ed 97670->97671 97675 f0d972 GetStdHandle 97670->97675 97677 f0d985 GetFileType 97670->97677 97763 f09fab InitializeCriticalSectionAndSpinCount 97670->97763 97764 f0d9fd LeaveCriticalSection _doexit 97671->97764 97672->97670 97674 f08955 __calloc_crt 58 API calls 97672->97674 97676 f0d844 97672->97676 97674->97672 97675->97670 97676->97670 97678 f0d878 GetFileType 97676->97678 97762 f09fab InitializeCriticalSectionAndSpinCount 97676->97762 97677->97670 97678->97676 97682 f07e83 97681->97682 97683 f150b4 97681->97683 97687 f14c9b GetModuleFileNameW 97682->97687 97804 f0899d 58 API calls __malloc_crt 97683->97804 97685 f150da _memmove 97686 f150f0 FreeEnvironmentStringsW 97685->97686 97686->97682 97688 f14ccf _wparse_cmdline 97687->97688 97690 f14d0f _wparse_cmdline 97688->97690 97805 f0899d 58 API calls __malloc_crt 97688->97805 97690->97621 97692 f14ef1 __NMSG_WRITE 97691->97692 97696 f14ee9 97691->97696 97693 f08955 __calloc_crt 58 API calls 97692->97693 97701 f14f1a __NMSG_WRITE 97693->97701 97694 f14f71 97695 f02ed5 _free 58 API calls 97694->97695 97695->97696 97696->97625 97697 f08955 __calloc_crt 58 API calls 97697->97701 97698 f14f96 97700 f02ed5 _free 58 API calls 97698->97700 97700->97696 97701->97694 97701->97696 97701->97697 97701->97698 97702 f14fad 97701->97702 97806 f14787 58 API calls wcstoxq 97701->97806 97807 f08f46 IsProcessorFeaturePresent 97702->97807 97704 f14fb9 97704->97625 97706 f0327b __IsNonwritableInCurrentImage 97705->97706 97830 f0a651 97706->97830 97708 f03299 __initterm_e 97710 f032b8 _doexit __IsNonwritableInCurrentImage 97708->97710 97833 f02ec0 97708->97833 97710->97629 97712 ee49e7 97711->97712 97713 ee4948 97711->97713 97712->97633 97714 ee4982 IsThemeActive 97713->97714 97868 f034ec 97714->97868 97718 ee49ae 97880 ee4a5b SystemParametersInfoW SystemParametersInfoW 97718->97880 97720 ee49ba 97881 ee3b4c 97720->97881 97722 ee49c2 SystemParametersInfoW 97722->97712 97723->97607 97724->97611 97725->97619 97729->97634 97730->97637 97731->97643 97732->97645 97733->97650 97734->97649 97736 f0895c 97735->97736 97738 f08997 97736->97738 97740 f0897a 97736->97740 97744 f15376 97736->97744 97738->97654 97741 f09f66 TlsSetValue 97738->97741 97740->97736 97740->97738 97752 f0a2b2 Sleep 97740->97752 97741->97657 97742->97661 97743->97658 97745 f15381 97744->97745 97750 f1539c 97744->97750 97746 f1538d 97745->97746 97745->97750 97753 f08ca8 58 API calls __getptd_noexit 97746->97753 97748 f153ac HeapAlloc 97749 f15392 97748->97749 97748->97750 97749->97736 97750->97748 97750->97749 97754 f03521 DecodePointer 97750->97754 97752->97740 97753->97749 97754->97750 97756 f09d9c 97755->97756 97757 f09daf EnterCriticalSection 97755->97757 97765 f09e13 97756->97765 97757->97665 97759 f09da2 97759->97757 97789 f03235 58 API calls 3 library calls 97759->97789 97762->97676 97763->97670 97764->97669 97766 f09e1f __ioinit 97765->97766 97767 f09e40 97766->97767 97768 f09e28 97766->97768 97780 f09e61 __ioinit 97767->97780 97793 f0899d 58 API calls __malloc_crt 97767->97793 97790 f0a2eb 58 API calls __NMSG_WRITE 97768->97790 97771 f09e2d 97791 f0a348 58 API calls 6 library calls 97771->97791 97772 f09e55 97774 f09e6b 97772->97774 97775 f09e5c 97772->97775 97778 f09d8b __lock 58 API calls 97774->97778 97794 f08ca8 58 API calls __getptd_noexit 97775->97794 97776 f09e34 97792 f0321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97776->97792 97781 f09e72 97778->97781 97780->97759 97783 f09e97 97781->97783 97784 f09e7f 97781->97784 97796 f02ed5 97783->97796 97795 f09fab InitializeCriticalSectionAndSpinCount 97784->97795 97787 f09e8b 97802 f09eb3 LeaveCriticalSection _doexit 97787->97802 97790->97771 97791->97776 97793->97772 97794->97780 97795->97787 97797 f02ede RtlFreeHeap 97796->97797 97801 f02f07 _free 97796->97801 97798 f02ef3 97797->97798 97797->97801 97803 f08ca8 58 API calls __getptd_noexit 97798->97803 97800 f02ef9 GetLastError 97800->97801 97801->97787 97802->97780 97803->97800 97804->97685 97805->97690 97806->97701 97808 f08f51 97807->97808 97813 f08dd9 97808->97813 97812 f08f6c 97812->97704 97814 f08df3 _memset __call_reportfault 97813->97814 97815 f08e13 IsDebuggerPresent 97814->97815 97821 f0a2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 97815->97821 97818 f08efa 97820 f0a2c0 GetCurrentProcess TerminateProcess 97818->97820 97819 f08ed7 __call_reportfault 97822 f0c776 97819->97822 97820->97812 97821->97819 97823 f0c780 IsProcessorFeaturePresent 97822->97823 97824 f0c77e 97822->97824 97826 f15a8a 97823->97826 97824->97818 97829 f15a39 5 API calls 2 library calls 97826->97829 97828 f15b6d 97828->97818 97829->97828 97831 f0a654 EncodePointer 97830->97831 97831->97831 97832 f0a66e 97831->97832 97832->97708 97836 f02dc4 97833->97836 97835 f02ecb 97835->97710 97837 f02dd0 __ioinit 97836->97837 97844 f03397 97837->97844 97843 f02df7 __ioinit 97843->97835 97845 f09d8b __lock 58 API calls 97844->97845 97846 f02dd9 97845->97846 97847 f02e08 DecodePointer DecodePointer 97846->97847 97848 f02e35 97847->97848 97849 f02de5 97847->97849 97848->97849 97861 f08924 59 API calls wcstoxq 97848->97861 97858 f02e02 97849->97858 97851 f02e98 EncodePointer EncodePointer 97851->97849 97852 f02e6c 97852->97849 97856 f02e86 EncodePointer 97852->97856 97863 f089e4 61 API calls 2 library calls 97852->97863 97853 f02e47 97853->97851 97853->97852 97862 f089e4 61 API calls 2 library calls 97853->97862 97856->97851 97857 f02e80 97857->97849 97857->97856 97864 f033a0 97858->97864 97861->97853 97862->97852 97863->97857 97867 f09ef5 LeaveCriticalSection 97864->97867 97866 f02e07 97866->97843 97867->97866 97869 f09d8b __lock 58 API calls 97868->97869 97870 f034f7 DecodePointer EncodePointer 97869->97870 97933 f09ef5 LeaveCriticalSection 97870->97933 97872 ee49a7 97873 f03554 97872->97873 97874 f03578 97873->97874 97875 f0355e 97873->97875 97874->97718 97875->97874 97934 f08ca8 58 API calls __getptd_noexit 97875->97934 97877 f03568 97935 f08f36 9 API calls wcstoxq 97877->97935 97879 f03573 97879->97718 97880->97720 97882 ee3b59 __write_nolock 97881->97882 97936 ee77c7 97882->97936 97886 ee3b8c IsDebuggerPresent 97887 ee3b9a 97886->97887 97888 f1d3dd MessageBoxA 97886->97888 97889 ee3c73 97887->97889 97891 f1d3f7 97887->97891 97892 ee3bb7 97887->97892 97888->97891 97890 ee3c7a SetCurrentDirectoryW 97889->97890 97893 ee3c87 Mailbox 97890->97893 98160 ee7373 59 API calls Mailbox 97891->98160 98022 ee73e5 97892->98022 97893->97722 97897 f1d407 97901 f1d41d SetCurrentDirectoryW 97897->97901 97898 ee3bd5 GetFullPathNameW 98038 ee7d2c 97898->98038 97901->97893 97933->97872 97934->97877 97935->97879 97937 f00f36 Mailbox 59 API calls 97936->97937 97938 ee77e8 97937->97938 97939 f00f36 Mailbox 59 API calls 97938->97939 97940 ee3b63 GetCurrentDirectoryW 97939->97940 97941 ee3778 97940->97941 97942 ee77c7 59 API calls 97941->97942 97943 ee378e 97942->97943 98176 ee3d43 97943->98176 97945 ee37ac 97946 ee4864 61 API calls 97945->97946 97947 ee37c0 97946->97947 97948 ee7f41 59 API calls 97947->97948 97949 ee37cd 97948->97949 98190 ee4f3d 97949->98190 97952 ee37ee Mailbox 97956 ee81a7 59 API calls 97952->97956 97953 f1d2de 98257 f49604 97953->98257 97959 ee3801 97956->97959 97958 f02ed5 _free 58 API calls 97961 f1d30a 97958->97961 98214 ee93ea 97959->98214 97960 f1d2fd 97960->97958 97963 ee4faa 84 API calls 97961->97963 97965 f1d313 97963->97965 97969 ee3ee2 59 API calls 97965->97969 97966 ee7f41 59 API calls 97967 ee381a 97966->97967 98217 ee8620 97967->98217 97971 f1d32e 97969->97971 97970 ee382c Mailbox 97972 ee7f41 59 API calls 97970->97972 97973 ee3ee2 59 API calls 97971->97973 97974 ee3852 97972->97974 97976 f1d34a 97973->97976 97975 ee8620 69 API calls 97974->97975 97979 ee3861 Mailbox 97975->97979 97977 ee4864 61 API calls 97976->97977 97978 f1d36f 97977->97978 97980 ee3ee2 59 API calls 97978->97980 97982 ee77c7 59 API calls 97979->97982 97981 f1d37b 97980->97981 97983 ee81a7 59 API calls 97981->97983 97984 ee387f 97982->97984 97985 f1d389 97983->97985 98221 ee3ee2 97984->98221 97987 ee3ee2 59 API calls 97985->97987 97989 f1d398 97987->97989 97995 ee81a7 59 API calls 97989->97995 97991 ee3899 97991->97965 97992 ee38a3 97991->97992 97993 f0307d _W_store_winword 60 API calls 97992->97993 97994 ee38ae 97993->97994 97994->97971 97996 ee38b8 97994->97996 97998 f1d3ba 97995->97998 97997 f0307d _W_store_winword 60 API calls 97996->97997 98000 ee38c3 97997->98000 97999 ee3ee2 59 API calls 97998->97999 98001 f1d3c7 97999->98001 98000->97976 98002 ee38cd 98000->98002 98001->98001 98003 f0307d _W_store_winword 60 API calls 98002->98003 98004 ee38d8 98003->98004 98004->97989 98005 ee3919 98004->98005 98007 ee3ee2 59 API calls 98004->98007 98005->97989 98006 ee3926 98005->98006 98237 ee942e 98006->98237 98008 ee38fc 98007->98008 98011 ee81a7 59 API calls 98008->98011 98013 ee390a 98011->98013 98015 ee3ee2 59 API calls 98013->98015 98015->98005 98017 ee93ea 59 API calls 98019 ee3961 98017->98019 98018 ee9040 60 API calls 98018->98019 98019->98017 98019->98018 98020 ee3ee2 59 API calls 98019->98020 98021 ee39a7 Mailbox 98019->98021 98020->98019 98021->97886 98023 ee73f2 __write_nolock 98022->98023 98024 ee740b 98023->98024 98025 f1ed7b _memset 98023->98025 99126 ee48ae 98024->99126 98027 f1ed97 GetOpenFileNameW 98025->98027 98029 f1ede6 98027->98029 98031 ee7d2c 59 API calls 98029->98031 98033 f1edfb 98031->98033 98033->98033 98035 ee7429 99154 ee69ca 98035->99154 98039 ee7d38 __NMSG_WRITE 98038->98039 98040 ee7da5 98038->98040 98043 ee7d4e 98039->98043 98044 ee7d73 98039->98044 98160->97897 98177 ee3d50 __write_nolock 98176->98177 98178 ee7d2c 59 API calls 98177->98178 98184 ee3eb6 Mailbox 98177->98184 98180 ee3d82 98178->98180 98189 ee3db8 Mailbox 98180->98189 98298 ee7b52 98180->98298 98181 ee7b52 59 API calls 98181->98189 98182 ee3e89 98183 ee7f41 59 API calls 98182->98183 98182->98184 98186 ee3eaa 98183->98186 98184->97945 98185 ee7f41 59 API calls 98185->98189 98187 ee3f84 59 API calls 98186->98187 98187->98184 98189->98181 98189->98182 98189->98184 98189->98185 98301 ee3f84 98189->98301 98311 ee4d13 98190->98311 98195 ee4f68 LoadLibraryExW 98321 ee4cc8 98195->98321 98196 f1dc3f 98198 ee4faa 84 API calls 98196->98198 98200 f1dc46 98198->98200 98202 ee4cc8 3 API calls 98200->98202 98204 f1dc4e 98202->98204 98203 ee4f8f 98203->98204 98205 ee4f9b 98203->98205 98347 ee506b 98204->98347 98206 ee4faa 84 API calls 98205->98206 98209 ee37e6 98206->98209 98209->97952 98209->97953 98211 f1dc75 98355 ee5027 98211->98355 98213 f1dc82 98215 f00f36 Mailbox 59 API calls 98214->98215 98216 ee380d 98215->98216 98216->97966 98218 ee862b 98217->98218 98220 ee8652 98218->98220 98785 ee8b13 69 API calls Mailbox 98218->98785 98220->97970 98222 ee3eec 98221->98222 98223 ee3f05 98221->98223 98224 ee81a7 59 API calls 98222->98224 98225 ee7d2c 59 API calls 98223->98225 98226 ee388b 98224->98226 98225->98226 98227 f0307d 98226->98227 98228 f03089 98227->98228 98229 f030fe 98227->98229 98236 f030ae 98228->98236 98786 f08ca8 58 API calls __getptd_noexit 98228->98786 98788 f03110 60 API calls 3 library calls 98229->98788 98231 f0310b 98231->97991 98233 f03095 98787 f08f36 9 API calls wcstoxq 98233->98787 98235 f030a0 98235->97991 98236->97991 98238 ee9436 98237->98238 98239 f00f36 Mailbox 59 API calls 98238->98239 98240 ee9444 98239->98240 98241 ee3936 98240->98241 98789 ee935c 59 API calls Mailbox 98240->98789 98243 ee91b0 98241->98243 98790 ee92c0 98243->98790 98245 ee91bf 98246 f00f36 Mailbox 59 API calls 98245->98246 98247 ee3944 98245->98247 98246->98247 98248 ee9040 98247->98248 98249 f1f4d5 98248->98249 98256 ee9057 98248->98256 98249->98256 98800 ee8d3b 59 API calls Mailbox 98249->98800 98251 ee915f 98251->98019 98252 ee9158 98254 f00f36 Mailbox 59 API calls 98252->98254 98253 ee91a0 98799 ee9e9c 60 API calls Mailbox 98253->98799 98254->98251 98256->98251 98256->98252 98256->98253 98258 ee5045 85 API calls 98257->98258 98259 f49673 98258->98259 98801 f497dd 98259->98801 98262 ee506b 74 API calls 98263 f496a0 98262->98263 98264 ee506b 74 API calls 98263->98264 98265 f496b0 98264->98265 98266 ee506b 74 API calls 98265->98266 98267 f496cb 98266->98267 98268 ee506b 74 API calls 98267->98268 98269 f496e6 98268->98269 98270 ee5045 85 API calls 98269->98270 98271 f496fd 98270->98271 98272 f0588c __malloc_crt 58 API calls 98271->98272 98273 f49704 98272->98273 98274 f0588c __malloc_crt 58 API calls 98273->98274 98275 f4970e 98274->98275 98276 ee506b 74 API calls 98275->98276 98277 f49722 98276->98277 98278 f491b2 GetSystemTimeAsFileTime 98277->98278 98279 f49735 98278->98279 98280 f4975f 98279->98280 98281 f4974a 98279->98281 98283 f497c4 98280->98283 98284 f49765 98280->98284 98282 f02ed5 _free 58 API calls 98281->98282 98286 f49750 98282->98286 98285 f02ed5 _free 58 API calls 98283->98285 98807 f48baf 98284->98807 98290 f1d2f1 98285->98290 98288 f02ed5 _free 58 API calls 98286->98288 98288->98290 98290->97960 98292 ee4faa 98290->98292 98291 f02ed5 _free 58 API calls 98291->98290 98293 ee4fb4 98292->98293 98295 ee4fbb 98292->98295 98294 f05516 __fcloseall 83 API calls 98293->98294 98294->98295 98296 ee4fca 98295->98296 98297 ee4fdb FreeLibrary 98295->98297 98296->97960 98297->98296 98307 ee7faf 98298->98307 98300 ee7b5d 98300->98180 98302 ee3f92 98301->98302 98306 ee3fb4 _memmove 98301->98306 98304 f00f36 Mailbox 59 API calls 98302->98304 98303 f00f36 Mailbox 59 API calls 98305 ee3fc8 98303->98305 98304->98306 98305->98189 98306->98303 98308 ee7fc2 98307->98308 98310 ee7fbf _memmove 98307->98310 98309 f00f36 Mailbox 59 API calls 98308->98309 98309->98310 98310->98300 98360 ee4d61 98311->98360 98314 ee4d3a 98316 ee4d4a FreeLibrary 98314->98316 98317 ee4d53 98314->98317 98315 ee4d61 2 API calls 98315->98314 98316->98317 98318 f053cb 98317->98318 98364 f053e0 98318->98364 98320 ee4f5c 98320->98195 98320->98196 98522 ee4d94 98321->98522 98324 ee4cff FreeLibrary 98325 ee4d08 98324->98325 98328 ee4dd0 98325->98328 98326 ee4d94 2 API calls 98327 ee4ced 98326->98327 98327->98324 98327->98325 98329 f00f36 Mailbox 59 API calls 98328->98329 98330 ee4de5 98329->98330 98526 ee538e 98330->98526 98332 ee4df1 _memmove 98334 ee4ee9 98332->98334 98335 ee4f21 98332->98335 98338 ee4e2c 98332->98338 98333 ee5027 69 API calls 98344 ee4e35 98333->98344 98529 ee4fe9 CreateStreamOnHGlobal 98334->98529 98540 f499c4 95 API calls 98335->98540 98338->98333 98339 ee506b 74 API calls 98339->98344 98341 ee4ec9 98341->98203 98342 f1dc00 98343 ee5045 85 API calls 98342->98343 98345 f1dc14 98343->98345 98344->98339 98344->98341 98344->98342 98535 ee5045 98344->98535 98346 ee506b 74 API calls 98345->98346 98346->98341 98348 ee507d 98347->98348 98349 f1dd26 98347->98349 98564 f05752 98348->98564 98352 f491b2 98762 f49008 98352->98762 98354 f491c8 98354->98211 98356 f1dce9 98355->98356 98357 ee5036 98355->98357 98767 f05dd0 98357->98767 98359 ee503e 98359->98213 98361 ee4d2e 98360->98361 98362 ee4d6a LoadLibraryA 98360->98362 98361->98314 98361->98315 98362->98361 98363 ee4d7b GetProcAddress 98362->98363 98363->98361 98366 f053ec __ioinit 98364->98366 98365 f053ff 98413 f08ca8 58 API calls __getptd_noexit 98365->98413 98366->98365 98368 f05430 98366->98368 98383 f10668 98368->98383 98369 f05404 98414 f08f36 9 API calls wcstoxq 98369->98414 98372 f05435 98373 f0544b 98372->98373 98374 f0543e 98372->98374 98376 f05475 98373->98376 98377 f05455 98373->98377 98415 f08ca8 58 API calls __getptd_noexit 98374->98415 98398 f10787 98376->98398 98416 f08ca8 58 API calls __getptd_noexit 98377->98416 98378 f0540f __ioinit @_EH4_CallFilterFunc@8 98378->98320 98384 f10674 __ioinit 98383->98384 98385 f09d8b __lock 58 API calls 98384->98385 98392 f10682 98385->98392 98386 f106f6 98418 f1077e 98386->98418 98387 f106fd 98423 f0899d 58 API calls __malloc_crt 98387->98423 98390 f10704 98390->98386 98424 f09fab InitializeCriticalSectionAndSpinCount 98390->98424 98391 f10773 __ioinit 98391->98372 98392->98386 98392->98387 98394 f09e13 __mtinitlocknum 58 API calls 98392->98394 98421 f06dcd 59 API calls __lock 98392->98421 98422 f06e37 LeaveCriticalSection LeaveCriticalSection _doexit 98392->98422 98394->98392 98396 f1072a EnterCriticalSection 98396->98386 98406 f107a7 __wopenfile 98398->98406 98399 f107c1 98429 f08ca8 58 API calls __getptd_noexit 98399->98429 98401 f1097c 98401->98399 98405 f109df 98401->98405 98402 f107c6 98430 f08f36 9 API calls wcstoxq 98402->98430 98404 f05480 98417 f054a2 LeaveCriticalSection LeaveCriticalSection _fprintf 98404->98417 98426 f18721 98405->98426 98406->98399 98406->98401 98431 f0394b 60 API calls 2 library calls 98406->98431 98409 f10975 98409->98401 98432 f0394b 60 API calls 2 library calls 98409->98432 98411 f10994 98411->98401 98433 f0394b 60 API calls 2 library calls 98411->98433 98413->98369 98414->98378 98415->98378 98416->98378 98417->98378 98425 f09ef5 LeaveCriticalSection 98418->98425 98420 f10785 98420->98391 98421->98392 98422->98392 98423->98390 98424->98396 98425->98420 98434 f17f05 98426->98434 98428 f1873a 98428->98404 98429->98402 98430->98404 98431->98409 98432->98411 98433->98401 98435 f17f11 __ioinit 98434->98435 98436 f17f27 98435->98436 98439 f17f5d 98435->98439 98519 f08ca8 58 API calls __getptd_noexit 98436->98519 98438 f17f2c 98520 f08f36 9 API calls wcstoxq 98438->98520 98445 f17fce 98439->98445 98442 f17f79 98521 f17fa2 LeaveCriticalSection __unlock_fhandle 98442->98521 98444 f17f36 __ioinit 98444->98428 98446 f17fee 98445->98446 98447 f0465a __wsopen_nolock 58 API calls 98446->98447 98449 f1800a 98447->98449 98448 f08f46 __invoke_watson 8 API calls 98450 f18720 98448->98450 98451 f18044 98449->98451 98463 f18067 98449->98463 98467 f18141 98449->98467 98452 f17f05 __wsopen_helper 103 API calls 98450->98452 98453 f08c74 __chsize_nolock 58 API calls 98451->98453 98454 f1873a 98452->98454 98455 f18049 98453->98455 98454->98442 98456 f08ca8 wcstoxq 58 API calls 98455->98456 98457 f18056 98456->98457 98460 f08f36 wcstoxq 9 API calls 98457->98460 98458 f18125 98461 f08c74 __chsize_nolock 58 API calls 98458->98461 98459 f18103 98468 f0d414 __alloc_osfhnd 61 API calls 98459->98468 98486 f18060 98460->98486 98462 f1812a 98461->98462 98464 f08ca8 wcstoxq 58 API calls 98462->98464 98463->98458 98463->98459 98465 f18137 98464->98465 98466 f08f36 wcstoxq 9 API calls 98465->98466 98466->98467 98467->98448 98469 f181d1 98468->98469 98470 f181db 98469->98470 98471 f181fe 98469->98471 98472 f08c74 __chsize_nolock 58 API calls 98470->98472 98473 f17e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98471->98473 98474 f181e0 98472->98474 98484 f18220 98473->98484 98475 f08ca8 wcstoxq 58 API calls 98474->98475 98477 f181ea 98475->98477 98476 f1829e GetFileType 98478 f182a9 GetLastError 98476->98478 98479 f182eb 98476->98479 98482 f08ca8 wcstoxq 58 API calls 98477->98482 98483 f08c87 __dosmaperr 58 API calls 98478->98483 98490 f0d6aa __set_osfhnd 59 API calls 98479->98490 98480 f1826c GetLastError 98481 f08c87 __dosmaperr 58 API calls 98480->98481 98485 f18291 98481->98485 98482->98486 98487 f182d0 CloseHandle 98483->98487 98484->98476 98484->98480 98488 f17e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98484->98488 98492 f08ca8 wcstoxq 58 API calls 98485->98492 98486->98442 98487->98485 98491 f182de 98487->98491 98489 f18261 98488->98489 98489->98476 98489->98480 98496 f18309 98490->98496 98493 f08ca8 wcstoxq 58 API calls 98491->98493 98492->98467 98494 f182e3 98493->98494 98494->98485 98495 f184c4 98495->98467 98498 f18697 CloseHandle 98495->98498 98496->98495 98497 f11a41 __lseeki64_nolock 60 API calls 98496->98497 98515 f1838a 98496->98515 98499 f18373 98497->98499 98500 f17e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98498->98500 98502 f08c74 __chsize_nolock 58 API calls 98499->98502 98499->98515 98501 f186be 98500->98501 98503 f186c6 GetLastError 98501->98503 98504 f186f2 98501->98504 98502->98515 98505 f08c87 __dosmaperr 58 API calls 98503->98505 98504->98467 98507 f186d2 98505->98507 98506 f183bc 98510 f19922 __chsize_nolock 82 API calls 98506->98510 98506->98515 98511 f0d5bd __free_osfhnd 59 API calls 98507->98511 98508 f10fdb 70 API calls __read_nolock 98508->98515 98509 f10c5d __close_nolock 61 API calls 98509->98515 98510->98506 98511->98504 98512 f0da06 __write 78 API calls 98512->98515 98513 f18541 98514 f10c5d __close_nolock 61 API calls 98513->98514 98516 f18548 98514->98516 98515->98495 98515->98506 98515->98508 98515->98509 98515->98512 98515->98513 98517 f11a41 60 API calls __lseeki64_nolock 98515->98517 98518 f08ca8 wcstoxq 58 API calls 98516->98518 98517->98515 98518->98467 98519->98438 98520->98444 98521->98444 98523 ee4ce1 98522->98523 98524 ee4d9d LoadLibraryA 98522->98524 98523->98326 98523->98327 98524->98523 98525 ee4dae GetProcAddress 98524->98525 98525->98523 98527 f00f36 Mailbox 59 API calls 98526->98527 98528 ee53a0 98527->98528 98528->98332 98530 ee5003 FindResourceExW 98529->98530 98534 ee5020 98529->98534 98531 f1dc8c LoadResource 98530->98531 98530->98534 98532 f1dca1 SizeofResource 98531->98532 98531->98534 98533 f1dcb5 LockResource 98532->98533 98532->98534 98533->98534 98534->98338 98536 f1dd04 98535->98536 98537 ee5054 98535->98537 98541 f059bd 98537->98541 98539 ee5062 98539->98344 98540->98338 98542 f059c9 __ioinit 98541->98542 98543 f059db 98542->98543 98545 f05a01 98542->98545 98554 f08ca8 58 API calls __getptd_noexit 98543->98554 98556 f06d8e 98545->98556 98546 f059e0 98555 f08f36 9 API calls wcstoxq 98546->98555 98549 f05a07 98562 f0592e 83 API calls 5 library calls 98549->98562 98551 f05a16 98563 f05a38 LeaveCriticalSection LeaveCriticalSection _fprintf 98551->98563 98553 f059eb __ioinit 98553->98539 98554->98546 98555->98553 98557 f06dc0 EnterCriticalSection 98556->98557 98558 f06d9e 98556->98558 98560 f06db6 98557->98560 98558->98557 98559 f06da6 98558->98559 98561 f09d8b __lock 58 API calls 98559->98561 98560->98549 98561->98560 98562->98551 98563->98553 98567 f0576d 98564->98567 98566 ee508e 98566->98352 98569 f05779 __ioinit 98567->98569 98568 f057b4 __ioinit 98568->98566 98569->98568 98570 f057bc 98569->98570 98571 f0578f _memset 98569->98571 98572 f06d8e __lock_file 59 API calls 98570->98572 98594 f08ca8 58 API calls __getptd_noexit 98571->98594 98573 f057c2 98572->98573 98580 f0558d 98573->98580 98576 f057a9 98595 f08f36 9 API calls wcstoxq 98576->98595 98581 f055c3 98580->98581 98584 f055a8 _memset 98580->98584 98596 f057f6 LeaveCriticalSection LeaveCriticalSection _fprintf 98581->98596 98582 f055b3 98692 f08ca8 58 API calls __getptd_noexit 98582->98692 98584->98581 98584->98582 98587 f05603 98584->98587 98587->98581 98590 f05714 _memset 98587->98590 98597 f04856 98587->98597 98604 f10fdb 98587->98604 98672 f10d27 98587->98672 98694 f10e48 58 API calls 3 library calls 98587->98694 98695 f08ca8 58 API calls __getptd_noexit 98590->98695 98593 f055b8 98693 f08f36 9 API calls wcstoxq 98593->98693 98594->98576 98595->98568 98596->98568 98598 f04860 98597->98598 98599 f04875 98597->98599 98696 f08ca8 58 API calls __getptd_noexit 98598->98696 98599->98587 98601 f04865 98697 f08f36 9 API calls wcstoxq 98601->98697 98603 f04870 98603->98587 98605 f11013 98604->98605 98606 f10ffc 98604->98606 98607 f1174b 98605->98607 98612 f1104d 98605->98612 98707 f08c74 58 API calls __getptd_noexit 98606->98707 98723 f08c74 58 API calls __getptd_noexit 98607->98723 98610 f11001 98708 f08ca8 58 API calls __getptd_noexit 98610->98708 98614 f11055 98612->98614 98621 f1106c 98612->98621 98613 f11750 98724 f08ca8 58 API calls __getptd_noexit 98613->98724 98709 f08c74 58 API calls __getptd_noexit 98614->98709 98617 f11061 98725 f08f36 9 API calls wcstoxq 98617->98725 98618 f1105a 98710 f08ca8 58 API calls __getptd_noexit 98618->98710 98620 f11081 98711 f08c74 58 API calls __getptd_noexit 98620->98711 98621->98620 98623 f1109b 98621->98623 98625 f110b9 98621->98625 98652 f11008 98621->98652 98623->98620 98628 f110a6 98623->98628 98712 f0899d 58 API calls __malloc_crt 98625->98712 98698 f15deb 98628->98698 98629 f110c9 98631 f110d1 98629->98631 98632 f110ec 98629->98632 98630 f111ba 98633 f11233 ReadFile 98630->98633 98636 f111d0 GetConsoleMode 98630->98636 98713 f08ca8 58 API calls __getptd_noexit 98631->98713 98715 f11a41 60 API calls 3 library calls 98632->98715 98637 f11713 GetLastError 98633->98637 98638 f11255 98633->98638 98643 f11230 98636->98643 98644 f111e4 98636->98644 98640 f11720 98637->98640 98641 f11213 98637->98641 98638->98637 98646 f11225 98638->98646 98639 f110d6 98714 f08c74 58 API calls __getptd_noexit 98639->98714 98721 f08ca8 58 API calls __getptd_noexit 98640->98721 98654 f11219 98641->98654 98716 f08c87 58 API calls 3 library calls 98641->98716 98643->98633 98644->98643 98647 f111ea ReadConsoleW 98644->98647 98646->98654 98655 f1128a 98646->98655 98661 f114f7 98646->98661 98647->98646 98649 f1120d GetLastError 98647->98649 98648 f11725 98722 f08c74 58 API calls __getptd_noexit 98648->98722 98649->98641 98652->98587 98653 f02ed5 _free 58 API calls 98653->98652 98654->98652 98654->98653 98657 f112f6 ReadFile 98655->98657 98665 f11377 98655->98665 98658 f11317 GetLastError 98657->98658 98671 f11321 98657->98671 98658->98671 98659 f11434 98666 f113e4 MultiByteToWideChar 98659->98666 98719 f11a41 60 API calls 3 library calls 98659->98719 98660 f11424 98718 f08ca8 58 API calls __getptd_noexit 98660->98718 98661->98654 98662 f115fd ReadFile 98661->98662 98664 f11620 GetLastError 98662->98664 98670 f1162e 98662->98670 98664->98670 98665->98654 98665->98659 98665->98660 98665->98666 98666->98649 98666->98654 98670->98661 98720 f11a41 60 API calls 3 library calls 98670->98720 98671->98655 98717 f11a41 60 API calls 3 library calls 98671->98717 98673 f10d32 98672->98673 98677 f10d47 98672->98677 98759 f08ca8 58 API calls __getptd_noexit 98673->98759 98675 f10d37 98760 f08f36 9 API calls wcstoxq 98675->98760 98678 f10d7c 98677->98678 98683 f10d42 98677->98683 98761 f16164 58 API calls __malloc_crt 98677->98761 98680 f04856 __fclose_nolock 58 API calls 98678->98680 98681 f10d90 98680->98681 98726 f10ec7 98681->98726 98683->98587 98684 f10d97 98684->98683 98685 f04856 __fclose_nolock 58 API calls 98684->98685 98686 f10dba 98685->98686 98686->98683 98687 f04856 __fclose_nolock 58 API calls 98686->98687 98688 f10dc6 98687->98688 98688->98683 98689 f04856 __fclose_nolock 58 API calls 98688->98689 98690 f10dd3 98689->98690 98691 f04856 __fclose_nolock 58 API calls 98690->98691 98691->98683 98692->98593 98693->98581 98694->98587 98695->98593 98696->98601 98697->98603 98699 f15e03 98698->98699 98700 f15df6 98698->98700 98703 f15e0f 98699->98703 98704 f08ca8 wcstoxq 58 API calls 98699->98704 98701 f08ca8 wcstoxq 58 API calls 98700->98701 98702 f15dfb 98701->98702 98702->98630 98703->98630 98705 f15e30 98704->98705 98706 f08f36 wcstoxq 9 API calls 98705->98706 98706->98702 98707->98610 98708->98652 98709->98618 98710->98617 98711->98618 98712->98629 98713->98639 98714->98652 98715->98628 98716->98654 98717->98671 98718->98654 98719->98666 98720->98670 98721->98648 98722->98654 98723->98613 98724->98617 98725->98652 98727 f10ed3 __ioinit 98726->98727 98728 f10ee0 98727->98728 98729 f10ef7 98727->98729 98730 f08c74 __chsize_nolock 58 API calls 98728->98730 98731 f10fbb 98729->98731 98734 f10f0b 98729->98734 98733 f10ee5 98730->98733 98732 f08c74 __chsize_nolock 58 API calls 98731->98732 98735 f10f2e 98732->98735 98736 f08ca8 wcstoxq 58 API calls 98733->98736 98737 f10f36 98734->98737 98738 f10f29 98734->98738 98745 f08ca8 wcstoxq 58 API calls 98735->98745 98741 f10eec __ioinit 98736->98741 98739 f10f43 98737->98739 98740 f10f58 98737->98740 98742 f08c74 __chsize_nolock 58 API calls 98738->98742 98743 f08c74 __chsize_nolock 58 API calls 98739->98743 98744 f0d386 ___lock_fhandle 59 API calls 98740->98744 98741->98684 98742->98735 98746 f10f48 98743->98746 98747 f10f5e 98744->98747 98748 f10f50 98745->98748 98749 f08ca8 wcstoxq 58 API calls 98746->98749 98750 f10f71 98747->98750 98751 f10f84 98747->98751 98753 f08f36 wcstoxq 9 API calls 98748->98753 98749->98748 98752 f10fdb __read_nolock 70 API calls 98750->98752 98754 f08ca8 wcstoxq 58 API calls 98751->98754 98758 f10f7d 98752->98758 98753->98741 98755 f10f89 98754->98755 98756 f08c74 __chsize_nolock 58 API calls 98755->98756 98756->98758 98757 f10fb3 __read LeaveCriticalSection 98757->98741 98758->98757 98759->98675 98760->98683 98761->98678 98765 f0537a GetSystemTimeAsFileTime 98762->98765 98764 f49017 98764->98354 98766 f053a8 __aulldiv 98765->98766 98766->98764 98768 f05ddc __ioinit 98767->98768 98769 f05e03 98768->98769 98770 f05dee 98768->98770 98772 f06d8e __lock_file 59 API calls 98769->98772 98781 f08ca8 58 API calls __getptd_noexit 98770->98781 98774 f05e09 98772->98774 98773 f05df3 98782 f08f36 9 API calls wcstoxq 98773->98782 98783 f05a40 67 API calls 6 library calls 98774->98783 98777 f05e14 98784 f05e34 LeaveCriticalSection LeaveCriticalSection _fprintf 98777->98784 98779 f05e26 98780 f05dfe __ioinit 98779->98780 98780->98359 98781->98773 98782->98780 98783->98777 98784->98779 98785->98220 98786->98233 98787->98235 98788->98231 98789->98241 98791 ee92c9 Mailbox 98790->98791 98792 f1f4f8 98791->98792 98797 ee92d3 98791->98797 98793 f00f36 Mailbox 59 API calls 98792->98793 98794 f1f504 98793->98794 98795 ee92da 98795->98245 98797->98795 98798 ee9df0 59 API calls Mailbox 98797->98798 98798->98797 98799->98251 98800->98256 98806 f497f1 __tzset_nolock _wcscmp 98801->98806 98802 ee506b 74 API calls 98802->98806 98803 f49685 98803->98262 98803->98290 98804 f491b2 GetSystemTimeAsFileTime 98804->98806 98805 ee5045 85 API calls 98805->98806 98806->98802 98806->98803 98806->98804 98806->98805 98808 f48bc8 98807->98808 98809 f48bba 98807->98809 98811 f48c0d 98808->98811 98812 f053cb 115 API calls 98808->98812 98837 f48bd1 98808->98837 98810 f053cb 115 API calls 98809->98810 98810->98808 98838 f48e3a 98811->98838 98814 f48bf2 98812->98814 98814->98811 98816 f48bfb 98814->98816 98815 f48c51 98817 f48c55 98815->98817 98818 f48c76 98815->98818 98820 f05516 __fcloseall 83 API calls 98816->98820 98816->98837 98819 f48c62 98817->98819 98822 f05516 __fcloseall 83 API calls 98817->98822 98842 f48a52 98818->98842 98826 f05516 __fcloseall 83 API calls 98819->98826 98819->98837 98820->98837 98822->98819 98824 f48ca4 98851 f48cd4 98824->98851 98825 f48c84 98827 f48c91 98825->98827 98829 f05516 __fcloseall 83 API calls 98825->98829 98826->98837 98831 f05516 __fcloseall 83 API calls 98827->98831 98827->98837 98829->98827 98831->98837 98834 f48cbf 98836 f05516 __fcloseall 83 API calls 98834->98836 98834->98837 98836->98837 98837->98291 98839 f48e5f 98838->98839 98841 f48e48 __tzset_nolock _memmove 98838->98841 98840 f05752 __fread_nolock 74 API calls 98839->98840 98840->98841 98841->98815 98843 f0588c __malloc_crt 58 API calls 98842->98843 98844 f48a61 98843->98844 98845 f0588c __malloc_crt 58 API calls 98844->98845 98846 f48a75 98845->98846 98847 f0588c __malloc_crt 58 API calls 98846->98847 98848 f48a89 98847->98848 98849 f48db6 58 API calls 98848->98849 98850 f48a9c 98848->98850 98849->98850 98850->98824 98850->98825 98858 f48ce9 98851->98858 98852 f48da1 98884 f48fde 98852->98884 98853 f48aae 74 API calls 98853->98858 98855 f48cab 98859 f48db6 98855->98859 98858->98852 98858->98853 98858->98855 98880 f48ebb 98858->98880 98888 f48b4a 74 API calls 98858->98888 98860 f48dc3 98859->98860 98861 f48dc9 98859->98861 98862 f02ed5 _free 58 API calls 98860->98862 98863 f48dda 98861->98863 98864 f02ed5 _free 58 API calls 98861->98864 98862->98861 98865 f48cb2 98863->98865 98866 f02ed5 _free 58 API calls 98863->98866 98864->98863 98865->98834 98867 f05516 98865->98867 98866->98865 98868 f05522 __ioinit 98867->98868 98869 f05536 98868->98869 98871 f0554e 98868->98871 98937 f08ca8 58 API calls __getptd_noexit 98869->98937 98872 f06d8e __lock_file 59 API calls 98871->98872 98877 f05546 __ioinit 98871->98877 98874 f05560 98872->98874 98873 f0553b 98938 f08f36 9 API calls wcstoxq 98873->98938 98921 f054aa 98874->98921 98877->98834 98881 f48f0a 98880->98881 98882 f48eca 98880->98882 98881->98882 98889 f48f91 98881->98889 98882->98858 98885 f48ffc 98884->98885 98886 f48feb 98884->98886 98885->98855 98887 f049d3 80 API calls 98886->98887 98887->98885 98888->98858 98890 f48fbd 98889->98890 98891 f48fce 98889->98891 98893 f049d3 98890->98893 98891->98881 98894 f049df __ioinit 98893->98894 98895 f04a0d __ioinit 98894->98895 98896 f04a15 98894->98896 98897 f049fd 98894->98897 98895->98891 98899 f06d8e __lock_file 59 API calls 98896->98899 98918 f08ca8 58 API calls __getptd_noexit 98897->98918 98900 f04a1b 98899->98900 98906 f0487a 98900->98906 98901 f04a02 98919 f08f36 9 API calls wcstoxq 98901->98919 98907 f048a7 98906->98907 98909 f04889 98906->98909 98920 f04a4d LeaveCriticalSection LeaveCriticalSection _fprintf 98907->98920 98908 f04897 98910 f08ca8 wcstoxq 58 API calls 98908->98910 98909->98907 98909->98908 98916 f048c1 _memmove 98909->98916 98911 f0489c 98910->98911 98912 f08f36 wcstoxq 9 API calls 98911->98912 98912->98907 98913 f0af9e __flsbuf 78 API calls 98913->98916 98914 f04bad __flush 78 API calls 98914->98916 98915 f04856 __fclose_nolock 58 API calls 98915->98916 98916->98907 98916->98913 98916->98914 98916->98915 98917 f0da06 __write 78 API calls 98916->98917 98917->98916 98918->98901 98919->98895 98920->98895 98922 f054b9 98921->98922 98923 f054cd 98921->98923 98976 f08ca8 58 API calls __getptd_noexit 98922->98976 98924 f054c9 98923->98924 98940 f04bad 98923->98940 98939 f05585 LeaveCriticalSection LeaveCriticalSection _fprintf 98924->98939 98927 f054be 98977 f08f36 9 API calls wcstoxq 98927->98977 98932 f04856 __fclose_nolock 58 API calls 98933 f054e7 98932->98933 98950 f10b82 98933->98950 98935 f054ed 98935->98924 98936 f02ed5 _free 58 API calls 98935->98936 98936->98924 98937->98873 98938->98877 98939->98877 98941 f04bc0 98940->98941 98945 f04be4 98940->98945 98942 f04856 __fclose_nolock 58 API calls 98941->98942 98941->98945 98943 f04bdd 98942->98943 98978 f0da06 98943->98978 98946 f10cf7 98945->98946 98947 f054e1 98946->98947 98948 f10d04 98946->98948 98947->98932 98948->98947 98949 f02ed5 _free 58 API calls 98948->98949 98949->98947 98951 f10b8e __ioinit 98950->98951 98952 f10bb2 98951->98952 98953 f10b9b 98951->98953 98955 f10c3d 98952->98955 98957 f10bc2 98952->98957 99103 f08c74 58 API calls __getptd_noexit 98953->99103 99108 f08c74 58 API calls __getptd_noexit 98955->99108 98956 f10ba0 99104 f08ca8 58 API calls __getptd_noexit 98956->99104 98960 f10be0 98957->98960 98961 f10bea 98957->98961 99105 f08c74 58 API calls __getptd_noexit 98960->99105 98964 f0d386 ___lock_fhandle 59 API calls 98961->98964 98962 f10be5 99109 f08ca8 58 API calls __getptd_noexit 98962->99109 98966 f10bf0 98964->98966 98967 f10c03 98966->98967 98968 f10c0e 98966->98968 99088 f10c5d 98967->99088 99106 f08ca8 58 API calls __getptd_noexit 98968->99106 98969 f10c49 99110 f08f36 9 API calls wcstoxq 98969->99110 98971 f10ba7 __ioinit 98971->98935 98974 f10c09 99107 f10c35 LeaveCriticalSection __unlock_fhandle 98974->99107 98976->98927 98977->98924 98979 f0da12 __ioinit 98978->98979 98980 f0da36 98979->98980 98981 f0da1f 98979->98981 98983 f0dad5 98980->98983 98985 f0da4a 98980->98985 99079 f08c74 58 API calls __getptd_noexit 98981->99079 99085 f08c74 58 API calls __getptd_noexit 98983->99085 98984 f0da24 99080 f08ca8 58 API calls __getptd_noexit 98984->99080 98988 f0da72 98985->98988 98989 f0da68 98985->98989 99006 f0d386 98988->99006 99081 f08c74 58 API calls __getptd_noexit 98989->99081 98990 f0da6d 99086 f08ca8 58 API calls __getptd_noexit 98990->99086 98993 f0da78 98995 f0da8b 98993->98995 98996 f0da9e 98993->98996 99015 f0daf5 98995->99015 99082 f08ca8 58 API calls __getptd_noexit 98996->99082 98997 f0dae1 99087 f08f36 9 API calls wcstoxq 98997->99087 99000 f0da2b __ioinit 99000->98945 99002 f0da97 99084 f0dacd LeaveCriticalSection __unlock_fhandle 99002->99084 99003 f0daa3 99083 f08c74 58 API calls __getptd_noexit 99003->99083 99007 f0d392 __ioinit 99006->99007 99008 f0d3e1 EnterCriticalSection 99007->99008 99009 f09d8b __lock 58 API calls 99007->99009 99010 f0d407 __ioinit 99008->99010 99011 f0d3b7 99009->99011 99010->98993 99012 f0d3cf 99011->99012 99013 f09fab __ioinit InitializeCriticalSectionAndSpinCount 99011->99013 99014 f0d40b ___lock_fhandle LeaveCriticalSection 99012->99014 99013->99012 99014->99008 99016 f0db02 __write_nolock 99015->99016 99017 f0db60 99016->99017 99018 f0db41 99016->99018 99049 f0db36 99016->99049 99023 f0dbb8 99017->99023 99024 f0db9c 99017->99024 99020 f08c74 __chsize_nolock 58 API calls 99018->99020 99019 f0c776 __fltout2 6 API calls 99021 f0e356 99019->99021 99022 f0db46 99020->99022 99021->99002 99025 f08ca8 wcstoxq 58 API calls 99022->99025 99026 f0dbd1 99023->99026 99030 f11a41 __lseeki64_nolock 60 API calls 99023->99030 99027 f08c74 __chsize_nolock 58 API calls 99024->99027 99029 f0db4d 99025->99029 99031 f15deb __read_nolock 58 API calls 99026->99031 99028 f0dba1 99027->99028 99032 f08ca8 wcstoxq 58 API calls 99028->99032 99033 f08f36 wcstoxq 9 API calls 99029->99033 99030->99026 99034 f0dbdf 99031->99034 99035 f0dba8 99032->99035 99033->99049 99036 f0df38 99034->99036 99042 f09b2c __setmbcp 58 API calls 99034->99042 99039 f08f36 wcstoxq 9 API calls 99035->99039 99037 f0df56 99036->99037 99038 f0e2cb WriteFile 99036->99038 99040 f0e07a 99037->99040 99047 f0df6c 99037->99047 99041 f0df2b GetLastError 99038->99041 99051 f0def8 99038->99051 99039->99049 99052 f0e16f 99040->99052 99054 f0e085 99040->99054 99041->99051 99043 f0dc0b GetConsoleMode 99042->99043 99043->99036 99045 f0dc4a 99043->99045 99044 f0e304 99044->99049 99050 f08ca8 wcstoxq 58 API calls 99044->99050 99045->99036 99046 f0dc5a GetConsoleCP 99045->99046 99046->99044 99074 f0dc89 99046->99074 99047->99044 99048 f0dfdb WriteFile 99047->99048 99048->99041 99053 f0e018 99048->99053 99049->99019 99055 f0e332 99050->99055 99051->99044 99051->99049 99056 f0e058 99051->99056 99052->99044 99057 f0e1e4 WideCharToMultiByte 99052->99057 99053->99047 99058 f0e03c 99053->99058 99054->99044 99059 f0e0ea WriteFile 99054->99059 99060 f08c74 __chsize_nolock 58 API calls 99055->99060 99061 f0e063 99056->99061 99062 f0e2fb 99056->99062 99057->99041 99072 f0e22b 99057->99072 99058->99051 99059->99041 99065 f0e139 99059->99065 99060->99049 99063 f08ca8 wcstoxq 58 API calls 99061->99063 99064 f08c87 __dosmaperr 58 API calls 99062->99064 99066 f0e068 99063->99066 99064->99049 99065->99051 99065->99054 99065->99058 99068 f08c74 __chsize_nolock 58 API calls 99066->99068 99067 f0e233 WriteFile 99070 f0e286 GetLastError 99067->99070 99067->99072 99068->99049 99069 f03775 __write_nolock 58 API calls 99069->99074 99070->99072 99071 f1643a 60 API calls __write_nolock 99071->99074 99072->99051 99072->99052 99072->99058 99072->99067 99073 f17bde WriteConsoleW CreateFileW __putwch_nolock 99077 f0dddf 99073->99077 99074->99051 99074->99069 99074->99071 99075 f0dd72 WideCharToMultiByte 99074->99075 99074->99077 99075->99051 99076 f0ddad WriteFile 99075->99076 99076->99041 99076->99077 99077->99041 99077->99051 99077->99073 99077->99074 99078 f0de07 WriteFile 99077->99078 99078->99041 99078->99077 99079->98984 99080->99000 99081->98990 99082->99003 99083->99002 99084->99000 99085->98990 99086->98997 99087->99000 99111 f0d643 99088->99111 99090 f10cc1 99124 f0d5bd 59 API calls 2 library calls 99090->99124 99092 f10c6b 99092->99090 99094 f0d643 __chsize_nolock 58 API calls 99092->99094 99102 f10c9f 99092->99102 99093 f0d643 __chsize_nolock 58 API calls 99095 f10cab CloseHandle 99093->99095 99098 f10c96 99094->99098 99095->99090 99099 f10cb7 GetLastError 99095->99099 99096 f10ceb 99096->98974 99097 f10cc9 99097->99096 99125 f08c87 58 API calls 3 library calls 99097->99125 99101 f0d643 __chsize_nolock 58 API calls 99098->99101 99099->99090 99101->99102 99102->99090 99102->99093 99103->98956 99104->98971 99105->98962 99106->98974 99107->98971 99108->98962 99109->98969 99110->98971 99112 f0d663 99111->99112 99113 f0d64e 99111->99113 99116 f08c74 __chsize_nolock 58 API calls 99112->99116 99118 f0d688 99112->99118 99114 f08c74 __chsize_nolock 58 API calls 99113->99114 99115 f0d653 99114->99115 99117 f08ca8 wcstoxq 58 API calls 99115->99117 99119 f0d692 99116->99119 99121 f0d65b 99117->99121 99118->99092 99120 f08ca8 wcstoxq 58 API calls 99119->99120 99122 f0d69a 99120->99122 99121->99092 99123 f08f36 wcstoxq 9 API calls 99122->99123 99123->99121 99124->99097 99125->99096 99188 f11ac0 99126->99188 99129 ee48da 99131 ee7d2c 59 API calls 99129->99131 99130 ee48f7 99194 ee7eec 99130->99194 99133 ee48e6 99131->99133 99190 ee7886 99133->99190 99136 f00911 99137 f11ac0 __write_nolock 99136->99137 99138 f0091e GetLongPathNameW 99137->99138 99139 ee7d2c 59 API calls 99138->99139 99140 ee741d 99139->99140 99141 ee716b 99140->99141 99142 ee77c7 59 API calls 99141->99142 99143 ee717d 99142->99143 99144 ee48ae 60 API calls 99143->99144 99145 ee7188 99144->99145 99146 ee7193 99145->99146 99150 f1ebde 99145->99150 99148 ee3f84 59 API calls 99146->99148 99149 ee719f 99148->99149 99202 ee34c2 99149->99202 99152 f1ebf8 99150->99152 99208 ee7a68 61 API calls 99150->99208 99153 ee71b2 Mailbox 99153->98035 99155 ee4f3d 136 API calls 99154->99155 99156 ee69ef 99155->99156 99157 f1e38a 99156->99157 99159 ee4f3d 136 API calls 99156->99159 99158 f49604 122 API calls 99157->99158 99160 f1e39f 99158->99160 99161 ee6a03 99159->99161 99162 f1e3c0 99160->99162 99163 f1e3a3 99160->99163 99161->99157 99164 ee6a0b 99161->99164 99166 f00f36 Mailbox 59 API calls 99162->99166 99165 ee4faa 84 API calls 99163->99165 99167 ee6a17 99164->99167 99168 f1e3ab 99164->99168 99165->99168 99187 f1e405 Mailbox 99166->99187 99209 ee6bec 99167->99209 99316 f44339 90 API calls _wprintf 99168->99316 99171 f1e3b9 99171->99162 99173 f1e5b9 99174 f02ed5 _free 58 API calls 99173->99174 99175 f1e5c1 99174->99175 99176 ee4faa 84 API calls 99175->99176 99181 f1e5ca 99176->99181 99180 f02ed5 _free 58 API calls 99180->99181 99181->99180 99183 ee4faa 84 API calls 99181->99183 99320 f3fad2 89 API calls 4 library calls 99181->99320 99183->99181 99184 ee7f41 59 API calls 99184->99187 99187->99173 99187->99181 99187->99184 99302 ee766f 99187->99302 99310 ee74bd 99187->99310 99317 f3fa6e 59 API calls 2 library calls 99187->99317 99318 f3f98f 61 API calls 2 library calls 99187->99318 99319 f47428 59 API calls Mailbox 99187->99319 99189 ee48bb GetFullPathNameW 99188->99189 99189->99129 99189->99130 99191 ee7894 99190->99191 99198 ee7e8c 99191->99198 99193 ee48f2 99193->99136 99195 ee7ef9 99194->99195 99196 ee7f06 99194->99196 99195->99133 99197 f00f36 Mailbox 59 API calls 99196->99197 99197->99195 99199 ee7e9a 99198->99199 99201 ee7ea3 _memmove 99198->99201 99200 ee7faf 59 API calls 99199->99200 99199->99201 99200->99201 99201->99193 99203 ee34d4 99202->99203 99207 ee34f3 _memmove 99202->99207 99205 f00f36 Mailbox 59 API calls 99203->99205 99204 f00f36 Mailbox 59 API calls 99206 ee350a 99204->99206 99205->99207 99206->99153 99207->99204 99208->99150 99210 f1e777 99209->99210 99211 ee6c15 99209->99211 99412 f3fad2 89 API calls 4 library calls 99210->99412 99326 ee5906 60 API calls Mailbox 99211->99326 99214 f1e78a 99413 f3fad2 89 API calls 4 library calls 99214->99413 99215 ee6c37 99327 ee5956 99215->99327 99219 ee6c54 99221 ee77c7 59 API calls 99219->99221 99220 f1e7a6 99224 ee6cc1 99220->99224 99222 ee6c60 99221->99222 99340 f00ad7 60 API calls __write_nolock 99222->99340 99226 ee6ccf 99224->99226 99227 f1e7b9 99224->99227 99225 ee6c6c 99228 ee77c7 59 API calls 99225->99228 99230 ee77c7 59 API calls 99226->99230 99229 ee5dcf CloseHandle 99227->99229 99231 ee6c78 99228->99231 99232 f1e7c5 99229->99232 99233 ee6cd8 99230->99233 99234 ee48ae 60 API calls 99231->99234 99235 ee4f3d 136 API calls 99232->99235 99236 ee77c7 59 API calls 99233->99236 99237 ee6c86 99234->99237 99238 f1e7e1 99235->99238 99239 ee6ce1 99236->99239 99341 ee59b0 ReadFile SetFilePointerEx 99237->99341 99242 f1e80a 99238->99242 99246 f49604 122 API calls 99238->99246 99350 ee46f9 99239->99350 99414 f3fad2 89 API calls 4 library calls 99242->99414 99245 ee6cb2 99342 ee5c4e 99245->99342 99250 f1e7fd 99246->99250 99248 f1e821 99257 ee6e6c Mailbox 99248->99257 99251 f1e805 99250->99251 99252 f1e826 99250->99252 99254 ee4faa 84 API calls 99251->99254 99255 ee4faa 84 API calls 99252->99255 99254->99242 99256 f1e82b 99255->99256 99258 f00f36 Mailbox 59 API calls 99256->99258 99321 ee5934 99257->99321 99265 f1e85f 99258->99265 99262 ee3bcd 99262->97889 99262->97898 99267 ee766f 59 API calls 99265->99267 99297 f1e8a8 Mailbox 99267->99297 99269 f1ea99 99419 f47388 59 API calls Mailbox 99269->99419 99275 f1eabb 99420 f4f656 59 API calls 2 library calls 99275->99420 99283 ee766f 59 API calls 99283->99297 99292 ee7f41 59 API calls 99292->99297 99296 f1eaeb 99421 f3fad2 89 API calls 4 library calls 99296->99421 99297->99269 99297->99283 99297->99292 99297->99296 99415 f3fa6e 59 API calls 2 library calls 99297->99415 99416 f3f98f 61 API calls 2 library calls 99297->99416 99417 f47428 59 API calls Mailbox 99297->99417 99418 ee7373 59 API calls Mailbox 99297->99418 99299 f1eb04 99300 f02ed5 _free 58 API calls 99299->99300 99301 f1eb17 99300->99301 99301->99257 99303 ee770f 99302->99303 99309 ee7682 _memmove 99302->99309 99305 f00f36 Mailbox 59 API calls 99303->99305 99304 f00f36 Mailbox 59 API calls 99306 ee7689 99304->99306 99305->99309 99307 ee76b2 99306->99307 99308 f00f36 Mailbox 59 API calls 99306->99308 99307->99187 99308->99307 99309->99304 99311 ee74d0 99310->99311 99314 ee757e 99310->99314 99313 f00f36 Mailbox 59 API calls 99311->99313 99315 ee7502 99311->99315 99312 f00f36 59 API calls Mailbox 99312->99315 99313->99315 99314->99187 99315->99312 99315->99314 99316->99171 99317->99187 99318->99187 99319->99187 99320->99181 99322 ee5dcf CloseHandle 99321->99322 99323 ee593c Mailbox 99322->99323 99324 ee5dcf CloseHandle 99323->99324 99325 ee594b 99324->99325 99325->99262 99326->99215 99328 ee5dcf CloseHandle 99327->99328 99329 ee5962 99328->99329 99424 ee5df9 99329->99424 99331 ee59a4 99331->99214 99331->99219 99332 ee5981 99332->99331 99432 ee5770 99332->99432 99334 ee5993 99449 ee53db SetFilePointerEx SetFilePointerEx 99334->99449 99336 f1df60 99450 f4349e SetFilePointerEx SetFilePointerEx WriteFile 99336->99450 99337 ee599a 99337->99331 99337->99336 99339 f1df90 99339->99331 99340->99225 99341->99245 99349 ee5c68 99342->99349 99343 ee5cef SetFilePointerEx 99346 f1e081 99347 ee5cc3 99347->99224 99349->99343 99349->99346 99349->99347 99351 ee77c7 59 API calls 99350->99351 99352 ee470f 99351->99352 99353 ee77c7 59 API calls 99352->99353 99354 ee4717 99353->99354 99355 ee77c7 59 API calls 99354->99355 99356 ee471f 99355->99356 99357 ee77c7 59 API calls 99356->99357 99358 ee4727 99357->99358 99359 ee475b 99358->99359 99360 f1d82b 99358->99360 99361 ee79ab 59 API calls 99359->99361 99362 ee81a7 59 API calls 99360->99362 99363 ee4769 99361->99363 99364 f1d834 99362->99364 99365 ee7e8c 59 API calls 99363->99365 99366 ee7eec 59 API calls 99364->99366 99367 ee4773 99365->99367 99369 ee479e 99366->99369 99367->99369 99412->99214 99413->99220 99414->99248 99415->99297 99416->99297 99417->99297 99418->99297 99419->99275 99421->99299 99425 f1e0b1 99424->99425 99426 ee5e12 CreateFileW 99424->99426 99427 f1e0b7 CreateFileW 99425->99427 99429 ee5e34 99425->99429 99426->99429 99428 f1e0dd 99427->99428 99427->99429 99430 ee5c4e 2 API calls 99428->99430 99429->99332 99431 f1e0e8 99430->99431 99431->99429 99433 ee578b 99432->99433 99434 f1defe 99432->99434 99435 ee581a 99433->99435 99436 ee5c4e 2 API calls 99433->99436 99434->99435 99457 ee5e3f 99434->99457 99435->99334 99437 ee57ad 99436->99437 99438 ee538e 59 API calls 99437->99438 99440 ee57b7 99438->99440 99440->99434 99441 ee57c4 99440->99441 99442 f00f36 Mailbox 59 API calls 99441->99442 99443 ee57cf 99442->99443 99444 ee538e 59 API calls 99443->99444 99445 ee57da 99444->99445 99451 ee5d20 99445->99451 99449->99337 99450->99339 99452 ee5d93 99451->99452 99456 ee5d2e 99451->99456 99462 ee5dae SetFilePointerEx 99452->99462 99453 ee5d56 99455 ee5d66 ReadFile 99455->99453 99455->99456 99456->99453 99456->99455 99458 ee5c4e 2 API calls 99457->99458 99459 ee5e60 99458->99459 99460 ee5c4e 2 API calls 99459->99460 99461 ee5e74 99460->99461 99461->99435 99462->99456 99980 ee568a 99987 ee5c18 99980->99987 99986 ee56ba Mailbox 99988 f00f36 Mailbox 59 API calls 99987->99988 99989 ee5c2b 99988->99989 99990 f00f36 Mailbox 59 API calls 99989->99990 99991 ee569c 99990->99991 99992 ee5632 99991->99992 100006 ee5a2f 99992->100006 99994 ee5674 99994->99986 99998 ee81c1 MultiByteToWideChar 99994->99998 99995 ee5d20 2 API calls 99996 ee5643 99995->99996 99996->99994 99996->99995 100013 ee5bda 99996->100013 99999 ee822e 99998->99999 100000 ee81e7 99998->100000 100001 ee7eec 59 API calls 99999->100001 100002 f00f36 Mailbox 59 API calls 100000->100002 100005 ee8220 100001->100005 100003 ee81fc MultiByteToWideChar 100002->100003 100029 ee78ad 100003->100029 100005->99986 100007 f1df95 100006->100007 100008 ee5a40 100006->100008 100022 f36223 59 API calls Mailbox 100007->100022 100008->99996 100010 f1df9f 100011 f00f36 Mailbox 59 API calls 100010->100011 100012 f1dfab 100011->100012 100014 ee5bee 100013->100014 100015 f1e047 100013->100015 100023 ee5b19 100014->100023 100028 f36223 59 API calls Mailbox 100015->100028 100018 ee5bfa 100018->99996 100019 f1e052 100020 f00f36 Mailbox 59 API calls 100019->100020 100021 f1e067 _memmove 100020->100021 100022->100010 100024 ee5b31 100023->100024 100026 ee5b2a _memmove 100023->100026 100025 f00f36 Mailbox 59 API calls 100024->100025 100027 f1dfd7 100024->100027 100025->100026 100026->100018 100027->100027 100028->100019 100030 ee792f 100029->100030 100031 ee78bc 100029->100031 100032 ee7e8c 59 API calls 100030->100032 100031->100030 100033 ee78c8 100031->100033 100040 ee78da _memmove 100032->100040 100034 ee78d2 100033->100034 100035 ee7900 100033->100035 100041 ee8087 59 API calls Mailbox 100034->100041 100037 ee8189 59 API calls 100035->100037 100038 ee790a 100037->100038 100039 f00f36 Mailbox 59 API calls 100038->100039 100039->100040 100040->100005 100041->100040 100042 f1fe35 100043 f1fe3f 100042->100043 100083 eeac90 Mailbox _memmove 100042->100083 100238 ee8e34 59 API calls Mailbox 100043->100238 100050 eeb5d5 100053 ee81a7 59 API calls 100050->100053 100051 f00f36 59 API calls Mailbox 100068 eea097 Mailbox 100051->100068 100062 eea1b7 100053->100062 100054 f203ae 100242 f49ed4 89 API calls 4 library calls 100054->100242 100055 eeb5da 100248 f49ed4 89 API calls 4 library calls 100055->100248 100057 ee81a7 59 API calls 100057->100068 100058 ee7f41 59 API calls 100058->100083 100060 f203bd 100061 ee77c7 59 API calls 100061->100068 100063 f371e5 59 API calls 100063->100068 100065 f363f2 Mailbox 59 API calls 100065->100062 100066 f20d2f 100247 f49ed4 89 API calls 4 library calls 100066->100247 100068->100050 100068->100051 100068->100054 100068->100055 100068->100057 100068->100061 100068->100062 100068->100063 100068->100066 100069 f02ec0 67 API calls __cinit 100068->100069 100071 eea6ba 100068->100071 100232 eeca20 331 API calls 2 library calls 100068->100232 100233 eeba60 60 API calls Mailbox 100068->100233 100069->100068 100070 f5bd80 331 API calls 100070->100083 100246 f49ed4 89 API calls 4 library calls 100071->100246 100073 f00f36 59 API calls Mailbox 100073->100083 100074 eeb416 100237 eef803 331 API calls 100074->100237 100076 eea000 331 API calls 100076->100083 100077 f20bc3 100244 ee9df0 59 API calls Mailbox 100077->100244 100079 f20bd1 100245 f49ed4 89 API calls 4 library calls 100079->100245 100081 f20bb5 100081->100062 100081->100065 100082 eeb37c 100235 ee9e9c 60 API calls Mailbox 100082->100235 100083->100058 100083->100062 100083->100068 100083->100070 100083->100073 100083->100074 100083->100076 100083->100077 100083->100079 100083->100082 100087 eeade2 Mailbox 100083->100087 100089 eeb685 100083->100089 100191 f5c3f4 100083->100191 100223 f479ff 100083->100223 100229 f363f2 100083->100229 100239 f371e5 59 API calls 100083->100239 100240 f5c2a7 85 API calls 2 library calls 100083->100240 100085 eeb38d 100236 ee9e9c 60 API calls Mailbox 100085->100236 100087->100089 100092 eeae4f Mailbox 100087->100092 100241 f371e5 59 API calls 100087->100241 100243 f49ed4 89 API calls 4 library calls 100089->100243 100092->100062 100092->100081 100092->100089 100097 ef2123 100092->100097 100137 f5e037 100092->100137 100140 f487be 100092->100140 100144 f4d107 100092->100144 100234 ee9df0 59 API calls Mailbox 100092->100234 100098 ee9bf8 59 API calls 100097->100098 100099 ef213b 100098->100099 100101 f00f36 Mailbox 59 API calls 100099->100101 100104 f268de 100099->100104 100102 ef2154 100101->100102 100105 ef2164 100102->100105 100264 ee5906 60 API calls Mailbox 100102->100264 100103 ef2189 100113 ef2196 100103->100113 100269 ee9c9c 59 API calls 100103->100269 100104->100103 100268 f4f600 59 API calls 100104->100268 100107 ee9997 84 API calls 100105->100107 100109 ef2172 100107->100109 100111 ee5956 67 API calls 100109->100111 100110 f26926 100110->100113 100114 f2692e 100110->100114 100112 ef2181 100111->100112 100112->100103 100112->100104 100267 ee5a1a CloseHandle 100112->100267 100115 ee5e3f 2 API calls 100113->100115 100270 ee9c9c 59 API calls 100114->100270 100118 ef219d 100115->100118 100119 f26940 100118->100119 100120 ef21b7 100118->100120 100122 f00f36 Mailbox 59 API calls 100119->100122 100121 ee77c7 59 API calls 100120->100121 100123 ef21bf 100121->100123 100124 f26946 100122->100124 100249 ee56d2 100123->100249 100125 f2695a 100124->100125 100271 ee59b0 ReadFile SetFilePointerEx 100124->100271 100131 f2695e _memmove 100125->100131 100272 f4776d 59 API calls 2 library calls 100125->100272 100129 ef21ce 100129->100131 100265 ee9b9c 59 API calls Mailbox 100129->100265 100132 ef21e2 Mailbox 100133 ef221c 100132->100133 100134 ee5dcf CloseHandle 100132->100134 100133->100092 100135 ef2210 100134->100135 100135->100133 100266 ee5a1a CloseHandle 100135->100266 100276 f5cbf1 100137->100276 100139 f5e047 100139->100092 100141 f487c7 100140->100141 100142 f487cc 100140->100142 100366 f4785c 100141->100366 100142->100092 100145 f4d126 100144->100145 100146 f4d131 100144->100146 100389 ee9c9c 59 API calls 100145->100389 100150 ee77c7 59 API calls 100146->100150 100189 f4d20b Mailbox 100146->100189 100148 f00f36 Mailbox 59 API calls 100149 f4d254 100148->100149 100151 f4d260 100149->100151 100392 ee5906 60 API calls Mailbox 100149->100392 100152 f4d155 100150->100152 100155 ee9997 84 API calls 100151->100155 100154 ee77c7 59 API calls 100152->100154 100156 f4d15e 100154->100156 100157 f4d278 100155->100157 100158 ee9997 84 API calls 100156->100158 100159 ee5956 67 API calls 100157->100159 100160 f4d16a 100158->100160 100161 f4d287 100159->100161 100162 ee46f9 59 API calls 100160->100162 100163 f4d2bf 100161->100163 100164 f4d28b GetLastError 100161->100164 100165 f4d17f 100162->100165 100168 f4d321 100163->100168 100169 f4d2ea 100163->100169 100166 f4d2a4 100164->100166 100167 ee7c8e 59 API calls 100165->100167 100188 f4d214 Mailbox 100166->100188 100393 ee5a1a CloseHandle 100166->100393 100170 f4d1b2 100167->100170 100172 f00f36 Mailbox 59 API calls 100168->100172 100173 f00f36 Mailbox 59 API calls 100169->100173 100171 f4d204 100170->100171 100174 f43c7b 3 API calls 100170->100174 100391 ee9c9c 59 API calls 100171->100391 100178 f4d326 100172->100178 100179 f4d2ef 100173->100179 100177 f4d1c2 100174->100177 100177->100171 100181 f4d1c6 100177->100181 100182 ee77c7 59 API calls 100178->100182 100178->100188 100180 f4d300 100179->100180 100183 ee77c7 59 API calls 100179->100183 100394 f4f656 59 API calls 2 library calls 100180->100394 100185 ee7f41 59 API calls 100181->100185 100182->100188 100183->100180 100186 f4d1d3 100185->100186 100390 f43a6e 63 API calls Mailbox 100186->100390 100188->100092 100189->100148 100189->100188 100190 f4d1dc Mailbox 100190->100171 100192 ee77c7 59 API calls 100191->100192 100193 f5c408 100192->100193 100194 ee77c7 59 API calls 100193->100194 100195 f5c410 100194->100195 100196 ee77c7 59 API calls 100195->100196 100197 f5c418 100196->100197 100198 ee9997 84 API calls 100197->100198 100212 f5c426 100198->100212 100199 f5c63c Mailbox 100199->100083 100200 ee7d2c 59 API calls 100200->100212 100201 f5c60f 100201->100199 100396 ee9b9c 59 API calls Mailbox 100201->100396 100202 f5c5f6 100204 ee7e0b 59 API calls 100202->100204 100207 f5c603 100204->100207 100205 f5c611 100209 ee7e0b 59 API calls 100205->100209 100206 ee81a7 59 API calls 100206->100212 100210 ee7c8e 59 API calls 100207->100210 100208 ee7a84 59 API calls 100208->100212 100211 f5c620 100209->100211 100210->100201 100214 ee7c8e 59 API calls 100211->100214 100212->100199 100212->100200 100212->100201 100212->100202 100212->100205 100212->100206 100212->100208 100213 ee7faf 59 API calls 100212->100213 100215 ee7faf 59 API calls 100212->100215 100220 ee9997 84 API calls 100212->100220 100221 ee7e0b 59 API calls 100212->100221 100222 ee7c8e 59 API calls 100212->100222 100216 f5c4bd CharUpperBuffW 100213->100216 100214->100201 100217 f5c57d CharUpperBuffW 100215->100217 100395 ee859a 68 API calls 100216->100395 100219 eec707 69 API calls 100217->100219 100219->100212 100220->100212 100221->100212 100222->100212 100224 f47a0b 100223->100224 100225 f00f36 Mailbox 59 API calls 100224->100225 100226 f47a19 100225->100226 100227 f47a27 100226->100227 100228 ee77c7 59 API calls 100226->100228 100227->100083 100228->100227 100397 f36334 100229->100397 100231 f36400 100231->100083 100232->100068 100233->100068 100234->100092 100235->100085 100236->100074 100237->100089 100238->100083 100239->100083 100240->100083 100241->100087 100242->100060 100243->100081 100244->100081 100245->100081 100246->100062 100247->100055 100248->100062 100250 ee56dd 100249->100250 100251 ee5702 100249->100251 100250->100251 100255 ee56ec 100250->100255 100252 ee7eec 59 API calls 100251->100252 100256 f432a2 100252->100256 100253 f432d1 100253->100129 100257 ee5c18 59 API calls 100255->100257 100256->100253 100273 f4323e ReadFile SetFilePointerEx 100256->100273 100274 ee7a84 59 API calls 2 library calls 100256->100274 100258 f433c2 100257->100258 100260 ee5632 61 API calls 100258->100260 100261 f433d0 100260->100261 100263 f433e0 Mailbox 100261->100263 100275 ee793a 61 API calls Mailbox 100261->100275 100263->100129 100264->100105 100265->100132 100266->100133 100267->100104 100268->100104 100269->100110 100270->100118 100271->100125 100272->100131 100273->100256 100274->100256 100275->100263 100277 ee9997 84 API calls 100276->100277 100278 f5cc2e 100277->100278 100297 f5cc75 Mailbox 100278->100297 100314 f5d8b9 100278->100314 100280 f5cecd 100281 f5d042 100280->100281 100285 f5cedb 100280->100285 100353 f5d9dc 92 API calls Mailbox 100281->100353 100284 f5d051 100284->100285 100287 f5d05d 100284->100287 100327 f5ca82 100285->100327 100286 ee9997 84 API calls 100302 f5ccc6 Mailbox 100286->100302 100287->100297 100292 f5cf14 100342 f00d88 100292->100342 100295 f5cf47 100299 ee942e 59 API calls 100295->100299 100296 f5cf2e 100348 f49ed4 89 API calls 4 library calls 100296->100348 100297->100139 100301 f5cf53 100299->100301 100300 f5cf39 GetCurrentProcess TerminateProcess 100300->100295 100303 ee91b0 59 API calls 100301->100303 100302->100280 100302->100286 100302->100297 100346 f4f656 59 API calls 2 library calls 100302->100346 100347 f5d0f3 61 API calls 2 library calls 100302->100347 100304 f5cf69 100303->100304 100313 f5cf90 100304->100313 100349 ee8ea0 59 API calls Mailbox 100304->100349 100306 f5d0b8 100306->100297 100310 f5d0cc FreeLibrary 100306->100310 100307 f5cf7f 100350 f5d75d 107 API calls _free 100307->100350 100310->100297 100313->100306 100351 ee8ea0 59 API calls Mailbox 100313->100351 100352 ee9e9c 60 API calls Mailbox 100313->100352 100354 f5d75d 107 API calls _free 100313->100354 100315 ee7faf 59 API calls 100314->100315 100316 f5d8d4 CharLowerBuffW 100315->100316 100355 f3f479 100316->100355 100320 ee77c7 59 API calls 100321 f5d90d 100320->100321 100322 ee79ab 59 API calls 100321->100322 100323 f5d924 100322->100323 100324 ee7e8c 59 API calls 100323->100324 100325 f5d930 Mailbox 100324->100325 100326 f5d96c Mailbox 100325->100326 100362 f5d0f3 61 API calls 2 library calls 100325->100362 100326->100302 100328 f5ca9d 100327->100328 100332 f5caf2 100327->100332 100329 f00f36 Mailbox 59 API calls 100328->100329 100331 f5cabf 100329->100331 100330 f00f36 Mailbox 59 API calls 100330->100331 100331->100330 100331->100332 100333 f5db64 100332->100333 100334 f5dd8d Mailbox 100333->100334 100341 f5db87 _strcat _wcscpy __NMSG_WRITE 100333->100341 100334->100292 100335 ee9d46 59 API calls 100335->100341 100336 ee9c9c 59 API calls 100336->100341 100337 ee9cf8 59 API calls 100337->100341 100338 ee9997 84 API calls 100338->100341 100339 f0588c 58 API calls __malloc_crt 100339->100341 100341->100334 100341->100335 100341->100336 100341->100337 100341->100338 100341->100339 100365 f4592e 61 API calls 2 library calls 100341->100365 100345 f00d9d 100342->100345 100343 f00e35 VirtualProtect 100344 f00e03 100343->100344 100344->100295 100344->100296 100345->100343 100345->100344 100346->100302 100347->100302 100348->100300 100349->100307 100350->100313 100351->100313 100352->100313 100353->100284 100354->100313 100357 f3f4a4 __NMSG_WRITE 100355->100357 100356 f3f4e3 100356->100320 100356->100325 100357->100356 100360 f3f4d9 100357->100360 100361 f3f58a 100357->100361 100360->100356 100363 ee7a24 61 API calls 100360->100363 100361->100356 100364 ee7a24 61 API calls 100361->100364 100362->100326 100363->100360 100364->100361 100365->100341 100367 f47993 100366->100367 100368 f47873 100366->100368 100367->100142 100369 f4788b 100368->100369 100370 f478b3 100368->100370 100372 f478ca 100368->100372 100369->100370 100377 f4789b 100369->100377 100371 f00f36 Mailbox 59 API calls 100370->100371 100386 f478a9 Mailbox _memmove 100371->100386 100373 f478e7 100372->100373 100374 f00f36 Mailbox 59 API calls 100372->100374 100375 f47920 100373->100375 100376 f47912 100373->100376 100373->100386 100374->100373 100379 f00f36 Mailbox 59 API calls 100375->100379 100378 f00f36 Mailbox 59 API calls 100376->100378 100381 f00f36 Mailbox 59 API calls 100377->100381 100378->100386 100382 f47926 100379->100382 100380 f00f36 Mailbox 59 API calls 100380->100367 100381->100386 100387 f47514 59 API calls Mailbox 100382->100387 100384 f47932 100388 ee5b75 61 API calls Mailbox 100384->100388 100386->100380 100387->100384 100388->100386 100389->100146 100390->100190 100391->100189 100392->100151 100393->100188 100394->100188 100395->100212 100396->100199 100398 f3633f 100397->100398 100399 f3635c 100397->100399 100398->100399 100401 f3631f 59 API calls Mailbox 100398->100401 100399->100231 100401->100398 100402 eee70b 100405 eed260 100402->100405 100404 eee719 100406 eed27d 100405->100406 100423 eed4dd 100405->100423 100407 f229ea 100406->100407 100408 f22a39 100406->100408 100432 eed2a4 100406->100432 100409 f229ed 100407->100409 100419 f22a08 100407->100419 100449 f5a4fb 331 API calls __cinit 100408->100449 100412 f229f9 100409->100412 100409->100432 100447 f5ab0f 331 API calls 100412->100447 100415 f02ec0 __cinit 67 API calls 100415->100432 100416 f22c0e 100416->100416 100417 eed594 100441 ee8bb2 68 API calls 100417->100441 100418 eed6ab 100418->100404 100419->100423 100448 f5afb7 331 API calls 3 library calls 100419->100448 100423->100418 100454 f49ed4 89 API calls 4 library calls 100423->100454 100424 f22b55 100453 f5a866 89 API calls 100424->100453 100425 eed5a3 100425->100404 100428 ee8620 69 API calls 100428->100432 100432->100415 100432->100417 100432->100418 100432->100423 100432->100424 100432->100428 100436 eea000 331 API calls 100432->100436 100437 ee81a7 59 API calls 100432->100437 100439 ee88a0 68 API calls __cinit 100432->100439 100440 ee86a2 68 API calls 100432->100440 100442 ee859a 68 API calls 100432->100442 100443 eed0dc 331 API calls 100432->100443 100444 ee9f3a 59 API calls Mailbox 100432->100444 100445 eed060 89 API calls 100432->100445 100446 eecedd 331 API calls 100432->100446 100450 ee8bb2 68 API calls 100432->100450 100451 ee9e9c 60 API calls Mailbox 100432->100451 100452 f36ae3 60 API calls 100432->100452 100436->100432 100437->100432 100439->100432 100440->100432 100441->100425 100442->100432 100443->100432 100444->100432 100445->100432 100446->100432 100447->100418 100448->100423 100449->100432 100450->100432 100451->100432 100452->100432 100453->100423 100454->100416 100455 1658503 100458 1658178 100455->100458 100457 165854f 100471 1655ba8 100458->100471 100461 1658248 CreateFileW 100463 1658255 100461->100463 100468 1658217 100461->100468 100462 1658271 VirtualAlloc 100462->100463 100464 1658292 ReadFile 100462->100464 100465 1658464 VirtualFree 100463->100465 100466 1658472 100463->100466 100464->100463 100467 16582b0 VirtualAlloc 100464->100467 100465->100466 100466->100457 100467->100463 100467->100468 100468->100462 100468->100463 100469 1658378 CloseHandle 100468->100469 100470 1658388 VirtualFree 100468->100470 100474 1659088 GetPEB 100468->100474 100469->100468 100470->100468 100476 1659028 GetPEB 100471->100476 100473 1656233 100473->100468 100475 16590b2 100474->100475 100475->100461 100477 1659052 100476->100477 100477->100473 100478 f20155 100485 eeae4f Mailbox 100478->100485 100479 eeb6d1 100491 f49ed4 89 API calls 4 library calls 100479->100491 100481 f20bb5 100482 f363f2 Mailbox 59 API calls 100481->100482 100483 f20bbe 100482->100483 100485->100479 100485->100481 100485->100483 100486 f5e037 130 API calls 100485->100486 100487 f4d107 101 API calls 100485->100487 100488 f487be 61 API calls 100485->100488 100489 ef2123 95 API calls 100485->100489 100490 ee9df0 59 API calls Mailbox 100485->100490 100486->100485 100487->100485 100488->100485 100489->100485 100490->100485 100491->100481 100492 ee1066 100497 eef8cf 100492->100497 100494 ee106c 100495 f02ec0 __cinit 67 API calls 100494->100495 100496 ee1076 100495->100496 100498 eef8f0 100497->100498 100530 f00083 100498->100530 100502 eef937 100503 ee77c7 59 API calls 100502->100503 100504 eef941 100503->100504 100505 ee77c7 59 API calls 100504->100505 100506 eef94b 100505->100506 100507 ee77c7 59 API calls 100506->100507 100508 eef955 100507->100508 100509 ee77c7 59 API calls 100508->100509 100510 eef993 100509->100510 100511 ee77c7 59 API calls 100510->100511 100512 eefa5e 100511->100512 100540 ef60e7 100512->100540 100516 eefa90 100517 ee77c7 59 API calls 100516->100517 100518 eefa9a 100517->100518 100568 efff1e 100518->100568 100520 eefae1 100521 eefaf1 GetStdHandle 100520->100521 100522 eefb3d 100521->100522 100523 f24904 100521->100523 100524 eefb45 OleInitialize 100522->100524 100523->100522 100525 f2490d 100523->100525 100524->100494 100575 f46be1 64 API calls Mailbox 100525->100575 100527 f24914 100576 f472b0 CreateThread 100527->100576 100529 f24920 CloseHandle 100529->100524 100577 f0015c 100530->100577 100533 f0015c 59 API calls 100534 f000c5 100533->100534 100535 ee77c7 59 API calls 100534->100535 100536 f000d1 100535->100536 100537 ee7d2c 59 API calls 100536->100537 100538 eef8f6 100537->100538 100539 f002e2 6 API calls 100538->100539 100539->100502 100541 ee77c7 59 API calls 100540->100541 100542 ef60f7 100541->100542 100543 ee77c7 59 API calls 100542->100543 100544 ef60ff 100543->100544 100584 ef5bfd 100544->100584 100547 ef5bfd 59 API calls 100548 ef610f 100547->100548 100549 ee77c7 59 API calls 100548->100549 100550 ef611a 100549->100550 100551 f00f36 Mailbox 59 API calls 100550->100551 100552 eefa68 100551->100552 100553 ef6259 100552->100553 100554 ef6267 100553->100554 100555 ee77c7 59 API calls 100554->100555 100556 ef6272 100555->100556 100557 ee77c7 59 API calls 100556->100557 100558 ef627d 100557->100558 100559 ee77c7 59 API calls 100558->100559 100560 ef6288 100559->100560 100561 ee77c7 59 API calls 100560->100561 100562 ef6293 100561->100562 100563 ef5bfd 59 API calls 100562->100563 100564 ef629e 100563->100564 100565 f00f36 Mailbox 59 API calls 100564->100565 100566 ef62a5 RegisterWindowMessageW 100565->100566 100566->100516 100569 efff2e 100568->100569 100570 f35ac5 100568->100570 100571 f00f36 Mailbox 59 API calls 100569->100571 100587 f49b90 60 API calls 100570->100587 100573 efff36 100571->100573 100573->100520 100574 f35ad0 100575->100527 100576->100529 100588 f47296 65 API calls 100576->100588 100578 ee77c7 59 API calls 100577->100578 100579 f00167 100578->100579 100580 ee77c7 59 API calls 100579->100580 100581 f0016f 100580->100581 100582 ee77c7 59 API calls 100581->100582 100583 f000bb 100582->100583 100583->100533 100585 ee77c7 59 API calls 100584->100585 100586 ef5c05 100585->100586 100586->100547 100587->100574 100589 ee107d 100594 ee71eb 100589->100594 100591 ee108c 100592 f02ec0 __cinit 67 API calls 100591->100592 100593 ee1096 100592->100593 100595 ee71fb __write_nolock 100594->100595 100596 ee77c7 59 API calls 100595->100596 100597 ee72b1 100596->100597 100598 ee4864 61 API calls 100597->100598 100599 ee72ba 100598->100599 100625 f0068b 100599->100625 100602 ee7e0b 59 API calls 100603 ee72d3 100602->100603 100604 ee3f84 59 API calls 100603->100604 100605 ee72e2 100604->100605 100606 ee77c7 59 API calls 100605->100606 100607 ee72eb 100606->100607 100608 ee7eec 59 API calls 100607->100608 100609 ee72f4 RegOpenKeyExW 100608->100609 100610 f1ec0a RegQueryValueExW 100609->100610 100614 ee7316 Mailbox 100609->100614 100611 f1ec27 100610->100611 100612 f1ec9c RegCloseKey 100610->100612 100613 f00f36 Mailbox 59 API calls 100611->100613 100612->100614 100624 f1ecae _wcscat Mailbox __NMSG_WRITE 100612->100624 100615 f1ec40 100613->100615 100614->100591 100616 ee538e 59 API calls 100615->100616 100617 f1ec4b RegQueryValueExW 100616->100617 100618 f1ec68 100617->100618 100621 f1ec82 100617->100621 100619 ee7d2c 59 API calls 100618->100619 100619->100621 100620 ee7b52 59 API calls 100620->100624 100621->100612 100622 ee7f41 59 API calls 100622->100624 100623 ee3f84 59 API calls 100623->100624 100624->100614 100624->100620 100624->100622 100624->100623 100626 f11ac0 __write_nolock 100625->100626 100627 f00698 GetFullPathNameW 100626->100627 100628 f006ba 100627->100628 100629 ee7d2c 59 API calls 100628->100629 100630 ee72c5 100629->100630 100630->100602 100631 ee1016 100636 ee4ad2 100631->100636 100634 f02ec0 __cinit 67 API calls 100635 ee1025 100634->100635 100637 f00f36 Mailbox 59 API calls 100636->100637 100638 ee4ada 100637->100638 100639 ee101b 100638->100639 100643 ee4a94 100638->100643 100639->100634 100644 ee4a9d 100643->100644 100645 ee4aaf 100643->100645 100646 f02ec0 __cinit 67 API calls 100644->100646 100647 ee4afe 100645->100647 100646->100645 100648 ee77c7 59 API calls 100647->100648 100649 ee4b16 GetVersionExW 100648->100649 100650 ee7d2c 59 API calls 100649->100650 100651 ee4b59 100650->100651 100652 ee7e8c 59 API calls 100651->100652 100661 ee4b86 100651->100661 100653 ee4b7a 100652->100653 100654 ee7886 59 API calls 100653->100654 100654->100661 100655 ee4bf1 GetCurrentProcess IsWow64Process 100656 ee4c0a 100655->100656 100658 ee4c89 GetSystemInfo 100656->100658 100659 ee4c20 100656->100659 100657 f1dbbd 100660 ee4c56 100658->100660 100671 ee4c95 100659->100671 100660->100639 100661->100655 100661->100657 100664 ee4c7d GetSystemInfo 100666 ee4c47 100664->100666 100665 ee4c32 100667 ee4c95 2 API calls 100665->100667 100666->100660 100668 ee4c4d FreeLibrary 100666->100668 100669 ee4c3a GetNativeSystemInfo 100667->100669 100668->100660 100669->100666 100672 ee4c2e 100671->100672 100673 ee4c9e LoadLibraryA 100671->100673 100672->100664 100672->100665 100673->100672 100674 ee4caf GetProcAddress 100673->100674 100674->100672 100675 ee1055 100680 ee2649 100675->100680 100678 f02ec0 __cinit 67 API calls 100679 ee1064 100678->100679 100681 ee77c7 59 API calls 100680->100681 100682 ee26b7 100681->100682 100687 ee3582 100682->100687 100684 ee2754 100685 ee105a 100684->100685 100690 ee3416 59 API calls 2 library calls 100684->100690 100685->100678 100691 ee35b0 100687->100691 100690->100684 100692 ee35a1 100691->100692 100693 ee35bd 100691->100693 100692->100684 100693->100692 100694 ee35c4 RegOpenKeyExW 100693->100694 100694->100692 100695 ee35de RegQueryValueExW 100694->100695 100696 ee35ff 100695->100696 100697 ee3614 RegCloseKey 100695->100697 100696->100697 100697->100692 100698 1657f58 100699 1655ba8 GetPEB 100698->100699 100700 1658000 100699->100700 100712 1657e48 100700->100712 100713 1657e51 Sleep 100712->100713 100714 1657e5f 100713->100714 100715 ee3633 100716 ee366a 100715->100716 100717 ee3688 100716->100717 100718 ee36e7 100716->100718 100755 ee36e5 100716->100755 100722 ee375d PostQuitMessage 100717->100722 100723 ee3695 100717->100723 100720 ee36ed 100718->100720 100721 f1d24c 100718->100721 100719 ee36ca DefWindowProcW 100757 ee36d8 100719->100757 100724 ee3715 SetTimer RegisterWindowMessageW 100720->100724 100725 ee36f2 100720->100725 100765 ef11d0 10 API calls Mailbox 100721->100765 100722->100757 100726 f1d2bf 100723->100726 100727 ee36a0 100723->100727 100731 ee373e CreatePopupMenu 100724->100731 100724->100757 100729 ee36f9 KillTimer 100725->100729 100730 f1d1ef 100725->100730 100769 f4281f 71 API calls _memset 100726->100769 100732 ee36a8 100727->100732 100733 ee3767 100727->100733 100760 ee44cb Shell_NotifyIconW _memset 100729->100760 100738 f1d1f4 100730->100738 100739 f1d228 MoveWindow 100730->100739 100731->100757 100741 f1d2a4 100732->100741 100742 ee36b3 100732->100742 100763 ee4531 64 API calls _memset 100733->100763 100735 f1d273 100766 ef11f3 331 API calls Mailbox 100735->100766 100746 f1d217 SetFocus 100738->100746 100747 f1d1f8 100738->100747 100739->100757 100741->100719 100768 f37f5e 59 API calls Mailbox 100741->100768 100744 ee36be 100742->100744 100749 ee374b 100742->100749 100743 f1d2d1 100743->100719 100743->100757 100744->100719 100767 ee44cb Shell_NotifyIconW _memset 100744->100767 100745 ee375b 100745->100757 100746->100757 100747->100744 100750 f1d201 100747->100750 100748 ee370c 100761 ee3114 DeleteObject DestroyWindow Mailbox 100748->100761 100762 ee45df 81 API calls _memset 100749->100762 100764 ef11d0 10 API calls Mailbox 100750->100764 100755->100719 100758 f1d298 100759 ee43db 68 API calls 100758->100759 100759->100755 100760->100748 100761->100757 100762->100745 100763->100745 100764->100757 100765->100735 100766->100744 100767->100758 100768->100755 100769->100743

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EE3B7A
                                        • IsDebuggerPresent.KERNEL32 ref: 00EE3B8C
                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,00FA52F8,00FA52E0,?,?), ref: 00EE3BFD
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                          • Part of subcall function 00EF0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00EE3C26,00FA52F8,?,?,?), ref: 00EF0ACE
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE3C81
                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00F97770,00000010), ref: 00F1D3EC
                                        • SetCurrentDirectoryW.KERNEL32(?,00FA52F8,?,?,?), ref: 00F1D424
                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00F94260,00FA52F8,?,?,?), ref: 00F1D4AA
                                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F1D4B1
                                          • Part of subcall function 00EE3A58: GetSysColorBrush.USER32(0000000F), ref: 00EE3A62
                                          • Part of subcall function 00EE3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00EE3A71
                                          • Part of subcall function 00EE3A58: LoadIconW.USER32(00000063), ref: 00EE3A88
                                          • Part of subcall function 00EE3A58: LoadIconW.USER32(000000A4), ref: 00EE3A9A
                                          • Part of subcall function 00EE3A58: LoadIconW.USER32(000000A2), ref: 00EE3AAC
                                          • Part of subcall function 00EE3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00EE3AD2
                                          • Part of subcall function 00EE3A58: RegisterClassExW.USER32(?), ref: 00EE3B28
                                          • Part of subcall function 00EE39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00EE3A15
                                          • Part of subcall function 00EE39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00EE3A36
                                          • Part of subcall function 00EE39E7: ShowWindow.USER32(00000000,?,?), ref: 00EE3A4A
                                          • Part of subcall function 00EE39E7: ShowWindow.USER32(00000000,?,?), ref: 00EE3A53
                                          • Part of subcall function 00EE43DB: _memset.LIBCMT ref: 00EE4401
                                          • Part of subcall function 00EE43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00EE44A6
                                        Strings
                                        • runas, xrefs: 00F1D4A5
                                        • This is a third-party compiled AutoIt script., xrefs: 00F1D3E4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                        • String ID: This is a third-party compiled AutoIt script.$runas
                                        • API String ID: 529118366-3287110873
                                        • Opcode ID: 32f7e8beb6186fc84862824f7367fd29cc5989c02591d9a9d1966cabdc1d4a14
                                        • Instruction ID: 8a1be0f643b02c218eda5fbaf5cf83639f05eb973810730844876705cf4c7173
                                        • Opcode Fuzzy Hash: 32f7e8beb6186fc84862824f7367fd29cc5989c02591d9a9d1966cabdc1d4a14
                                        • Instruction Fuzzy Hash: E351E6B190428CBADF11EBB5EC05AFDBBF4AB46700F105169F861B31A2DA709645EB21

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 942 ee4fe9-ee5001 CreateStreamOnHGlobal 943 ee5003-ee501a FindResourceExW 942->943 944 ee5021-ee5026 942->944 945 f1dc8c-f1dc9b LoadResource 943->945 946 ee5020 943->946 945->946 947 f1dca1-f1dcaf SizeofResource 945->947 946->944 947->946 948 f1dcb5-f1dcc0 LockResource 947->948 948->946 949 f1dcc6-f1dcce 948->949 950 f1dcd2-f1dce4 949->950 950->946
                                        APIs
                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00EE4EEE,?,?,00000000,00000000), ref: 00EE4FF9
                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00EE4EEE,?,?,00000000,00000000), ref: 00EE5010
                                        • LoadResource.KERNEL32(?,00000000,?,?,00EE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00EE4F8F), ref: 00F1DC90
                                        • SizeofResource.KERNEL32(?,00000000,?,?,00EE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00EE4F8F), ref: 00F1DCA5
                                        • LockResource.KERNEL32(N,?,?,00EE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00EE4F8F,00000000), ref: 00F1DCB8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                        • String ID: SCRIPT$N
                                        • API String ID: 3051347437-3852340653
                                        • Opcode ID: 30e75e42a2cee68dfa546ca0d184e9a28eb46aa1ef40989737008c719c9cf79b
                                        • Instruction ID: c8b70e22f3aa7bee87c2b267e5d4527a6200822e5f2438069fbe5536ca4cd633
                                        • Opcode Fuzzy Hash: 30e75e42a2cee68dfa546ca0d184e9a28eb46aa1ef40989737008c719c9cf79b
                                        • Instruction Fuzzy Hash: D1117C76200708BFD7218B66EC58F677BB9EBC9B15F20456CF416D6260DBB1EC049AA0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1006 ee4afe-ee4b5e call ee77c7 GetVersionExW call ee7d2c 1011 ee4c69-ee4c6b 1006->1011 1012 ee4b64 1006->1012 1013 f1dac0-f1dacc 1011->1013 1014 ee4b67-ee4b6c 1012->1014 1015 f1dacd-f1dad1 1013->1015 1016 ee4b72 1014->1016 1017 ee4c70-ee4c71 1014->1017 1019 f1dad3 1015->1019 1020 f1dad4-f1dae0 1015->1020 1018 ee4b73-ee4baa call ee7e8c call ee7886 1016->1018 1017->1018 1028 f1dbbd-f1dbc0 1018->1028 1029 ee4bb0-ee4bb1 1018->1029 1019->1020 1020->1015 1022 f1dae2-f1dae7 1020->1022 1022->1014 1024 f1daed-f1daf4 1022->1024 1024->1013 1026 f1daf6 1024->1026 1030 f1dafb-f1dafe 1026->1030 1031 f1dbc2 1028->1031 1032 f1dbd9-f1dbdd 1028->1032 1029->1030 1033 ee4bb7-ee4bc2 1029->1033 1034 f1db04-f1db22 1030->1034 1035 ee4bf1-ee4c08 GetCurrentProcess IsWow64Process 1030->1035 1036 f1dbc5 1031->1036 1040 f1dbc8-f1dbd1 1032->1040 1041 f1dbdf-f1dbe8 1032->1041 1037 f1db43-f1db49 1033->1037 1038 ee4bc8-ee4bca 1033->1038 1034->1035 1039 f1db28-f1db2e 1034->1039 1042 ee4c0d-ee4c1e 1035->1042 1043 ee4c0a 1035->1043 1036->1040 1048 f1db53-f1db59 1037->1048 1049 f1db4b-f1db4e 1037->1049 1044 ee4bd0-ee4bd3 1038->1044 1045 f1db5e-f1db6a 1038->1045 1046 f1db30-f1db33 1039->1046 1047 f1db38-f1db3e 1039->1047 1040->1032 1041->1036 1050 f1dbea-f1dbed 1041->1050 1051 ee4c89-ee4c93 GetSystemInfo 1042->1051 1052 ee4c20-ee4c30 call ee4c95 1042->1052 1043->1042 1053 ee4bd9-ee4be8 1044->1053 1054 f1db8a-f1db8d 1044->1054 1056 f1db74-f1db7a 1045->1056 1057 f1db6c-f1db6f 1045->1057 1046->1035 1047->1035 1048->1035 1049->1035 1050->1040 1055 ee4c56-ee4c66 1051->1055 1063 ee4c7d-ee4c87 GetSystemInfo 1052->1063 1064 ee4c32-ee4c3f call ee4c95 1052->1064 1059 ee4bee 1053->1059 1060 f1db7f-f1db85 1053->1060 1054->1035 1062 f1db93-f1dba8 1054->1062 1056->1035 1057->1035 1059->1035 1060->1035 1065 f1dbb2-f1dbb8 1062->1065 1066 f1dbaa-f1dbad 1062->1066 1067 ee4c47-ee4c4b 1063->1067 1071 ee4c76-ee4c7b 1064->1071 1072 ee4c41-ee4c45 GetNativeSystemInfo 1064->1072 1065->1035 1066->1035 1067->1055 1069 ee4c4d-ee4c50 FreeLibrary 1067->1069 1069->1055 1071->1072 1072->1067
                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 00EE4B2B
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        • GetCurrentProcess.KERNEL32(?,00F6FAEC,00000000,00000000,?), ref: 00EE4BF8
                                        • IsWow64Process.KERNEL32(00000000), ref: 00EE4BFF
                                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00EE4C45
                                        • FreeLibrary.KERNEL32(00000000), ref: 00EE4C50
                                        • GetSystemInfo.KERNEL32(00000000), ref: 00EE4C81
                                        • GetSystemInfo.KERNEL32(00000000), ref: 00EE4C8D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                        • String ID:
                                        • API String ID: 1986165174-0
                                        • Opcode ID: 8d1457e6e6930e393126ca2e52a58b0744e3befa09a9f5646c82a170a8110b39
                                        • Instruction ID: b3a3aa86542fa0ad30f200b951141c30eb3b5fd689304f13f5d0ed6b74a7b569
                                        • Opcode Fuzzy Hash: 8d1457e6e6930e393126ca2e52a58b0744e3befa09a9f5646c82a170a8110b39
                                        • Instruction Fuzzy Hash: 5791057194E7C8DEC731CB6994511EAFFF4AF2A300B58499DD0CB93A42D224F948D719
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,00F1E6F1), ref: 00F444AB
                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00F444BC
                                        • FindClose.KERNEL32(00000000), ref: 00F444CC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirst
                                        • String ID:
                                        • API String ID: 48322524-0
                                        • Opcode ID: 61409348db10b8e08ee6efba4df6d7b17f8e8a68608ac7d9dcb85b035be0f5dc
                                        • Instruction ID: b5105d4054e631e078342b6a15d8996a3c7ce476dcc15995e69f92af9c20ab40
                                        • Opcode Fuzzy Hash: 61409348db10b8e08ee6efba4df6d7b17f8e8a68608ac7d9dcb85b035be0f5dc
                                        • Instruction Fuzzy Hash: 23E0D832810404574210E738FC0D5E97B5CAE05335F100716FD35D11E0E7B46914A595
                                        Strings
                                        • Variable must be of type 'Object'., xrefs: 00F241BB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Variable must be of type 'Object'.
                                        • API String ID: 0-109567571
                                        • Opcode ID: 40016bdc2bd86d458f76dbc420e87bcd782e4fc327a4ef2d603d0820207de304
                                        • Instruction ID: 9f7fe19f146a0fba975d587d0924bc480585d72bcd96d30e396acb69c180fb23
                                        • Opcode Fuzzy Hash: 40016bdc2bd86d458f76dbc420e87bcd782e4fc327a4ef2d603d0820207de304
                                        • Instruction Fuzzy Hash: CBA29C74A00259CFCB24CF95C880AAEB7B1FF49314F289069E906BB351D775ED42DB91
                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EF0BBB
                                        • timeGetTime.WINMM ref: 00EF0E76
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EF0FB3
                                        • Sleep.KERNEL32(0000000A), ref: 00EF0FC1
                                        • LockWindowUpdate.USER32(00000000,?,?), ref: 00EF105A
                                        • DestroyWindow.USER32 ref: 00EF1066
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EF1080
                                        • Sleep.KERNEL32(0000000A,?,?), ref: 00F251DC
                                        • TranslateMessage.USER32(?), ref: 00F25FB9
                                        • DispatchMessageW.USER32(?), ref: 00F25FC7
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F25FDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                        • API String ID: 4212290369-3242690629
                                        • Opcode ID: 6d6500ccc11605d038f22d43a621927f401503013ef70e9884165efe7e0b7357
                                        • Instruction ID: 70fc00b5d1c3585cc6b1dd2cd31c8a09dcdd67bedc69f1a1978afc7775a4706e
                                        • Opcode Fuzzy Hash: 6d6500ccc11605d038f22d43a621927f401503013ef70e9884165efe7e0b7357
                                        • Instruction Fuzzy Hash: 90B23370608745DFDB24DF20D884BAAB7E1FF84714F14491DF59AA72A2CB74E844EB82

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00F49008: __time64.LIBCMT ref: 00F49012
                                          • Part of subcall function 00EE5045: _fseek.LIBCMT ref: 00EE505D
                                        • __wsplitpath.LIBCMT ref: 00F492DD
                                          • Part of subcall function 00F0426E: __wsplitpath_helper.LIBCMT ref: 00F042AE
                                        • _wcscpy.LIBCMT ref: 00F492F0
                                        • _wcscat.LIBCMT ref: 00F49303
                                        • __wsplitpath.LIBCMT ref: 00F49328
                                        • _wcscat.LIBCMT ref: 00F4933E
                                        • _wcscat.LIBCMT ref: 00F49351
                                          • Part of subcall function 00F4904E: _memmove.LIBCMT ref: 00F49087
                                          • Part of subcall function 00F4904E: _memmove.LIBCMT ref: 00F49096
                                        • _wcscmp.LIBCMT ref: 00F49298
                                          • Part of subcall function 00F497DD: _wcscmp.LIBCMT ref: 00F498CD
                                          • Part of subcall function 00F497DD: _wcscmp.LIBCMT ref: 00F498E0
                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F494FB
                                        • _wcsncpy.LIBCMT ref: 00F4956E
                                        • DeleteFileW.KERNEL32(?,?), ref: 00F495A4
                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F495BA
                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F495CB
                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F495DD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                        • String ID:
                                        • API String ID: 1500180987-0
                                        • Opcode ID: 2debc2756f7951fa557aeca3ff36347ddbf370c02f672b89933f453fb72deb1f
                                        • Instruction ID: 2d4071b55c0c9d2631409b8aa9d04415ff5288e18df095c67b3c31c97428e594
                                        • Opcode Fuzzy Hash: 2debc2756f7951fa557aeca3ff36347ddbf370c02f672b89933f453fb72deb1f
                                        • Instruction Fuzzy Hash: CCC15CB1E0411DAACF21DF95CC85ADFBBBDEF44314F0040AAFA09E6151DB749A44AF61

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 00EE3074
                                        • RegisterClassExW.USER32(00000030), ref: 00EE309E
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EE30AF
                                        • InitCommonControlsEx.COMCTL32(?), ref: 00EE30CC
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00EE30DC
                                        • LoadIconW.USER32(000000A9), ref: 00EE30F2
                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00EE3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: fec184cfdfbf6cdc24afa31408632bed30fc669373719410f5643d717019df7b
                                        • Instruction ID: cd9e7e2f7456782dc0d8e4e5061781feac48ff4d22f18084ffde0602ffaf5da1
                                        • Opcode Fuzzy Hash: fec184cfdfbf6cdc24afa31408632bed30fc669373719410f5643d717019df7b
                                        • Instruction Fuzzy Hash: 613119B1841309AFDB50CFA4EC85BCDBBF4FB09710F14452AE590E62A1D3B94589EF51

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 00EE3074
                                        • RegisterClassExW.USER32(00000030), ref: 00EE309E
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EE30AF
                                        • InitCommonControlsEx.COMCTL32(?), ref: 00EE30CC
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00EE30DC
                                        • LoadIconW.USER32(000000A9), ref: 00EE30F2
                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00EE3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: c9dd22c77d1ce286390cd79152148b4ccadf29a85292a8afd8284fa3a5d49828
                                        • Instruction ID: f1a304fbccc165a3f8ec294080e3c4e373a6c621becd8963202a9c43c9d6c03b
                                        • Opcode Fuzzy Hash: c9dd22c77d1ce286390cd79152148b4ccadf29a85292a8afd8284fa3a5d49828
                                        • Instruction Fuzzy Hash: C721C4B1D1121CAFDB00DFA4ED89B9DBBF4FB09B00F00412AF921A62A0D7B54548AF91

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00EE4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FA52F8,?,00EE37C0,?), ref: 00EE4882
                                          • Part of subcall function 00F0068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00EE72C5), ref: 00F006AD
                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00EE7308
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F1EC21
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F1EC62
                                        • RegCloseKey.ADVAPI32(?), ref: 00F1ECA0
                                        • _wcscat.LIBCMT ref: 00F1ECF9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                        • API String ID: 2673923337-2727554177
                                        • Opcode ID: 8eda847e161ad615791863adfc194e8220129ddc3561edfd93b3450c8ade39f2
                                        • Instruction ID: 5caa9b3fa389ab5347d04d6fa90cbf3e0ff4525fad9a1ac3cda907441f0d7dc5
                                        • Opcode Fuzzy Hash: 8eda847e161ad615791863adfc194e8220129ddc3561edfd93b3450c8ade39f2
                                        • Instruction Fuzzy Hash: FC71C2B15083099ECB04DF65EC81A9BBBE8FF99350F44052EF445D31B1DB709948EB92

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 00EE3A62
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00EE3A71
                                        • LoadIconW.USER32(00000063), ref: 00EE3A88
                                        • LoadIconW.USER32(000000A4), ref: 00EE3A9A
                                        • LoadIconW.USER32(000000A2), ref: 00EE3AAC
                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00EE3AD2
                                        • RegisterClassExW.USER32(?), ref: 00EE3B28
                                          • Part of subcall function 00EE3041: GetSysColorBrush.USER32(0000000F), ref: 00EE3074
                                          • Part of subcall function 00EE3041: RegisterClassExW.USER32(00000030), ref: 00EE309E
                                          • Part of subcall function 00EE3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EE30AF
                                          • Part of subcall function 00EE3041: InitCommonControlsEx.COMCTL32(?), ref: 00EE30CC
                                          • Part of subcall function 00EE3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00EE30DC
                                          • Part of subcall function 00EE3041: LoadIconW.USER32(000000A9), ref: 00EE30F2
                                          • Part of subcall function 00EE3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00EE3101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                        • String ID: #$0$AutoIt v3
                                        • API String ID: 423443420-4155596026
                                        • Opcode ID: 3b4f1dfd084fe50060f71fc12db4365f3d8d88e21859a8f051b3edfde3e85b08
                                        • Instruction ID: 1af126ee713407aba1e815b4a133278ee8f1c7e7766635e4d85a4f1b5be30969
                                        • Opcode Fuzzy Hash: 3b4f1dfd084fe50060f71fc12db4365f3d8d88e21859a8f051b3edfde3e85b08
                                        • Instruction Fuzzy Hash: 962126B1D0030CAFEB10DFA5ED09B9D7BF4FB0AB15F10012AF504AA2A1D3B55A54AF94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 767 ee3633-ee3681 769 ee3683-ee3686 767->769 770 ee36e1-ee36e3 767->770 772 ee3688-ee368f 769->772 773 ee36e7 769->773 770->769 771 ee36e5 770->771 774 ee36ca-ee36d2 DefWindowProcW 771->774 777 ee375d-ee3765 PostQuitMessage 772->777 778 ee3695-ee369a 772->778 775 ee36ed-ee36f0 773->775 776 f1d24c-f1d27a call ef11d0 call ef11f3 773->776 779 ee36d8-ee36de 774->779 781 ee3715-ee373c SetTimer RegisterWindowMessageW 775->781 782 ee36f2-ee36f3 775->782 810 f1d27f-f1d286 776->810 780 ee3711-ee3713 777->780 783 f1d2bf-f1d2d3 call f4281f 778->783 784 ee36a0-ee36a2 778->784 780->779 781->780 788 ee373e-ee3749 CreatePopupMenu 781->788 786 ee36f9-ee370c KillTimer call ee44cb call ee3114 782->786 787 f1d1ef-f1d1f2 782->787 783->780 801 f1d2d9 783->801 789 ee36a8-ee36ad 784->789 790 ee3767-ee3776 call ee4531 784->790 786->780 795 f1d1f4-f1d1f6 787->795 796 f1d228-f1d247 MoveWindow 787->796 788->780 798 f1d2a4-f1d2ab 789->798 799 ee36b3-ee36b8 789->799 790->780 804 f1d217-f1d223 SetFocus 795->804 805 f1d1f8-f1d1fb 795->805 796->780 798->774 807 f1d2b1-f1d2ba call f37f5e 798->807 808 ee36be-ee36c4 799->808 809 ee374b-ee375b call ee45df 799->809 801->774 804->780 805->808 811 f1d201-f1d212 call ef11d0 805->811 807->774 808->774 808->810 809->780 810->774 816 f1d28c-f1d29f call ee44cb call ee43db 810->816 811->780 816->774
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00EE36D2
                                        • KillTimer.USER32(?,00000001), ref: 00EE36FC
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EE371F
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EE372A
                                        • CreatePopupMenu.USER32 ref: 00EE373E
                                        • PostQuitMessage.USER32(00000000), ref: 00EE375F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                        • String ID: TaskbarCreated
                                        • API String ID: 129472671-2362178303
                                        • Opcode ID: e64353d56437f3f0cc81bc2d5f2089d7596a7e5739685c44563b6114ea2d49b3
                                        • Instruction ID: 7d1cf7bcf193c2b7962543dc42ef224b616f391afe9698a9ff375dd167b3df43
                                        • Opcode Fuzzy Hash: e64353d56437f3f0cc81bc2d5f2089d7596a7e5739685c44563b6114ea2d49b3
                                        • Instruction Fuzzy Hash: CB4127F220058DFBDB109F75EC0DBBA37A5EB01700F141126FA12F72A2CAA59E44B261

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                        • API String ID: 1825951767-3513169116
                                        • Opcode ID: bdb006bd34584721bf7592a07a12ea35077651eae968515838982f2a842c6bd8
                                        • Instruction ID: f667541f1a53c1dad96493d2f5920122daf8e137cff019e4b1ad15b6d0f39072
                                        • Opcode Fuzzy Hash: bdb006bd34584721bf7592a07a12ea35077651eae968515838982f2a842c6bd8
                                        • Instruction Fuzzy Hash: 62A16171D1025D9ACB14EBE2DC95AEEB7F8BF14700F40102AF416B7192EF759A09DB60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 952 1658178-1658226 call 1655ba8 955 165822d-1658253 call 1659088 CreateFileW 952->955 958 1658255 955->958 959 165825a-165826a 955->959 960 16583a5-16583a9 958->960 964 1658271-165828b VirtualAlloc 959->964 965 165826c 959->965 962 16583eb-16583ee 960->962 963 16583ab-16583af 960->963 966 16583f1-16583f8 962->966 967 16583b1-16583b4 963->967 968 16583bb-16583bf 963->968 971 1658292-16582a9 ReadFile 964->971 972 165828d 964->972 965->960 973 165844d-1658462 966->973 974 16583fa-1658405 966->974 967->968 969 16583c1-16583cb 968->969 970 16583cf-16583d3 968->970 969->970 977 16583d5-16583df 970->977 978 16583e3 970->978 979 16582b0-16582f0 VirtualAlloc 971->979 980 16582ab 971->980 972->960 975 1658464-165846f VirtualFree 973->975 976 1658472-165847a 973->976 981 1658407 974->981 982 1658409-1658415 974->982 975->976 977->978 978->962 983 16582f7-1658312 call 16592d8 979->983 984 16582f2 979->984 980->960 981->973 985 1658417-1658427 982->985 986 1658429-1658435 982->986 992 165831d-1658327 983->992 984->960 990 165844b 985->990 987 1658437-1658440 986->987 988 1658442-1658448 986->988 987->990 988->990 990->966 993 1658329-1658358 call 16592d8 992->993 994 165835a-165836e call 16590e8 992->994 993->992 1000 1658370 994->1000 1001 1658372-1658376 994->1001 1000->960 1002 1658382-1658386 1001->1002 1003 1658378-165837c CloseHandle 1001->1003 1004 1658396-165839f 1002->1004 1005 1658388-1658393 VirtualFree 1002->1005 1003->1002 1004->955 1004->960 1005->1004
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01658249
                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0165846F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateFileFreeVirtual
                                        • String ID:
                                        • API String ID: 204039940-0
                                        • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                        • Instruction ID: b0325a037c85c53f661a0f5ccf6d96a2cc628ecc3cdce0843acba03e268e7ea7
                                        • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                        • Instruction Fuzzy Hash: 55A11870E00209EBEB54CFE5C894BEEBBB9BF48304F208159EA11BB291D7759A41CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1073 ee39e7-ee3a57 CreateWindowExW * 2 ShowWindow * 2
                                        APIs
                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00EE3A15
                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00EE3A36
                                        • ShowWindow.USER32(00000000,?,?), ref: 00EE3A4A
                                        • ShowWindow.USER32(00000000,?,?), ref: 00EE3A53
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$CreateShow
                                        • String ID: AutoIt v3$edit
                                        • API String ID: 1584632944-3779509399
                                        • Opcode ID: 7fc349f6555c08d60953edb362fbab4d5c3d7b6344ea69a7fa56b7f7d5e9e39f
                                        • Instruction ID: 7bc6b4abc633aa53819e0c48736fdfa4beb48b25df09bb02518182f034a6d703
                                        • Opcode Fuzzy Hash: 7fc349f6555c08d60953edb362fbab4d5c3d7b6344ea69a7fa56b7f7d5e9e39f
                                        • Instruction Fuzzy Hash: BEF03AB05102987EEB3057637C08F2B3EBDD7C7F50B00002ABA00A2171C6610800FAB0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1074 1657f58-1658076 call 1655ba8 call 1657e48 CreateFileW 1081 165807d-165808d 1074->1081 1082 1658078 1074->1082 1085 1658094-16580ae VirtualAlloc 1081->1085 1086 165808f 1081->1086 1083 165812d-1658132 1082->1083 1087 16580b0 1085->1087 1088 16580b2-16580c9 ReadFile 1085->1088 1086->1083 1087->1083 1089 16580cd-1658107 call 1657e88 call 1656e48 1088->1089 1090 16580cb 1088->1090 1095 1658123-165812b ExitProcess 1089->1095 1096 1658109-165811e call 1657ed8 1089->1096 1090->1083 1095->1083 1096->1095
                                        APIs
                                          • Part of subcall function 01657E48: Sleep.KERNELBASE(000001F4), ref: 01657E59
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0165806C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateFileSleep
                                        • String ID: EIN2PCUC6GSGTEU
                                        • API String ID: 2694422964-2985934052
                                        • Opcode ID: 058380c4477b17c4634acfda8e149b6d60df8063b77d7fa3c36687b97d5409dc
                                        • Instruction ID: 070e911e843fbf71bfc471104109f2f472001b8bf1dcbc16f076f6db7e0076ee
                                        • Opcode Fuzzy Hash: 058380c4477b17c4634acfda8e149b6d60df8063b77d7fa3c36687b97d5409dc
                                        • Instruction Fuzzy Hash: FF519F71D04249EBEF11DBA4CC14BEEBB79AF18300F004198E609BB2C1D7B91B49CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1098 ee410d-ee4123 1099 ee4129-ee413e call ee7b76 1098->1099 1100 ee4200-ee4204 1098->1100 1103 ee4144-ee4164 call ee7d2c 1099->1103 1104 f1d50d-f1d51c LoadStringW 1099->1104 1107 f1d527-f1d53f call ee7c8e call ee7143 1103->1107 1108 ee416a-ee416e 1103->1108 1104->1107 1118 ee417e-ee41fb call f02f60 call ee463e call f02f3c Shell_NotifyIconW call ee5a64 1107->1118 1119 f1d545-f1d563 call ee7e0b call ee7143 call ee7e0b 1107->1119 1110 ee4174-ee4179 call ee7c8e 1108->1110 1111 ee4205-ee420e call ee81a7 1108->1111 1110->1118 1111->1118 1118->1100 1119->1118
                                        APIs
                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F1D51C
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        • _memset.LIBCMT ref: 00EE418D
                                        • _wcscpy.LIBCMT ref: 00EE41E1
                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EE41F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                        • String ID: Line:
                                        • API String ID: 3942752672-1585850449
                                        • Opcode ID: ed20a904f657fdd1f8c459a9ad19573a4dda9c745b990ce15146a77f8bc21722
                                        • Instruction ID: 55bf2f62447dbc5f228ba86f03e0ed2f6716b66addf60c3a6c3f7b594d34783a
                                        • Opcode Fuzzy Hash: ed20a904f657fdd1f8c459a9ad19573a4dda9c745b990ce15146a77f8bc21722
                                        • Instruction Fuzzy Hash: 3231E0B140838DAAE721EB61DC4ABDB77ECAF55704F10551EF184A20E1EB70A688D793

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1133 f0558d-f055a6 1134 f055c3 1133->1134 1135 f055a8-f055ad 1133->1135 1136 f055c5-f055cb 1134->1136 1135->1134 1137 f055af-f055b1 1135->1137 1138 f055b3-f055b8 call f08ca8 1137->1138 1139 f055cc-f055d1 1137->1139 1151 f055be call f08f36 1138->1151 1140 f055d3-f055dd 1139->1140 1141 f055df-f055e3 1139->1141 1140->1141 1143 f05603-f05612 1140->1143 1144 f055f3-f055f5 1141->1144 1145 f055e5-f055f0 call f02f60 1141->1145 1149 f05614-f05617 1143->1149 1150 f05619 1143->1150 1144->1138 1148 f055f7-f05601 1144->1148 1145->1144 1148->1138 1148->1143 1153 f0561e-f05623 1149->1153 1150->1153 1151->1134 1155 f05629-f05630 1153->1155 1156 f0570c-f0570f 1153->1156 1157 f05671-f05673 1155->1157 1158 f05632-f0563a 1155->1158 1156->1136 1160 f05675-f05677 1157->1160 1161 f056dd-f056de call f10d27 1157->1161 1158->1157 1159 f0563c 1158->1159 1162 f05642-f05644 1159->1162 1163 f0573a 1159->1163 1164 f05679-f05681 1160->1164 1165 f0569b-f056a6 1160->1165 1172 f056e3-f056e7 1161->1172 1167 f05646-f05648 1162->1167 1168 f0564b-f05650 1162->1168 1169 f0573e-f05747 1163->1169 1170 f05691-f05695 1164->1170 1171 f05683-f0568f 1164->1171 1173 f056a8 1165->1173 1174 f056aa-f056ad 1165->1174 1167->1168 1175 f05714-f05718 1168->1175 1177 f05656-f0566f call f10e48 1168->1177 1169->1136 1178 f05697-f05699 1170->1178 1171->1178 1172->1169 1179 f056e9-f056ee 1172->1179 1173->1174 1174->1175 1176 f056af-f056bb call f04856 call f10fdb 1174->1176 1180 f0572a-f05735 call f08ca8 1175->1180 1181 f0571a-f05727 call f02f60 1175->1181 1194 f056c0-f056c5 1176->1194 1193 f056d2-f056db 1177->1193 1178->1174 1179->1175 1184 f056f0-f05701 1179->1184 1180->1151 1181->1180 1189 f05704-f05706 1184->1189 1189->1155 1189->1156 1193->1189 1195 f056cb-f056ce 1194->1195 1196 f0574c-f05750 1194->1196 1195->1163 1197 f056d0 1195->1197 1196->1169 1197->1193
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                        • String ID:
                                        • API String ID: 1559183368-0
                                        • Opcode ID: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                                        • Instruction ID: d78eec301ca9ccc225f76f0b09e16dc7ef7fe7358e073c1682c1dc98b80e0884
                                        • Opcode Fuzzy Hash: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                                        • Instruction Fuzzy Hash: AB51B271E00B09DBDF248EA98C8466F77A6AF40B34F648729E825962D0D7B19D50BF50
                                        APIs
                                          • Part of subcall function 00EE4F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FA52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00EE4F6F
                                        • _free.LIBCMT ref: 00F1E5BC
                                        • _free.LIBCMT ref: 00F1E603
                                          • Part of subcall function 00EE6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00EE6D0D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                        • API String ID: 2861923089-1757145024
                                        • Opcode ID: 390aab59629a0ab5000e5bae4b064c6826a3da07331ca5456e858837283d46cf
                                        • Instruction ID: 146eb7c8f62ca9da0ef0ef7b2cc5e216b6501b094d206a71fed69871ace66656
                                        • Opcode Fuzzy Hash: 390aab59629a0ab5000e5bae4b064c6826a3da07331ca5456e858837283d46cf
                                        • Instruction Fuzzy Hash: 98918D71D10259AFCF04EFA5CC919EDBBB4FF18314F14442AF815AB2A1EB34A945EB60
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00EE35A1,SwapMouseButtons,00000004,?), ref: 00EE35D4
                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00EE35A1,SwapMouseButtons,00000004,?,?,?,?,00EE2754), ref: 00EE35F5
                                        • RegCloseKey.KERNELBASE(00000000,?,?,00EE35A1,SwapMouseButtons,00000004,?,?,?,?,00EE2754), ref: 00EE3617
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID: Control Panel\Mouse
                                        • API String ID: 3677997916-824357125
                                        • Opcode ID: 397eab22b4e4538452d477a171b53f09ac99c8090db8c5565b6c4f0b8296b49c
                                        • Instruction ID: 8e86be9755432757d3a269296389a3b1f1a487077fbfeabf98681f700ed9b842
                                        • Opcode Fuzzy Hash: 397eab22b4e4538452d477a171b53f09ac99c8090db8c5565b6c4f0b8296b49c
                                        • Instruction Fuzzy Hash: 3511487191024DBFDB20CFB5EC489EEBBB8EF05744F0164A9E805E7210D2719E44A760
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 01657675
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01657699
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016576BB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                        • Instruction ID: 690631bfd32fab61b4f84aa360e497e87267d87935d35975da4e20ee3e8dbf74
                                        • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                        • Instruction Fuzzy Hash: 84620A30A142589BEB64CFA4CC40BEEB776EF58300F5091A9D50DEB390E7799E81CB59
                                        APIs
                                          • Part of subcall function 00EE5045: _fseek.LIBCMT ref: 00EE505D
                                          • Part of subcall function 00F497DD: _wcscmp.LIBCMT ref: 00F498CD
                                          • Part of subcall function 00F497DD: _wcscmp.LIBCMT ref: 00F498E0
                                        • _free.LIBCMT ref: 00F4974B
                                        • _free.LIBCMT ref: 00F49752
                                        • _free.LIBCMT ref: 00F497BD
                                          • Part of subcall function 00F02ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00F09BA4), ref: 00F02EE9
                                          • Part of subcall function 00F02ED5: GetLastError.KERNEL32(00000000,?,00F09BA4), ref: 00F02EFB
                                        • _free.LIBCMT ref: 00F497C5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                        • String ID:
                                        • API String ID: 1552873950-0
                                        • Opcode ID: e7380544773663296b0c3136f1e3976d6f6c9a32d6817a33089202c8b0d22308
                                        • Instruction ID: 59cf19af9fca3109110f4456bca1392084a72b4d383867bddd1f21cbde6e23ce
                                        • Opcode Fuzzy Hash: e7380544773663296b0c3136f1e3976d6f6c9a32d6817a33089202c8b0d22308
                                        • Instruction Fuzzy Hash: F15191B1E04258AFDF249F64DC85AAEBBB9EF48314F00409EF609A7241DB755E80DF58
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                        • String ID:
                                        • API String ID: 2782032738-0
                                        • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                        • Instruction ID: e2daa60a823b252b757ab46d6bc0fb7387acbd3e1ecef2f19e6ed86b6b2e0496
                                        • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                        • Instruction Fuzzy Hash: 7541D6B1A04706ABDF18CEA9C88096F7BA5AF44370B24C53DEA55C76C0D670FD40BB50
                                        APIs
                                        • _memset.LIBCMT ref: 00F1ED92
                                        • GetOpenFileNameW.COMDLG32(?), ref: 00F1EDDC
                                          • Part of subcall function 00EE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EE48A1,?,?,00EE37C0,?), ref: 00EE48CE
                                          • Part of subcall function 00F00911: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F00930
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Name$Path$FileFullLongOpen_memset
                                        • String ID: X
                                        • API String ID: 3777226403-3081909835
                                        • Opcode ID: aaec992382b4623a3615e385f09dffe16e6c72878c21befbb5ad5ce90dfad9d2
                                        • Instruction ID: 943fa75c9b12aa40e9ee27fadcd5f91d6fe72e0759061539005a6d4efc021891
                                        • Opcode Fuzzy Hash: aaec992382b4623a3615e385f09dffe16e6c72878c21befbb5ad5ce90dfad9d2
                                        • Instruction Fuzzy Hash: F321C670A0428CABDF41DF94DC45BEE7BF8AF49714F004019E509B7282DFB45989ABA1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __fread_nolock_memmove
                                        • String ID: EA06
                                        • API String ID: 1988441806-3962188686
                                        • Opcode ID: 6e899d465794dc36001d26a3f8699b3d0aa759d4f59bad062a384e3756346449
                                        • Instruction ID: c369147ca872fb82e5e85bb5908232d2ade027e6ec8851e07e8095a7a3cbb599
                                        • Opcode Fuzzy Hash: 6e899d465794dc36001d26a3f8699b3d0aa759d4f59bad062a384e3756346449
                                        • Instruction Fuzzy Hash: 2301B972D04218BEDB28C6A8CC56FEE7BF8DB15711F00459AF552D21C1E9B9E608AB60
                                        APIs
                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00F499A1
                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00F499B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Temp$FileNamePath
                                        • String ID: aut
                                        • API String ID: 3285503233-3010740371
                                        • Opcode ID: cabd2ae00dcd3bca8ff4a17ca7aac14123c4c85fbb174fa236b7eaa5a1f9414f
                                        • Instruction ID: 75e4355058ab6f36e55727ef93317c427cd9e34d15221c30963c97559eaaad8a
                                        • Opcode Fuzzy Hash: cabd2ae00dcd3bca8ff4a17ca7aac14123c4c85fbb174fa236b7eaa5a1f9414f
                                        • Instruction Fuzzy Hash: 5CD05E7958030DABDB509BA0EC0EF9A773CE704704F0002B1FA64910A1EAB0959D9FA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f06742e509ace49f5b0ba4f4d22431bd313981704d0174ae1bce7c48082d8739
                                        • Instruction ID: 4f4b1773798b81d9f16f1ca788fe0798543042e20b03f60889aea268e081d270
                                        • Opcode Fuzzy Hash: f06742e509ace49f5b0ba4f4d22431bd313981704d0174ae1bce7c48082d8739
                                        • Instruction Fuzzy Hash: 9AF16D719083459FC714DF28C880A2ABBE5FF88314F14892EF99A9B351D775E945CF82
                                        APIs
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F00313
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F0031B
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F00326
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F00331
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F00339
                                          • Part of subcall function 00F002E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F00341
                                          • Part of subcall function 00EF6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00EEFA90), ref: 00EF62B4
                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00EEFB2D
                                        • OleInitialize.OLE32(00000000), ref: 00EEFBAA
                                        • CloseHandle.KERNEL32(00000000), ref: 00F24921
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                        • String ID:
                                        • API String ID: 1986988660-0
                                        • Opcode ID: 57dcf8fbcac92d91ac785c9cd6178b3fde541cb3b30b87f334714efceb8a223a
                                        • Instruction ID: af0c8efc26727f448dc1ec76e677245d2584fca6c4c5446ec07c57765e217b6b
                                        • Opcode Fuzzy Hash: 57dcf8fbcac92d91ac785c9cd6178b3fde541cb3b30b87f334714efceb8a223a
                                        • Instruction Fuzzy Hash: 2981CFF0915B4CDFCB84DF39A9646197BE5FB8EB06350812AD819DB262EB704488FF11
                                        APIs
                                        • _memset.LIBCMT ref: 00EE4401
                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00EE44A6
                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00EE44C3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_$_memset
                                        • String ID:
                                        • API String ID: 1505330794-0
                                        • Opcode ID: fcb8f24766e768ab86fe97f129097a40c7ee634afe25a3334480d045301616b0
                                        • Instruction ID: d6d78f920443a91e47f03f274ace4f9c446164ffc6273b1687ec9add435226fd
                                        • Opcode Fuzzy Hash: fcb8f24766e768ab86fe97f129097a40c7ee634afe25a3334480d045301616b0
                                        • Instruction Fuzzy Hash: 49318EF06047499FD720DF25D88479BBBF8FB49708F00092EF5AA96291E770A944DB92
                                        APIs
                                        • __FF_MSGBANNER.LIBCMT ref: 00F058A3
                                          • Part of subcall function 00F0A2EB: __NMSG_WRITE.LIBCMT ref: 00F0A312
                                          • Part of subcall function 00F0A2EB: __NMSG_WRITE.LIBCMT ref: 00F0A31C
                                        • __NMSG_WRITE.LIBCMT ref: 00F058AA
                                          • Part of subcall function 00F0A348: GetModuleFileNameW.KERNEL32(00000000,00FA33BA,00000104,?,00000001,00000000), ref: 00F0A3DA
                                          • Part of subcall function 00F0A348: ___crtMessageBoxW.LIBCMT ref: 00F0A488
                                          • Part of subcall function 00F0321F: ___crtCorExitProcess.LIBCMT ref: 00F03225
                                          • Part of subcall function 00F0321F: ExitProcess.KERNEL32 ref: 00F0322E
                                          • Part of subcall function 00F08CA8: __getptd_noexit.LIBCMT ref: 00F08CA8
                                        • RtlAllocateHeap.NTDLL(01560000,00000000,00000001,00000000,?,?,?,00F00F53,?), ref: 00F058CF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                        • String ID:
                                        • API String ID: 1372826849-0
                                        • Opcode ID: ae61c3360312a25830cf0c555404f2629fd5df83a991f4a19c31c2073412d18e
                                        • Instruction ID: 4664079990376b545b3e04a516156489ff7e18d224cd918eed07b53f90acb182
                                        • Opcode Fuzzy Hash: ae61c3360312a25830cf0c555404f2629fd5df83a991f4a19c31c2073412d18e
                                        • Instruction Fuzzy Hash: 3301DE72640B069AE6102774AC02B2F7798DF82BB0B504439F801AA1D2DEB89E017A61
                                        APIs
                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00F495F1,?,?,?,?,?,00000004), ref: 00F49964
                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00F495F1,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00F4997A
                                        • CloseHandle.KERNEL32(00000000,?,00F495F1,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F49981
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: File$CloseCreateHandleTime
                                        • String ID:
                                        • API String ID: 3397143404-0
                                        • Opcode ID: 5f8c5e1954a2adb2806d5049622ecbf742181edf122e9fc38db957d399176abf
                                        • Instruction ID: 0eecdc2b3731107dbdfdbbd1a44fa22fa15dc91e67c3c93e39526708c9e99ad5
                                        • Opcode Fuzzy Hash: 5f8c5e1954a2adb2806d5049622ecbf742181edf122e9fc38db957d399176abf
                                        • Instruction Fuzzy Hash: A1E08632241218B7DB211B54FC0AFDA7F58AB467B0F104220FB64690E087F11915A798
                                        APIs
                                        • _free.LIBCMT ref: 00F48DC4
                                          • Part of subcall function 00F02ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00F09BA4), ref: 00F02EE9
                                          • Part of subcall function 00F02ED5: GetLastError.KERNEL32(00000000,?,00F09BA4), ref: 00F02EFB
                                        • _free.LIBCMT ref: 00F48DD5
                                        • _free.LIBCMT ref: 00F48DE7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 3221efda5ec1aeb3564d3aaca8a62a8878e7642d45a62f0f0d26450024f2f6e1
                                        • Instruction ID: 5ae28eed48e278d5b2361f175a8481575d2ba1b7036f30041a82ad0238f5016e
                                        • Opcode Fuzzy Hash: 3221efda5ec1aeb3564d3aaca8a62a8878e7642d45a62f0f0d26450024f2f6e1
                                        • Instruction Fuzzy Hash: 4CE012A1E4260143CA646578ED44E9727EC5F583B1754081DF80AD75C2CE28E882B134
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CALL
                                        • API String ID: 0-4196123274
                                        • Opcode ID: af890747988880e9086f0471a196ca79fc5cfb6557a180ab82b58cc9702f51c5
                                        • Instruction ID: eac789d9fddd75c74ab42bb49ac1bf04910e186b2068598561f6189bda9e615a
                                        • Opcode Fuzzy Hash: af890747988880e9086f0471a196ca79fc5cfb6557a180ab82b58cc9702f51c5
                                        • Instruction Fuzzy Hash: E4226971508285DFC724DF15C490B6AB7E1FF84304F18996DE88AAB262DB35EC85DB82
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: EA06
                                        • API String ID: 4104443479-3962188686
                                        • Opcode ID: 5c8b171ed9d7acc5695f8d08d06f49823eb2968eac184ef2dacf46abc4794083
                                        • Instruction ID: 17c77882626abe4cb1715824d88af2083009429e156e51393bffa2d4d63290f4
                                        • Opcode Fuzzy Hash: 5c8b171ed9d7acc5695f8d08d06f49823eb2968eac184ef2dacf46abc4794083
                                        • Instruction Fuzzy Hash: FE417DA2A041DC5BCF218B658C51BFE7BA5AB05304F686065F842BF2D2C6219D40D3E1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 44090a73806a0c84fa2a2afbaad4390174401ad3f6745649b165bc964c40c128
                                        • Instruction ID: f8b462aa7f8a3e6a47405d9c7a44b7b50655d73fe52aa6b42d72247093a34aa5
                                        • Opcode Fuzzy Hash: 44090a73806a0c84fa2a2afbaad4390174401ad3f6745649b165bc964c40c128
                                        • Instruction Fuzzy Hash: 0741C77291830AABD720FFA89981A7EBBE4EF09350F244459F4859B282DF759C05F760
                                        APIs
                                        • IsThemeActive.UXTHEME ref: 00EE4992
                                          • Part of subcall function 00F034EC: __lock.LIBCMT ref: 00F034F2
                                          • Part of subcall function 00F034EC: DecodePointer.KERNEL32(00000001,?,00EE49A7,00F37F9C), ref: 00F034FE
                                          • Part of subcall function 00F034EC: EncodePointer.KERNEL32(?,?,00EE49A7,00F37F9C), ref: 00F03509
                                          • Part of subcall function 00EE4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00EE4A73
                                          • Part of subcall function 00EE4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00EE4A88
                                          • Part of subcall function 00EE3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EE3B7A
                                          • Part of subcall function 00EE3B4C: IsDebuggerPresent.KERNEL32 ref: 00EE3B8C
                                          • Part of subcall function 00EE3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00FA52F8,00FA52E0,?,?), ref: 00EE3BFD
                                          • Part of subcall function 00EE3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00EE3C81
                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00EE49D2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                        • String ID:
                                        • API String ID: 1438897964-0
                                        • Opcode ID: 0e5675bb8a5180e08215f85c82e0175e4f8637c24c11d7191e0a1a9cd435740d
                                        • Instruction ID: e934445317f891ed51c7c50dbcac6cee2b16ae8789053dd7a57cefa021f81ccb
                                        • Opcode Fuzzy Hash: 0e5675bb8a5180e08215f85c82e0175e4f8637c24c11d7191e0a1a9cd435740d
                                        • Instruction Fuzzy Hash: 061190B14043599BC700DF39EC4591AFBE8EF8A710F00451EF455A72B2DB719548EB92
                                        APIs
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00EE5981,?,?,?,?), ref: 00EE5E27
                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00EE5981,?,?,?,?), ref: 00F1E0CC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 1e43e3da4ebf5f04c0e20026f449c2085462697db4619dfac72ebb44fe1813bf
                                        • Instruction ID: 0e7dfad4ecbb3e609d15384b40c94b68b9cc6458e8c6dd200e2f8bec22906a4b
                                        • Opcode Fuzzy Hash: 1e43e3da4ebf5f04c0e20026f449c2085462697db4619dfac72ebb44fe1813bf
                                        • Instruction Fuzzy Hash: 7001927114474CBEF3240E25DC8AFA63BDCEB0576CF108318FAE56A1E0C6B01E899B10
                                        APIs
                                          • Part of subcall function 00F0588C: __FF_MSGBANNER.LIBCMT ref: 00F058A3
                                          • Part of subcall function 00F0588C: __NMSG_WRITE.LIBCMT ref: 00F058AA
                                          • Part of subcall function 00F0588C: RtlAllocateHeap.NTDLL(01560000,00000000,00000001,00000000,?,?,?,00F00F53,?), ref: 00F058CF
                                        • std::exception::exception.LIBCMT ref: 00F00F6C
                                        • __CxxThrowException@8.LIBCMT ref: 00F00F81
                                          • Part of subcall function 00F0871B: RaiseException.KERNEL32(?,?,?,00F99E78,00000000,?,?,?,?,00F00F86,?,00F99E78,?,00000001), ref: 00F08770
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                        • String ID:
                                        • API String ID: 3902256705-0
                                        • Opcode ID: 42cfc5fa9e68d383af29dee339cd4bad144c8847a3a8cc48c7d0b8d1268ccbe2
                                        • Instruction ID: 7d40627fcc3d567fa6e14ffce2b9a6f407c0ae16fe3d7def8cf76269363b4a18
                                        • Opcode Fuzzy Hash: 42cfc5fa9e68d383af29dee339cd4bad144c8847a3a8cc48c7d0b8d1268ccbe2
                                        • Instruction Fuzzy Hash: C9F0A97150421E66DB20BA58EC01ADE7B9CDF01361F104466FD48962D2DFB58A51B5D1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __lock_file_memset
                                        • String ID:
                                        • API String ID: 26237723-0
                                        • Opcode ID: 5e010c9aa86e46e27e8416f1f3773055b53e85c777f96e07584f0e55aa927617
                                        • Instruction ID: f54e6e3019f00aedaed2511d4f0b645d9ead1f0c1f2519896b153c6a6759527c
                                        • Opcode Fuzzy Hash: 5e010c9aa86e46e27e8416f1f3773055b53e85c777f96e07584f0e55aa927617
                                        • Instruction Fuzzy Hash: 9C014431D01A09EBDF11AF698C0559F7B72BF80760F148115F8545A1D1DBB98A22FF91
                                        APIs
                                          • Part of subcall function 00F08CA8: __getptd_noexit.LIBCMT ref: 00F08CA8
                                        • __lock_file.LIBCMT ref: 00F0555B
                                          • Part of subcall function 00F06D8E: __lock.LIBCMT ref: 00F06DB1
                                        • __fclose_nolock.LIBCMT ref: 00F05566
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                        • String ID:
                                        • API String ID: 2800547568-0
                                        • Opcode ID: 177639d16e04564f3357f2bc2162e51c6d051c20daa972e756aa97e58d99b742
                                        • Instruction ID: d1ec5412e6e4a9e37fa3952ab4aeab1920fd248d5042aacb354f1c29e3c744e7
                                        • Opcode Fuzzy Hash: 177639d16e04564f3357f2bc2162e51c6d051c20daa972e756aa97e58d99b742
                                        • Instruction Fuzzy Hash: A0F0B431D01A01AAEB20AB758C0277F77A26F41779F288209F454AB1C1CBBC8902BF52
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00EE558F,?,?,?,?,?), ref: 00EE81DA
                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00EE558F,?,?,?,?,?), ref: 00EE820D
                                          • Part of subcall function 00EE78AD: _memmove.LIBCMT ref: 00EE78E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$_memmove
                                        • String ID:
                                        • API String ID: 3033907384-0
                                        • Opcode ID: 5644b64d175cccf603543855dc8300bb5362797fbfbddfcdc7c69f25aad27b42
                                        • Instruction ID: 9b84f9e7e482ef3bd56bcbc6bdb4f2659193e2752cc26e01a58a6b42fde69168
                                        • Opcode Fuzzy Hash: 5644b64d175cccf603543855dc8300bb5362797fbfbddfcdc7c69f25aad27b42
                                        • Instruction Fuzzy Hash: F101A2712055087FEB246A22ED46F7B7B5CEB8A360F10802AF905DD1E0DE609800E671
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 01657675
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01657699
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016576BB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                        • Instruction ID: d3ea2f395ed3d42f37b3d258099a9490635bcd1277d9003ff89452f065342816
                                        • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                        • Instruction Fuzzy Hash: EF12C024E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 958a0ee3f289518ffcc11a662764739bf543a1eb08b9937d90e4e4bd4d83cf49
                                        • Instruction ID: 6b484bd5a1e91e47a2d788aa56a327b47afd1e776938e817db27712b2a43e6de
                                        • Opcode Fuzzy Hash: 958a0ee3f289518ffcc11a662764739bf543a1eb08b9937d90e4e4bd4d83cf49
                                        • Instruction Fuzzy Hash: 0D519131600618AFCF14EB64C991EAE77E5AF45324F149068FA4ABB392CB34ED00EB55
                                        APIs
                                        • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00EE5CF6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 2cc1df9655bb698219794297c62ebdca8a79106b6bea9bf7064ac5c3cad06b2f
                                        • Instruction ID: eef511dc6824517719f77fcf9f4d0cc8da4689abda3e87e25ba61d89bd45198e
                                        • Opcode Fuzzy Hash: 2cc1df9655bb698219794297c62ebdca8a79106b6bea9bf7064ac5c3cad06b2f
                                        • Instruction Fuzzy Hash: 7C314F72A00B49AFCB18DF6EC89469DF7B5FF48318F248619D819A3710D771B950DB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction ID: 12f4b065811a291a21a6e7dab3f0bf3e76675a0465e860dacb4fd0b78f606a9f
                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction Fuzzy Hash: 1331F575A011069BC718DF48C584A69FBA2FF49310F688AA5E409DB291DF30EDC1EB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: ad2e983111eb5db449f48cb75cb921f690bc87b4180183d970e803e8576753bd
                                        • Instruction ID: 58854285c6dbef84d62731612fb941464308eb9f2d799585b409f7f237a9ee06
                                        • Opcode Fuzzy Hash: ad2e983111eb5db449f48cb75cb921f690bc87b4180183d970e803e8576753bd
                                        • Instruction Fuzzy Hash: 6F4147755083558FDB24CF15C484B1ABBE0BF85318F0988ACE8999B362C736FC45DB42
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 333aaf0269d9eb0069992006cd153e4e18f917399e1d42bebbe564a4f4089038
                                        • Instruction ID: 98b799a247ccb8ec2e76b24a321232b8c59762c330aa21008415683f929e06fa
                                        • Opcode Fuzzy Hash: 333aaf0269d9eb0069992006cd153e4e18f917399e1d42bebbe564a4f4089038
                                        • Instruction Fuzzy Hash: EB210572900A0DEBDB109F56EC817A97FF8EB54351F21846EE886D5110EBB085D0B755
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscmp
                                        • String ID:
                                        • API String ID: 856254489-0
                                        • Opcode ID: d13e51f823bf5cd2545db5d237dfc6ffb5e392146c1ae51f0cd36d718572f7d5
                                        • Instruction ID: 99875f55294437ad353d6fd3b17cbf8c37ef989066fbe59144d734e3dfb925bd
                                        • Opcode Fuzzy Hash: d13e51f823bf5cd2545db5d237dfc6ffb5e392146c1ae51f0cd36d718572f7d5
                                        • Instruction Fuzzy Hash: 8811AF3290415DDBDB14EBAADC819EEB7B8FF55360F10512AF814B71A0EB30AD46DB90
                                        APIs
                                          • Part of subcall function 00EE4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00EE4D4D
                                          • Part of subcall function 00F053CB: __wfsopen.LIBCMT ref: 00F053D6
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FA52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00EE4F6F
                                          • Part of subcall function 00EE4CC8: FreeLibrary.KERNEL32(00000000), ref: 00EE4D02
                                          • Part of subcall function 00EE4DD0: _memmove.LIBCMT ref: 00EE4E1A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Library$Free$Load__wfsopen_memmove
                                        • String ID:
                                        • API String ID: 1396898556-0
                                        • Opcode ID: 2c872c2718e0098f4adc77e464e5f8d1b499824c90b5a8972f3bc0c3fd7b1924
                                        • Instruction ID: cea1701f861dd84bb56bdcf27dc16381346f5848c266dc92114d01e7f1c571f0
                                        • Opcode Fuzzy Hash: 2c872c2718e0098f4adc77e464e5f8d1b499824c90b5a8972f3bc0c3fd7b1924
                                        • Instruction Fuzzy Hash: 5711C472B0020EAADB10AF61DC12FAE77E59F40B10F109829F941B62C1DAB59A05EB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 2b1af5c82061605c6e6b9bffe6a2c40383ae12ebddd5ee254418303454538e7a
                                        • Instruction ID: c23f7c8ed2a6d4cfcdec08f1a92dff2299bb862b1165fbfe51d92e4f10641882
                                        • Opcode Fuzzy Hash: 2b1af5c82061605c6e6b9bffe6a2c40383ae12ebddd5ee254418303454538e7a
                                        • Instruction Fuzzy Hash: 652115B55083958FCB14DF14C844B1ABBE0BF84314F09896CE89567762DB31F845EB52
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00EE5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00EE5D76
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 869b615e372ff4641b68a0bcbbc454b69c3af90d6e8fd9de4ab1fd4c1a6f0a1a
                                        • Instruction ID: 1cd5e0a3111b59030bcacac980ac9b039ea3943fdbfc447ccba8dc7ae08a0a65
                                        • Opcode Fuzzy Hash: 869b615e372ff4641b68a0bcbbc454b69c3af90d6e8fd9de4ab1fd4c1a6f0a1a
                                        • Instruction Fuzzy Hash: B6113A32200B499FD3308F16C884B63B7E9EF45768F10D92EE4AA96A50D7B0E945CB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscmp
                                        • String ID:
                                        • API String ID: 856254489-0
                                        • Opcode ID: 0348aa5b13100cb90b80e8c76e4aaafc0dd3c9eb3a6e468b2ef4f830efed58fb
                                        • Instruction ID: 810a5e19639162400c2632f2a4227b3cf19fa32ee93ed4a4aad6db1e0b357992
                                        • Opcode Fuzzy Hash: 0348aa5b13100cb90b80e8c76e4aaafc0dd3c9eb3a6e468b2ef4f830efed58fb
                                        • Instruction Fuzzy Hash: A901C432C082D95FDB05AB6AC8505EDFFB49F67360F69809BD850FB192D2359C46CB41
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 63f98075173fc353d443e45181684640797c3b03f0cf6681a76f29982698bb2e
                                        • Instruction ID: 93d14a38a3c5533c15d0248d6f11d1852030bf9d4d4c56bf9dc05664c13249fc
                                        • Opcode Fuzzy Hash: 63f98075173fc353d443e45181684640797c3b03f0cf6681a76f29982698bb2e
                                        • Instruction Fuzzy Hash: 4B01A2B5600546AFC305DB69D941D26FBA9FF89314B148159F819C7702DB35FC22DBE0
                                        APIs
                                        • __lock_file.LIBCMT ref: 00F04A16
                                          • Part of subcall function 00F08CA8: __getptd_noexit.LIBCMT ref: 00F08CA8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __getptd_noexit__lock_file
                                        • String ID:
                                        • API String ID: 2597487223-0
                                        • Opcode ID: a5943c3c6625c124cb9196cffcfc642c5351d129a65d55fb2878fa5905d2bce4
                                        • Instruction ID: 46a12824dad63dd713f26cccef3341e219cdd597922e4b7a681f2b3c7dc531a9
                                        • Opcode Fuzzy Hash: a5943c3c6625c124cb9196cffcfc642c5351d129a65d55fb2878fa5905d2bce4
                                        • Instruction Fuzzy Hash: 15F0AF72A40206EBDF21AFB48C0639E76A1AF40365F048514B524AA1D1DBBC9911FF55
                                        APIs
                                        • FreeLibrary.KERNEL32(?,?,00FA52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00EE4FDE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 68db6c1ff472c0b0cbccbde27eee57a581a85a89ad613ab69bc220cdabfd3b7e
                                        • Instruction ID: 4d89a74b82a5c94a3824ff9341f5b100a452f355f8c06888e1ca9a74fe261d40
                                        • Opcode Fuzzy Hash: 68db6c1ff472c0b0cbccbde27eee57a581a85a89ad613ab69bc220cdabfd3b7e
                                        • Instruction Fuzzy Hash: 53F030B1205755CFCB349F65E894852BBE1AF04729314AA3EE1D692650C7719844DF40
                                        APIs
                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F00930
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LongNamePath_memmove
                                        • String ID:
                                        • API String ID: 2514874351-0
                                        • Opcode ID: bcfe7050beafb1028cd23163a0677598e7385f810a0de4dbbad697a13e7a79a1
                                        • Instruction ID: 6586ff3538891b8ba6d3b018dcb025c902534e84920c51d41f538f7f2b93a194
                                        • Opcode Fuzzy Hash: bcfe7050beafb1028cd23163a0677598e7385f810a0de4dbbad697a13e7a79a1
                                        • Instruction Fuzzy Hash: CCE0CD3694512C57C720D6589C05FFA77EDDF89790F0501B5FD4CD7304D9A45C818690
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __fread_nolock
                                        • String ID:
                                        • API String ID: 2638373210-0
                                        • Opcode ID: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                                        • Instruction ID: e944cc8527a46d87cda8c8c76dc71c4cd68413923331fd506667916760968a5d
                                        • Opcode Fuzzy Hash: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                                        • Instruction Fuzzy Hash: 2BE092B5604B009BDB358A24D8007A377E1AB05324F00081CF69AC3242EBA3B846DB59
                                        APIs
                                        • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00F1E09B,?,?,00000000), ref: 00EE5DBF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 4010094197a08bc98aac9eafcbcae97231105ce52ef1739ebdcd82c2b5af14b4
                                        • Instruction ID: 7ccf2c3a9c2311e00df89cf735c16914bd7e5a5e9257127dcbab22bbf5619bbc
                                        • Opcode Fuzzy Hash: 4010094197a08bc98aac9eafcbcae97231105ce52ef1739ebdcd82c2b5af14b4
                                        • Instruction Fuzzy Hash: 6CD0C77464420CBFE710DB80DC46FA9777CD705710F100294FD0456290D6F27D549795
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __wfsopen
                                        • String ID:
                                        • API String ID: 197181222-0
                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction ID: 0f473bde8977d562c242e5eb7cb14a83417f5c383ec23461fdfcafa0c8dc0688
                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                        • Instruction Fuzzy Hash: F3B0927644020C77CE012A82EC02A4A3B5A9B40BA4F408020FB0C181E2A6F7A660AA89
                                        APIs
                                        • GetLastError.KERNEL32(00000002,00000000), ref: 00F4D28B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID:
                                        • API String ID: 1452528299-0
                                        • Opcode ID: e64e12fe5542473447201239da796844030e1d42e591b42024be1adee1a59109
                                        • Instruction ID: b2a9a02a2ada7fd63c709545e7ce4221693dbced78831fa53741746dfecee940
                                        • Opcode Fuzzy Hash: e64e12fe5542473447201239da796844030e1d42e591b42024be1adee1a59109
                                        • Instruction Fuzzy Hash: B771A4316043468FC714EF25D591A6EBBE0BF88314F04552DF89A9B3A2DB70EE09DB52
                                        APIs
                                        • Sleep.KERNELBASE(000001F4), ref: 01657E59
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                        • Instruction ID: 3ca0c8c3ee9d487f4283830479ce30a55d8864b10e8109eaac803c1e7dfd144b
                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                        • Instruction Fuzzy Hash: D2E0BF7494020DEFDB00DFB4D9496DE7BB4EF04301F1006A1FD05D7681DB309E549A62
                                        APIs
                                        • Sleep.KERNELBASE(000001F4), ref: 01657E59
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112581465.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1655000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction ID: 3b2a9c2f175fed3883a4fe35464d5885fa4467b830247897d565830d8d98c335
                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction Fuzzy Hash: C5E0E67494020DDFDB00DFB4D94969E7BB4EF04301F1002A1FD01D2281D6309D509A62
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F6CBA1
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F6CBFF
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F6CC40
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F6CC6A
                                        • SendMessageW.USER32 ref: 00F6CC93
                                        • _wcsncpy.LIBCMT ref: 00F6CCFF
                                        • GetKeyState.USER32(00000011), ref: 00F6CD20
                                        • GetKeyState.USER32(00000009), ref: 00F6CD2D
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F6CD43
                                        • GetKeyState.USER32(00000010), ref: 00F6CD4D
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F6CD76
                                        • SendMessageW.USER32 ref: 00F6CD9D
                                        • SendMessageW.USER32(?,00001030,?,00F6B37C), ref: 00F6CEA1
                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F6CEB7
                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F6CECA
                                        • SetCapture.USER32(?), ref: 00F6CED3
                                        • ClientToScreen.USER32(?,?), ref: 00F6CF38
                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F6CF45
                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F6CF5F
                                        • ReleaseCapture.USER32 ref: 00F6CF6A
                                        • GetCursorPos.USER32(?), ref: 00F6CFA4
                                        • ScreenToClient.USER32(?,?), ref: 00F6CFB1
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F6D00D
                                        • SendMessageW.USER32 ref: 00F6D03B
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F6D078
                                        • SendMessageW.USER32 ref: 00F6D0A7
                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F6D0C8
                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F6D0D7
                                        • GetCursorPos.USER32(?), ref: 00F6D0F7
                                        • ScreenToClient.USER32(?,?), ref: 00F6D104
                                        • GetParent.USER32(?), ref: 00F6D124
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F6D18D
                                        • SendMessageW.USER32 ref: 00F6D1BE
                                        • ClientToScreen.USER32(?,?), ref: 00F6D21C
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F6D24C
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F6D276
                                        • SendMessageW.USER32 ref: 00F6D299
                                        • ClientToScreen.USER32(?,?), ref: 00F6D2EB
                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F6D31F
                                          • Part of subcall function 00EE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00EE25EC
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F6D3BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                        • String ID: @GUI_DRAGID$F
                                        • API String ID: 3977979337-4164748364
                                        • Opcode ID: 6cfeb94e3ea52e7659d6f429f562a1e94042ae0c3f71956c5eb9773c75de08fb
                                        • Instruction ID: a2c8672ef17d45a2876264a5e5bf694a55066998413236dda8ac8b62418c82e3
                                        • Opcode Fuzzy Hash: 6cfeb94e3ea52e7659d6f429f562a1e94042ae0c3f71956c5eb9773c75de08fb
                                        • Instruction Fuzzy Hash: 47428F70A04345AFD720CF24C845BAABBE5FF8A720F140919F6E5972B1C772D854EB92
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove$_memset
                                        • String ID: DEFINE$Oa$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                        • API String ID: 1357608183-2202602582
                                        • Opcode ID: 5385677ad29a532a9235a145bdd6802aee4cb48071b1bfe74800fa632a7eb00c
                                        • Instruction ID: 4c17ee570eb9dd7375c51bd4b78b9ac7f2d1e9bbdd68eccb8d2370782bbbf2a4
                                        • Opcode Fuzzy Hash: 5385677ad29a532a9235a145bdd6802aee4cb48071b1bfe74800fa632a7eb00c
                                        • Instruction Fuzzy Hash: 3793A375E00219DBDB24CF58C881BBDB7B1FF48720F25816AE945EB290E774AE81DB50
                                        APIs
                                        • GetForegroundWindow.USER32(00000000,?), ref: 00EE4A3D
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F1D9BE
                                        • IsIconic.USER32(?), ref: 00F1D9C7
                                        • ShowWindow.USER32(?,00000009), ref: 00F1D9D4
                                        • SetForegroundWindow.USER32(?), ref: 00F1D9DE
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F1D9F4
                                        • GetCurrentThreadId.KERNEL32 ref: 00F1D9FB
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F1DA07
                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F1DA18
                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F1DA20
                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F1DA28
                                        • SetForegroundWindow.USER32(?), ref: 00F1DA2B
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F1DA40
                                        • keybd_event.USER32(00000012,00000000), ref: 00F1DA4B
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F1DA55
                                        • keybd_event.USER32(00000012,00000000), ref: 00F1DA5A
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F1DA63
                                        • keybd_event.USER32(00000012,00000000), ref: 00F1DA68
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F1DA72
                                        • keybd_event.USER32(00000012,00000000), ref: 00F1DA77
                                        • SetForegroundWindow.USER32(?), ref: 00F1DA7A
                                        • AttachThreadInput.USER32(?,?,00000000), ref: 00F1DAA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 4125248594-2988720461
                                        • Opcode ID: b03ce283dfe436b49821601e553be54f5979af1e5961af05c09a3a55fca310c1
                                        • Instruction ID: fa930455bb56ccacaadac573470f41a4e3d25b3ac8d6cde9e388a1d8e923a6f6
                                        • Opcode Fuzzy Hash: b03ce283dfe436b49821601e553be54f5979af1e5961af05c09a3a55fca310c1
                                        • Instruction Fuzzy Hash: E4317371A4031CBBEB205F61AC49FBF7E7CEB44B60F144025FA15EA1D1C6B15D41BAA1
                                        APIs
                                          • Part of subcall function 00F38AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F38AED
                                          • Part of subcall function 00F38AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F38B1A
                                          • Part of subcall function 00F38AA3: GetLastError.KERNEL32 ref: 00F38B27
                                        • _memset.LIBCMT ref: 00F3867B
                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00F386CD
                                        • CloseHandle.KERNEL32(?), ref: 00F386DE
                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F386F5
                                        • GetProcessWindowStation.USER32 ref: 00F3870E
                                        • SetProcessWindowStation.USER32(00000000), ref: 00F38718
                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F38732
                                          • Part of subcall function 00F384F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F38631), ref: 00F38508
                                          • Part of subcall function 00F384F3: CloseHandle.KERNEL32(?,?,00F38631), ref: 00F3851A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                        • String ID: $default$winsta0
                                        • API String ID: 2063423040-1027155976
                                        • Opcode ID: 78d53f812cd818d2c7ba6a05c965de456f5b53382e2e708ff33e9be33e00ceed
                                        • Instruction ID: 29fff54564b0f99cb8fe5f985d252d24223420bfadc627f462261385f9c64459
                                        • Opcode Fuzzy Hash: 78d53f812cd818d2c7ba6a05c965de456f5b53382e2e708ff33e9be33e00ceed
                                        • Instruction Fuzzy Hash: C6816C71C00309BFDF119FA4DC45AEEBB78EF043A4F144169F924A6161DB798E16EB60
                                        APIs
                                        • OpenClipboard.USER32(00F6F910), ref: 00F540A6
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00F540B4
                                        • GetClipboardData.USER32(0000000D), ref: 00F540BC
                                        • CloseClipboard.USER32 ref: 00F540C8
                                        • GlobalLock.KERNEL32(00000000), ref: 00F540E4
                                        • CloseClipboard.USER32 ref: 00F540EE
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F54103
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00F54110
                                        • GetClipboardData.USER32(00000001), ref: 00F54118
                                        • GlobalLock.KERNEL32(00000000), ref: 00F54125
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F54159
                                        • CloseClipboard.USER32 ref: 00F54269
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                        • String ID:
                                        • API String ID: 3222323430-0
                                        • Opcode ID: 9f463141dc9a6c5832b2a6957725e829917f9b05311cc2f0eb3347d185a35057
                                        • Instruction ID: d48978ed500050a07badb0bec189ef63327c5819d06fe0f2519982f034493f6d
                                        • Opcode Fuzzy Hash: 9f463141dc9a6c5832b2a6957725e829917f9b05311cc2f0eb3347d185a35057
                                        • Instruction Fuzzy Hash: C051D335204309ABD300EF20EC95F6E77A8AF84B15F10052DFA56D21E1DFB0E94DAB62
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F4C819
                                        • FindClose.KERNEL32(00000000), ref: 00F4C86D
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F4C892
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F4C8A9
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F4C8D0
                                        • __swprintf.LIBCMT ref: 00F4C91C
                                        • __swprintf.LIBCMT ref: 00F4C95F
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • __swprintf.LIBCMT ref: 00F4C9B3
                                          • Part of subcall function 00F03818: __woutput_l.LIBCMT ref: 00F03871
                                        • __swprintf.LIBCMT ref: 00F4CA01
                                          • Part of subcall function 00F03818: __flsbuf.LIBCMT ref: 00F03893
                                          • Part of subcall function 00F03818: __flsbuf.LIBCMT ref: 00F038AB
                                        • __swprintf.LIBCMT ref: 00F4CA50
                                        • __swprintf.LIBCMT ref: 00F4CA9F
                                        • __swprintf.LIBCMT ref: 00F4CAEE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                        • API String ID: 3953360268-2428617273
                                        • Opcode ID: ef92d4e7adaed1674151e06c0f2ce5d306fd5956c1389cf3f6b582ac1719bf53
                                        • Instruction ID: c7884c20e212784b47a228af29255cca2c3497ad3d0b4f2e7871360bd558097a
                                        • Opcode Fuzzy Hash: ef92d4e7adaed1674151e06c0f2ce5d306fd5956c1389cf3f6b582ac1719bf53
                                        • Instruction Fuzzy Hash: 10A140B2408348ABC750EB65CC86DAFB7ECEF94704F40592DF595D2192EB34DA08CB62
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F4F042
                                        • _wcscmp.LIBCMT ref: 00F4F057
                                        • _wcscmp.LIBCMT ref: 00F4F06E
                                        • GetFileAttributesW.KERNEL32(?), ref: 00F4F080
                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00F4F09A
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F4F0B2
                                        • FindClose.KERNEL32(00000000), ref: 00F4F0BD
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F4F0D9
                                        • _wcscmp.LIBCMT ref: 00F4F100
                                        • _wcscmp.LIBCMT ref: 00F4F117
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4F129
                                        • SetCurrentDirectoryW.KERNEL32(00F98920), ref: 00F4F147
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F4F151
                                        • FindClose.KERNEL32(00000000), ref: 00F4F15E
                                        • FindClose.KERNEL32(00000000), ref: 00F4F170
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                        • String ID: *.*
                                        • API String ID: 1803514871-438819550
                                        • Opcode ID: a82ac1f2f1184ad8b88f224b5a3c433690c5feec7d1ac052b0c4e3d9408d566a
                                        • Instruction ID: bae79ff4f1035eb17cba48e7c7be7a62d57dbe7fdeb8c5b170922d4be15cadb0
                                        • Opcode Fuzzy Hash: a82ac1f2f1184ad8b88f224b5a3c433690c5feec7d1ac052b0c4e3d9408d566a
                                        • Instruction Fuzzy Hash: D231F53290020DAADF10DBB4EC59EEE7BAC9F89360F100175EC19D21A0DB74DA49EA65
                                        APIs
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F609DE
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F6F910,00000000,?,00000000,?,?), ref: 00F60A4C
                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00F60A94
                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00F60B1D
                                        • RegCloseKey.ADVAPI32(?), ref: 00F60E3D
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F60E4A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Close$ConnectCreateRegistryValue
                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                        • API String ID: 536824911-966354055
                                        • Opcode ID: 2124f7dfd563ca2b6b6976fc0d8928662bb24a608f9d27519e959ffb2f934a36
                                        • Instruction ID: 3433868d2fc736775189190b2508e5b0d527d08cd6a0be6016a2de51c6326fc2
                                        • Opcode Fuzzy Hash: 2124f7dfd563ca2b6b6976fc0d8928662bb24a608f9d27519e959ffb2f934a36
                                        • Instruction Fuzzy Hash: 2B028D756046559FCB14DF25C841E2AB7E5FF88324F14885DF89A9B3A2CB35ED00DB81
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F4F19F
                                        • _wcscmp.LIBCMT ref: 00F4F1B4
                                        • _wcscmp.LIBCMT ref: 00F4F1CB
                                          • Part of subcall function 00F443C6: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F443E1
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F4F1FA
                                        • FindClose.KERNEL32(00000000), ref: 00F4F205
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F4F221
                                        • _wcscmp.LIBCMT ref: 00F4F248
                                        • _wcscmp.LIBCMT ref: 00F4F25F
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4F271
                                        • SetCurrentDirectoryW.KERNEL32(00F98920), ref: 00F4F28F
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F4F299
                                        • FindClose.KERNEL32(00000000), ref: 00F4F2A6
                                        • FindClose.KERNEL32(00000000), ref: 00F4F2B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                        • String ID: *.*
                                        • API String ID: 1824444939-438819550
                                        • Opcode ID: 943467f3a19416a044208e7d609b6cae32f674976f0591db2db6b7fe4492dfb3
                                        • Instruction ID: 41bd98da2590729f6a359562e18d5329ad13b55a0a0ee00aa2ea83090dc10fe7
                                        • Opcode Fuzzy Hash: 943467f3a19416a044208e7d609b6cae32f674976f0591db2db6b7fe4492dfb3
                                        • Instruction Fuzzy Hash: F231E33690021A6ADF109FA4EC59EEE7BAC9F45370F100171EC18E21A0DBB1DF49FA54
                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F4A299
                                        • __swprintf.LIBCMT ref: 00F4A2BB
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F4A2F8
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F4A31D
                                        • _memset.LIBCMT ref: 00F4A33C
                                        • _wcsncpy.LIBCMT ref: 00F4A378
                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F4A3AD
                                        • CloseHandle.KERNEL32(00000000), ref: 00F4A3B8
                                        • RemoveDirectoryW.KERNEL32(?), ref: 00F4A3C1
                                        • CloseHandle.KERNEL32(00000000), ref: 00F4A3CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                        • String ID: :$\$\??\%s
                                        • API String ID: 2733774712-3457252023
                                        • Opcode ID: 933bf3f2f1ff01625cb85240e72e72e278373777efb3f3b36f4f87185698c752
                                        • Instruction ID: ea57a4b7c754efd47a47a5104028e0e48f382e45a448b65ad3df3180359c254c
                                        • Opcode Fuzzy Hash: 933bf3f2f1ff01625cb85240e72e72e278373777efb3f3b36f4f87185698c752
                                        • Instruction Fuzzy Hash: 8131C572940109ABDB20DFA0DC49FFB37BCEF89750F1041B6F918D2150E7B49644AB25
                                        APIs
                                          • Part of subcall function 00F3852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F38546
                                          • Part of subcall function 00F3852A: GetLastError.KERNEL32(?,00F3800A,?,?,?), ref: 00F38550
                                          • Part of subcall function 00F3852A: GetProcessHeap.KERNEL32(00000008,?,?,00F3800A,?,?,?), ref: 00F3855F
                                          • Part of subcall function 00F3852A: HeapAlloc.KERNEL32(00000000,?,00F3800A,?,?,?), ref: 00F38566
                                          • Part of subcall function 00F3852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3857D
                                          • Part of subcall function 00F385C7: GetProcessHeap.KERNEL32(00000008,00F38020,00000000,00000000,?,00F38020,?), ref: 00F385D3
                                          • Part of subcall function 00F385C7: HeapAlloc.KERNEL32(00000000,?,00F38020,?), ref: 00F385DA
                                          • Part of subcall function 00F385C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00F38020,?), ref: 00F385EB
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F38238
                                        • _memset.LIBCMT ref: 00F3824D
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F3826C
                                        • GetLengthSid.ADVAPI32(?), ref: 00F3827D
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00F382BA
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F382D6
                                        • GetLengthSid.ADVAPI32(?), ref: 00F382F3
                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00F38302
                                        • HeapAlloc.KERNEL32(00000000), ref: 00F38309
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F3832A
                                        • CopySid.ADVAPI32(00000000), ref: 00F38331
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F38362
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F38388
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F3839C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3996160137-0
                                        • Opcode ID: d16def138b698686fe2eff23488d03ea96f43c083425725841311114a3e1981a
                                        • Instruction ID: de3e217a80478e055af823eae04790fdec0c558ba8a868c30cdec32356d50fa2
                                        • Opcode Fuzzy Hash: d16def138b698686fe2eff23488d03ea96f43c083425725841311114a3e1981a
                                        • Instruction Fuzzy Hash: 8F615D71900209EFDF10CF94DC44AEEBB79FF44760F048129F915A6251DB799A06EB60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa$UCP)$UTF)$UTF16)
                                        • API String ID: 0-3700951917
                                        • Opcode ID: 1447fdedb3a71e06f9be27bec01b783ffca8c296141db5a578dc732fb426e002
                                        • Instruction ID: 59fcee25e945f7bcb5e109796491a11cda6dccbeadcd5f08c53b9ee8290fd92c
                                        • Opcode Fuzzy Hash: 1447fdedb3a71e06f9be27bec01b783ffca8c296141db5a578dc732fb426e002
                                        • Instruction Fuzzy Hash: 33727E75E002199BDB24DF58C8817BEB7F5FF48320F14816AE949EB291EB709E41DB90
                                        APIs
                                          • Part of subcall function 00F60EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5FE38,?,?), ref: 00F60EBC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F60537
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F605D6
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F6066E
                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00F608AD
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F608BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                        • String ID:
                                        • API String ID: 1240663315-0
                                        • Opcode ID: 9c281f041278698d75e8514bf3dfe82c3c4f026d84758fe66deaa1cad906ee14
                                        • Instruction ID: a3087e9b602bffc34eb500e05ff972b54a5172afd73326144ca9e5bc93ddbf35
                                        • Opcode Fuzzy Hash: 9c281f041278698d75e8514bf3dfe82c3c4f026d84758fe66deaa1cad906ee14
                                        • Instruction Fuzzy Hash: 76E15D31604214AFCB14DF29C891E2BBBE4EF88724F14896DF45ADB262DB30ED05DB91
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00F40062
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00F400E3
                                        • GetKeyState.USER32(000000A0), ref: 00F400FE
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00F40118
                                        • GetKeyState.USER32(000000A1), ref: 00F4012D
                                        • GetAsyncKeyState.USER32(00000011), ref: 00F40145
                                        • GetKeyState.USER32(00000011), ref: 00F40157
                                        • GetAsyncKeyState.USER32(00000012), ref: 00F4016F
                                        • GetKeyState.USER32(00000012), ref: 00F40181
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00F40199
                                        • GetKeyState.USER32(0000005B), ref: 00F401AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: a46b6c30888fcdb052617fb5478e7afd507f3caaf4c008860930f2bc3256fe91
                                        • Instruction ID: d285f859b7a22cfbc4a7ac57236307e0f4d6c41b46b4812a0b92b946d55bc49a
                                        • Opcode Fuzzy Hash: a46b6c30888fcdb052617fb5478e7afd507f3caaf4c008860930f2bc3256fe91
                                        • Instruction Fuzzy Hash: 2141B834D047C969FF318A6488047A5BEA06F51364F08409ADFC6475C2DFF49DC8E7A2
                                        APIs
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • CoInitialize.OLE32 ref: 00F58518
                                        • CoUninitialize.OLE32 ref: 00F58523
                                        • CoCreateInstance.OLE32(?,00000000,00000017,00F72BEC,?), ref: 00F58583
                                        • IIDFromString.OLE32(?,?), ref: 00F585F6
                                        • VariantInit.OLEAUT32(?), ref: 00F58690
                                        • VariantClear.OLEAUT32(?), ref: 00F586F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                        • API String ID: 834269672-1287834457
                                        • Opcode ID: 8d3211f0be3e9b5752a677bbdfd9008e4e5c6706fb1873f83d50c2c47d11a0ea
                                        • Instruction ID: 5c4bebe9342c5b0c92a7af947f1ecf3b44bad69c8377f266dc3a11b79fa53cfa
                                        • Opcode Fuzzy Hash: 8d3211f0be3e9b5752a677bbdfd9008e4e5c6706fb1873f83d50c2c47d11a0ea
                                        • Instruction Fuzzy Hash: 3461E3716083019FD710DF24C844B5EBBE4AF497A5F04481DFA85AB291DB70ED4EEB92
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                        • String ID:
                                        • API String ID: 1737998785-0
                                        • Opcode ID: 926f340f29031cb3e14788bae03bb57575b37d00bc8c37a7e42e277458f23dc7
                                        • Instruction ID: ee3c92c18b03c505b61c8dc985c5cbe3c47c4e47737ff1c7f7da2e497c3df29b
                                        • Opcode Fuzzy Hash: 926f340f29031cb3e14788bae03bb57575b37d00bc8c37a7e42e277458f23dc7
                                        • Instruction Fuzzy Hash: 6521A3352002149FDB10AF60EC49B6D77E8FF44725F10802AFA56DB2B2DB75AC44EB54
                                        APIs
                                          • Part of subcall function 00EE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EE48A1,?,?,00EE37C0,?), ref: 00EE48CE
                                          • Part of subcall function 00F44AD8: GetFileAttributesW.KERNEL32(?,00F4374F), ref: 00F44AD9
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F438E7
                                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00F4398F
                                        • MoveFileW.KERNEL32(?,?), ref: 00F439A2
                                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00F439BF
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F439E1
                                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00F439FD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                        • String ID: \*.*
                                        • API String ID: 4002782344-1173974218
                                        • Opcode ID: c17838f57f7f239e5beabf7340a4ff1f0edd243bbff765eb786546d590750068
                                        • Instruction ID: 82de34725aac56cc643e246b6df8caedb714edcf1e3710c0c40cc22292d3958b
                                        • Opcode Fuzzy Hash: c17838f57f7f239e5beabf7340a4ff1f0edd243bbff765eb786546d590750068
                                        • Instruction Fuzzy Hash: 0851D432C0418D9ACF11EBA1DD929EDBBB9AF14300F64416AE84677192EF706F0DDB60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ERCP$Oa$VUUU$VUUU$VUUU$VUUU
                                        • API String ID: 0-3486589167
                                        • Opcode ID: 25878b6c7bd22c94018a97d280ad61e5453d8f3098f3617d6ffe889a098d6950
                                        • Instruction ID: 382b610c2a1a86734da02afaeb91a12611c44b70d5160053f0629a7b193c752f
                                        • Opcode Fuzzy Hash: 25878b6c7bd22c94018a97d280ad61e5453d8f3098f3617d6ffe889a098d6950
                                        • Instruction Fuzzy Hash: 53A28CB0E0422ECBDF24DF58D9507BEB7B1BB44314F2491AADA15B7280E7749E81DB90
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00F4F4CC
                                        • Sleep.KERNEL32(0000000A), ref: 00F4F4FC
                                        • _wcscmp.LIBCMT ref: 00F4F510
                                        • _wcscmp.LIBCMT ref: 00F4F52B
                                        • FindNextFileW.KERNEL32(?,?), ref: 00F4F5C9
                                        • FindClose.KERNEL32(00000000), ref: 00F4F5DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                        • String ID: *.*
                                        • API String ID: 713712311-438819550
                                        • Opcode ID: 715a40bf841ca75986d0e39deff27e8679652598ff6d5bd90db1a0d464d7c10c
                                        • Instruction ID: a1d10e19ae2dd2c69eebe43fbbf817324c3c09631abecd48312efc99e07a5507
                                        • Opcode Fuzzy Hash: 715a40bf841ca75986d0e39deff27e8679652598ff6d5bd90db1a0d464d7c10c
                                        • Instruction Fuzzy Hash: 8141607190021EAFDF11DFA4DC55AEE7BB4FF05320F144566E819A32A1EB309E48EB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 4d7ad634d418c51047d4ec783bd35b443e25e89035372713e60c2f2361735bcb
                                        • Instruction ID: b198d50d577666d7cf77c26a3499d48715090436b973f1b480fbefdb2fdfaa8a
                                        • Opcode Fuzzy Hash: 4d7ad634d418c51047d4ec783bd35b443e25e89035372713e60c2f2361735bcb
                                        • Instruction Fuzzy Hash: 4312A971A00A0EEFDF14CFA5D981AEEB3F5FF48310F10856AE506A7291EB35A911DB50
                                        APIs
                                          • Part of subcall function 00F00F36: std::exception::exception.LIBCMT ref: 00F00F6C
                                          • Part of subcall function 00F00F36: __CxxThrowException@8.LIBCMT ref: 00F00F81
                                        • _memmove.LIBCMT ref: 00F305AE
                                        • _memmove.LIBCMT ref: 00F306C3
                                        • _memmove.LIBCMT ref: 00F3076A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                                        • String ID: yZ
                                        • API String ID: 1300846289-3798167742
                                        • Opcode ID: c4bdbfbaed69b4e0af26f35ceb71ec6a328f2e5d891f627ad906a3defcc7c333
                                        • Instruction ID: 95ceaf540d9c905dc21fb37e4210f37b7380746e7e7918abf90f003dbcac4982
                                        • Opcode Fuzzy Hash: c4bdbfbaed69b4e0af26f35ceb71ec6a328f2e5d891f627ad906a3defcc7c333
                                        • Instruction Fuzzy Hash: E302D271E00209DBDF04DF64D991ABEBBF5EF44310F14806AE90AEB295EB35D911EB90
                                        APIs
                                          • Part of subcall function 00F38AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F38AED
                                          • Part of subcall function 00F38AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F38B1A
                                          • Part of subcall function 00F38AA3: GetLastError.KERNEL32 ref: 00F38B27
                                        • ExitWindowsEx.USER32(?,00000000), ref: 00F452A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                        • String ID: $@$SeShutdownPrivilege
                                        • API String ID: 2234035333-194228
                                        • Opcode ID: 7b2321d9cfbce661a23cdd1397ecb6a3435755e86b79d1c606fc6f6adb344a7d
                                        • Instruction ID: 75316a68314ed861f22656cfce69cbf976dbaf6c01c57627da8504fd17775216
                                        • Opcode Fuzzy Hash: 7b2321d9cfbce661a23cdd1397ecb6a3435755e86b79d1c606fc6f6adb344a7d
                                        • Instruction Fuzzy Hash: F4017031A907156BFB287678AC47BB67A58DB05F61F240123FC13D10D3D9D45E0471A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __itow__swprintf
                                        • String ID: Oa
                                        • API String ID: 674341424-3945284152
                                        • Opcode ID: 847863d14533fe742c3924d8bb2a9e2a6f7abc2cf923dbd725b64a8ba0e71e69
                                        • Instruction ID: f68f672192514099ded4a464d90172f9ec9c2c01e6527117ca9271cd5fa95f08
                                        • Opcode Fuzzy Hash: 847863d14533fe742c3924d8bb2a9e2a6f7abc2cf923dbd725b64a8ba0e71e69
                                        • Instruction Fuzzy Hash: FC22AC715083559FD724EF24C881BAFB7E4AF84314F10592DF99AA7292DB30EA04DB92
                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F563F2
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56401
                                        • bind.WSOCK32(00000000,?,00000010), ref: 00F5641D
                                        • listen.WSOCK32(00000000,00000005), ref: 00F5642C
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56446
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00F5645A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                        • String ID:
                                        • API String ID: 1279440585-0
                                        • Opcode ID: 46ccc61debd10aac38692079393e767a320f64401364a384f8c8055a762b05b4
                                        • Instruction ID: 227070257d538d9077e21313ab8c9221e7abbe52cd419d124d45be40b3e13e3b
                                        • Opcode Fuzzy Hash: 46ccc61debd10aac38692079393e767a320f64401364a384f8c8055a762b05b4
                                        • Instruction Fuzzy Hash: BB21C1316002089FCB10EF64D845B2EB7E9EF48721F108168E96AE73D2C770AC09EB51
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00EE19FA
                                        • GetSysColor.USER32(0000000F), ref: 00EE1A4E
                                        • SetBkColor.GDI32(?,00000000), ref: 00EE1A61
                                          • Part of subcall function 00EE1290: DefDlgProcW.USER32(?,00000020,?), ref: 00EE12D8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ColorProc$LongWindow
                                        • String ID:
                                        • API String ID: 3744519093-0
                                        • Opcode ID: 1f807314d87501504769afb838b09ec694cde217b25051c5b7cf3e8c708dd10a
                                        • Instruction ID: 65c1f781c817fba068030afdc862a03c0d440e05a3dba870ecbeab7b6d7f70dc
                                        • Opcode Fuzzy Hash: 1f807314d87501504769afb838b09ec694cde217b25051c5b7cf3e8c708dd10a
                                        • Instruction Fuzzy Hash: A8A167B11055CCFAD628AA2A8C44DFF359DEF86395B14116DF406F6196CA399CC0B2B2
                                        APIs
                                          • Part of subcall function 00F57EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00F57ECB
                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F568B4
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F568DD
                                        • bind.WSOCK32(00000000,?,00000010), ref: 00F56916
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56923
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00F56937
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                        • String ID:
                                        • API String ID: 99427753-0
                                        • Opcode ID: e5a25ab2da167d6b4407b4de4d59f0f6685266084ec5faa61332c0a5735b15d4
                                        • Instruction ID: 039f3faf2f2b960d84fdf15add0776e94cb43dd7242ef845efd9ccec93d2b866
                                        • Opcode Fuzzy Hash: e5a25ab2da167d6b4407b4de4d59f0f6685266084ec5faa61332c0a5735b15d4
                                        • Instruction Fuzzy Hash: A841B575A00218AFEB10AF659C86F7E77E9DF48720F448058FA1AAB3D3DA709D009791
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                        • String ID:
                                        • API String ID: 292994002-0
                                        • Opcode ID: f61731141ba6133f386d2bc4f6f4812dce23045f0e303dcbae472fde588d9c19
                                        • Instruction ID: d376533fb5ecc32fe14ee35c967d533164225a2915a9708446fee2863ecad4f0
                                        • Opcode Fuzzy Hash: f61731141ba6133f386d2bc4f6f4812dce23045f0e303dcbae472fde588d9c19
                                        • Instruction Fuzzy Hash: FB110432B009146FE7209F27DC64B2A7798FF44B22F048068F846E7251CF719C42E694
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00F21CB7,?), ref: 00F5C112
                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00F5C124
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                        • API String ID: 2574300362-1816364905
                                        • Opcode ID: d192728d27fa286987c46ddb3ec5ccbd2a7d3d6ef53f212f05c37dcbe35c1a72
                                        • Instruction ID: c8ff411f2d6ab57037315812f12a98fadf8e436238730e608994f07c7e7a3a4b
                                        • Opcode Fuzzy Hash: d192728d27fa286987c46ddb3ec5ccbd2a7d3d6ef53f212f05c37dcbe35c1a72
                                        • Instruction Fuzzy Hash: 97E01D74900713CFD7205F25D818A4176D4EF197D9B408439DD56D2151D7B8D448E750
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00F5EF51
                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00F5EF5F
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • Process32NextW.KERNEL32(00000000,?), ref: 00F5F01F
                                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00F5F02E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                        • String ID:
                                        • API String ID: 2576544623-0
                                        • Opcode ID: aff9e5bdf23828464f951bcffc79a0fbedf340abdac2c5a746bb177550d1622d
                                        • Instruction ID: 8b25e9a8981e49c2eb88813c8cc672b3a9e6523e20fc520910f3c0966e7ccc42
                                        • Opcode Fuzzy Hash: aff9e5bdf23828464f951bcffc79a0fbedf340abdac2c5a746bb177550d1622d
                                        • Instruction Fuzzy Hash: CE518071508345AFD310EF25DC85E6BB7E8FF88710F14582DF99697292EB70A908CB92
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F3E93A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: ($|
                                        • API String ID: 1659193697-1631851259
                                        • Opcode ID: 7108e78cffbe7ca8016ad71cf132861e4630a68aecea23ea125201d787b5c7c8
                                        • Instruction ID: ca43383be2cf1ea0025a756d00763b93904e9e2321e6e7593e51f7edf028a73e
                                        • Opcode Fuzzy Hash: 7108e78cffbe7ca8016ad71cf132861e4630a68aecea23ea125201d787b5c7c8
                                        • Instruction Fuzzy Hash: 89320475A006059FDB28CF19C481A6AB7F1FF48320F15C56EE89ADB3A1E770E981DB40
                                        APIs
                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F51920,00000000), ref: 00F524F7
                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00F5252E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Internet$AvailableDataFileQueryRead
                                        • String ID:
                                        • API String ID: 599397726-0
                                        • Opcode ID: 24507224a8d8930c7079f38766fa3355616878bd593b1130d73dcb435485a05c
                                        • Instruction ID: e08ce6ae5740392211a4df994660ca4e98228d349af9de413fe37dfd2e99df62
                                        • Opcode Fuzzy Hash: 24507224a8d8930c7079f38766fa3355616878bd593b1130d73dcb435485a05c
                                        • Instruction Fuzzy Hash: 8941F871900209BFEB60DE94DC85FBFB7BCEB42726F14412AFB01A6141EB709E49B650
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 00F4B3CF
                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F4B429
                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00F4B476
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DiskFreeSpace
                                        • String ID:
                                        • API String ID: 1682464887-0
                                        • Opcode ID: 4073f615469eb453f4eaf2757d5b012bf9aba47730706a381c62d031710bd264
                                        • Instruction ID: 0a5b0aad1ded0830b900b348426a09b1f0bdceb0358a3a0d83e38ac36e4e4101
                                        • Opcode Fuzzy Hash: 4073f615469eb453f4eaf2757d5b012bf9aba47730706a381c62d031710bd264
                                        • Instruction Fuzzy Hash: 07216235A0011CEFCB00EFA5D880AADBBF8FF49314F1480AAE905AB362CB319915DB50
                                        APIs
                                          • Part of subcall function 00F00F36: std::exception::exception.LIBCMT ref: 00F00F6C
                                          • Part of subcall function 00F00F36: __CxxThrowException@8.LIBCMT ref: 00F00F81
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F38AED
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F38B1A
                                        • GetLastError.KERNEL32 ref: 00F38B27
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                        • String ID:
                                        • API String ID: 1922334811-0
                                        • Opcode ID: b07be7c5b71bf7c77d601b17a0588577ba8dc481ce0cdfb6bf6a5ca4eeca4546
                                        • Instruction ID: 96328a4267c2a52d898f3638277596b1ae226a242294d29aa760d434aee8249f
                                        • Opcode Fuzzy Hash: b07be7c5b71bf7c77d601b17a0588577ba8dc481ce0cdfb6bf6a5ca4eeca4546
                                        • Instruction Fuzzy Hash: CC11BFB291430ABFD7289F54EC85D2BB7B8EB44321B20816EF45697241EB74AC01EA60
                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F44A31
                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F44A48
                                        • FreeSid.ADVAPI32(?), ref: 00F44A58
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                        • String ID:
                                        • API String ID: 3429775523-0
                                        • Opcode ID: 6200a16c98227232fec19bab57f21a19fa0dbb0376768ca04befe8db2910c819
                                        • Instruction ID: 8866cb75715ad02b4d788f46bcc9b0bfa3ebed1a78101e917e8b667f66fdaee2
                                        • Opcode Fuzzy Hash: 6200a16c98227232fec19bab57f21a19fa0dbb0376768ca04befe8db2910c819
                                        • Instruction Fuzzy Hash: 0DF04F7595130CBFDF00DFF0DD89AADBBBCEF08311F004469E901E2181D6746A049B50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cacd635360806800189b7257eed3c86207a436bd6c7a1f02640370f6150d7f25
                                        • Instruction ID: ba7d72104061ff63cd13d39cb0dea2cdf2ba8c6593320a249d048c68e99b3b9b
                                        • Opcode Fuzzy Hash: cacd635360806800189b7257eed3c86207a436bd6c7a1f02640370f6150d7f25
                                        • Instruction Fuzzy Hash: 4022DCB0A0025ACFDB24DF55D480ABEB7F0FF08310F149069E856AB395E739AD85DB91
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F4C787
                                        • FindClose.KERNEL32(00000000), ref: 00F4C7B7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: 9522824e1c97914498d74230150555755f092b18cf431ba9d8d3b72b13c87e20
                                        • Instruction ID: e70fe1398bfb51950193cf61a772960def5d4febdb446caf47bce59a6807760d
                                        • Opcode Fuzzy Hash: 9522824e1c97914498d74230150555755f092b18cf431ba9d8d3b72b13c87e20
                                        • Instruction Fuzzy Hash: 91115E766106049FD710DF29D845A2AF7E9FF94324F00851EF9AAD7391DB70A804DB91
                                        APIs
                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00F5957D,?,00F6FB84,?), ref: 00F4A121
                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00F5957D,?,00F6FB84,?), ref: 00F4A133
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorFormatLastMessage
                                        • String ID:
                                        • API String ID: 3479602957-0
                                        • Opcode ID: 09ff402b41500c54138392a424ddd3be0a0e4840c82d68e8ad6926faacc08785
                                        • Instruction ID: 1bea03cbe8b54cc053ae93fc4a4d41a2c284329e7e251a6fc6f082fc15aff1f1
                                        • Opcode Fuzzy Hash: 09ff402b41500c54138392a424ddd3be0a0e4840c82d68e8ad6926faacc08785
                                        • Instruction Fuzzy Hash: 6BF0E23654422DBBDB209FA4CC48FEA776CFF08361F004266F919E2180D6749944DFA1
                                        APIs
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F38631), ref: 00F38508
                                        • CloseHandle.KERNEL32(?,?,00F38631), ref: 00F3851A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AdjustCloseHandlePrivilegesToken
                                        • String ID:
                                        • API String ID: 81990902-0
                                        • Opcode ID: 37c8217e1377828d44afa2dd0d5f6daf02be8d64ef86e1d95e361c2bfb105594
                                        • Instruction ID: 0a9a80c69a76d77997fe0752ca18bbdc79828cdbeb39d72bd1c31c3be52e515f
                                        • Opcode Fuzzy Hash: 37c8217e1377828d44afa2dd0d5f6daf02be8d64ef86e1d95e361c2bfb105594
                                        • Instruction Fuzzy Hash: 4AE0B672014611AFEB252B64FC09E77BBA9EB44361B148829F4A680474DB66ACA1FB50
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00F08ED7,?,?,?,00000001), ref: 00F0A2DA
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00F0A2E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 85239e0854a08da84e2d35a1533e334105a92e5fac3313ed3b46a8f3fab9dbf4
                                        • Instruction ID: 34febaf63c8de296c5c2f863d2d465cf02f4b0323e9098fddd618e98d46ffe81
                                        • Opcode Fuzzy Hash: 85239e0854a08da84e2d35a1533e334105a92e5fac3313ed3b46a8f3fab9dbf4
                                        • Instruction Fuzzy Hash: 05B0923105820CABCA002B91FC0AB883F68EB44AA2F404020F61D84262EBA25454AA91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f72ca9ac58f87e3945d516926e767231ab518f2a49e34ebbc416ddcba43deeed
                                        • Instruction ID: 8458289515f6ffb05968e3a561e20170a657e6619e0579ba2e36143958aec5a9
                                        • Opcode Fuzzy Hash: f72ca9ac58f87e3945d516926e767231ab518f2a49e34ebbc416ddcba43deeed
                                        • Instruction Fuzzy Hash: 6132F462D29F054DD723A638D832336A249AFB73D4F15D737E819B5DAAEB28C4C36101
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 716e3faa98484710214b60d8c5760e7b2fe4c406faac6f92ba2937fb94860ea4
                                        • Instruction ID: 55e0bccad227512308ecccf5ae24050ca69f85a12258bf0c4b2c7759e1514cda
                                        • Opcode Fuzzy Hash: 716e3faa98484710214b60d8c5760e7b2fe4c406faac6f92ba2937fb94860ea4
                                        • Instruction Fuzzy Hash: D1B1F220D2AF444DD2639A398835336B65CAFFB2D5F52D71BFC1A74D22EB2285C35142
                                        APIs
                                        • __time64.LIBCMT ref: 00F48944
                                          • Part of subcall function 00F0537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00F49017,00000000,?,?,?,?,00F491C8,00000000,?), ref: 00F05383
                                          • Part of subcall function 00F0537A: __aulldiv.LIBCMT ref: 00F053A3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Time$FileSystem__aulldiv__time64
                                        • String ID:
                                        • API String ID: 2893107130-0
                                        • Opcode ID: a9531647a053c9461fb15a33ab71f9f5e896fced84e6403b514e1116e225ce8a
                                        • Instruction ID: 9a44a9020bbb381939fe2c01d0a72e3beea8ab70416512be05d498c631d5a7d6
                                        • Opcode Fuzzy Hash: a9531647a053c9461fb15a33ab71f9f5e896fced84e6403b514e1116e225ce8a
                                        • Instruction Fuzzy Hash: 5521D272A35510CFC729CF25D841A52B7E1EBA5320B288E2CE5F5CB2C0CA74A905EB54
                                        APIs
                                        • BlockInput.USER32(00000001), ref: 00F5403A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BlockInput
                                        • String ID:
                                        • API String ID: 3456056419-0
                                        • Opcode ID: 1ff408008bac4eec8d7d2d2025f67751addbe526ff58cb0f580639bbff0060fc
                                        • Instruction ID: f034e8d122294ada905e31143596432d3242c98467f60cf404a412853690a778
                                        • Opcode Fuzzy Hash: 1ff408008bac4eec8d7d2d2025f67751addbe526ff58cb0f580639bbff0060fc
                                        • Instruction Fuzzy Hash: F3E048722001185FC710AF5AD404A56FBD8AF64765F108025FD4AD7351DA70F8449B90
                                        APIs
                                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00F44D1D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: mouse_event
                                        • String ID:
                                        • API String ID: 2434400541-0
                                        • Opcode ID: d8e09887bfe232b544aed54601b8730c0160817bf2ee8b673e268102dfac37fb
                                        • Instruction ID: 43bdebcc7bdd0c0449b58f8b8c72c272daa65c052e3df8768f554f0571a4d78e
                                        • Opcode Fuzzy Hash: d8e09887bfe232b544aed54601b8730c0160817bf2ee8b673e268102dfac37fb
                                        • Instruction Fuzzy Hash: 5BD09EA5D6464679FC2C0B209C1FB762929F3007A6FA845497E02B61C6A9E87C45B835
                                        APIs
                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00F386B1), ref: 00F38A93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LogonUser
                                        • String ID:
                                        • API String ID: 1244722697-0
                                        • Opcode ID: 657ae60a8982976ea0887ff52f4a01ddc4f1da492d562795d6e88cf3d79b6114
                                        • Instruction ID: 89c00bb1137ac640cc947b92f1e261452b03a82d09223ec977ca6f36cf28da4a
                                        • Opcode Fuzzy Hash: 657ae60a8982976ea0887ff52f4a01ddc4f1da492d562795d6e88cf3d79b6114
                                        • Instruction Fuzzy Hash: 40D09E3226450EBBEF019EA4ED05EAE3B69EB04B01F408511FE25D51A1C7B5D935AB60
                                        APIs
                                        • GetUserNameW.ADVAPI32(?,?), ref: 00F22171
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: cb92f20f922010ab920765bc455d5d0ccdcf52a765f4cec13a1d1f7134ce418c
                                        • Instruction ID: e9090c336f695329ab63ccbe909786a40b5e533dc4789991d9a4a1a64c473b0c
                                        • Opcode Fuzzy Hash: cb92f20f922010ab920765bc455d5d0ccdcf52a765f4cec13a1d1f7134ce418c
                                        • Instruction Fuzzy Hash: 8EC002B180111D9BCB05DB90E9889EA77BCAB04304F104055A111A2100D6749B449A61
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00F0A2AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 4d716bd5cbbffff2990be9590a877a2bfa89cc0bc55ff2636551ccc56b765d65
                                        • Instruction ID: 8a15b5eac10adf69e0bda62cbafd2b8f2397e3c6c2566d93a928b2c50ca75550
                                        • Opcode Fuzzy Hash: 4d716bd5cbbffff2990be9590a877a2bfa89cc0bc55ff2636551ccc56b765d65
                                        • Instruction Fuzzy Hash: F0A0243000010CF7CF001F41FC054447F5CD7001D07004030F40C40133D773541055C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9187892c7c2f485a0a0c5a0273fba729dcb63db24f0cbc925eed905479fc417b
                                        • Instruction ID: 5a020b9a15d89c642ea355742e3d078338a07e3c10cc306ae117f45664faadd4
                                        • Opcode Fuzzy Hash: 9187892c7c2f485a0a0c5a0273fba729dcb63db24f0cbc925eed905479fc417b
                                        • Instruction Fuzzy Hash: 7D225575A0451ACBCF388F68C69437CB7A1FF81728F28906BDA56AB591DB30DD81E740
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction ID: 128bcaeae44e9d9ad80197da3f7b7d7f20278fd606c4409a974798c320d02de4
                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                        • Instruction Fuzzy Hash: 35C17836A1515309DF6E4739887813EFEA16AA27B231A075DE8B3CB1D5EF10C564F620
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction ID: 414abfa683877f02f8df4e186159140b1cbd2287404ef32a9a8e68d19b5b4c37
                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                        • Instruction Fuzzy Hash: 14C18633A1519309DFAE4639887813EBFA16B927B231A076DE4B2DB1D4EF14C524F620
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                        • Instruction ID: 1c9cf838d867ec7f1cc2b4cd9e8afa5e54c57a2151c5e3de794e8299ccf50f04
                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                        • Instruction Fuzzy Hash: 07C17332A1519309DF6E4739C87417EBEA17AA27B231A076DE4B3DB1C4EF20D564F620
                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 00F57970
                                        • DeleteObject.GDI32(00000000), ref: 00F57982
                                        • DestroyWindow.USER32 ref: 00F57990
                                        • GetDesktopWindow.USER32 ref: 00F579AA
                                        • GetWindowRect.USER32(00000000), ref: 00F579B1
                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00F57AF2
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00F57B02
                                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57B4A
                                        • GetClientRect.USER32(00000000,?), ref: 00F57B56
                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F57B90
                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57BB2
                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57BC5
                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57BD0
                                        • GlobalLock.KERNEL32(00000000), ref: 00F57BD9
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57BE8
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F57BF1
                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57BF8
                                        • GlobalFree.KERNEL32(00000000), ref: 00F57C03
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57C15
                                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00F72CAC,00000000), ref: 00F57C2B
                                        • GlobalFree.KERNEL32(00000000), ref: 00F57C3B
                                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00F57C61
                                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00F57C80
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57CA2
                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F57E8F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                        • String ID: $AutoIt v3$DISPLAY$static
                                        • API String ID: 2211948467-2373415609
                                        • Opcode ID: 81882118376c0371b0e21d704b648738093e6318608da60bd6c94d2e2507479c
                                        • Instruction ID: 8e49eb4b91075429ad2b56794017a2e592a2feb360f00083dcf80b5dede6dce1
                                        • Opcode Fuzzy Hash: 81882118376c0371b0e21d704b648738093e6318608da60bd6c94d2e2507479c
                                        • Instruction Fuzzy Hash: A7027D71900209AFDB14DFA4EC89EAEBBB9FF49311F108158F915AB2A1CB749D05DB60
                                        APIs
                                        • CharUpperBuffW.USER32(?,?,00F6F910), ref: 00F63690
                                        • IsWindowVisible.USER32(?), ref: 00F636B4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharUpperVisibleWindow
                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                        • API String ID: 4105515805-45149045
                                        • Opcode ID: 2177d0f6195bb714a3aca6f04859f009f66882b2c389fa1c934d1f9777c3b271
                                        • Instruction ID: b1e6ae79666a1c4a845b60d218e4e829387d48cc0ee5876e2e2079ff39b72aac
                                        • Opcode Fuzzy Hash: 2177d0f6195bb714a3aca6f04859f009f66882b2c389fa1c934d1f9777c3b271
                                        • Instruction Fuzzy Hash: 0CD18E346082019BDB14EF14C891A6AB7E6AF94354F14856CF8865B3E3CF75EE0AFB41
                                        APIs
                                        • SetTextColor.GDI32(?,00000000), ref: 00F6A662
                                        • GetSysColorBrush.USER32(0000000F), ref: 00F6A693
                                        • GetSysColor.USER32(0000000F), ref: 00F6A69F
                                        • SetBkColor.GDI32(?,000000FF), ref: 00F6A6B9
                                        • SelectObject.GDI32(?,00000000), ref: 00F6A6C8
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F6A6F3
                                        • GetSysColor.USER32(00000010), ref: 00F6A6FB
                                        • CreateSolidBrush.GDI32(00000000), ref: 00F6A702
                                        • FrameRect.USER32(?,?,00000000), ref: 00F6A711
                                        • DeleteObject.GDI32(00000000), ref: 00F6A718
                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00F6A763
                                        • FillRect.USER32(?,?,00000000), ref: 00F6A795
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F6A7C0
                                          • Part of subcall function 00F6A8FC: GetSysColor.USER32(00000012), ref: 00F6A935
                                          • Part of subcall function 00F6A8FC: SetTextColor.GDI32(?,?), ref: 00F6A939
                                          • Part of subcall function 00F6A8FC: GetSysColorBrush.USER32(0000000F), ref: 00F6A94F
                                          • Part of subcall function 00F6A8FC: GetSysColor.USER32(0000000F), ref: 00F6A95A
                                          • Part of subcall function 00F6A8FC: GetSysColor.USER32(00000011), ref: 00F6A977
                                          • Part of subcall function 00F6A8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F6A985
                                          • Part of subcall function 00F6A8FC: SelectObject.GDI32(?,00000000), ref: 00F6A996
                                          • Part of subcall function 00F6A8FC: SetBkColor.GDI32(?,00000000), ref: 00F6A99F
                                          • Part of subcall function 00F6A8FC: SelectObject.GDI32(?,?), ref: 00F6A9AC
                                          • Part of subcall function 00F6A8FC: InflateRect.USER32(?,000000FF,000000FF), ref: 00F6A9CB
                                          • Part of subcall function 00F6A8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F6A9E2
                                          • Part of subcall function 00F6A8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 00F6A9F7
                                          • Part of subcall function 00F6A8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F6AA1F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 3521893082-0
                                        • Opcode ID: 817d65ccf8e9904dff8a22c4c9ea1e11862b8d815c01265b046acfc6a9df756f
                                        • Instruction ID: a5f554b3aa0002cee84ac3b344cb13eacbd81837f4f7f951b9b78031d701ee1c
                                        • Opcode Fuzzy Hash: 817d65ccf8e9904dff8a22c4c9ea1e11862b8d815c01265b046acfc6a9df756f
                                        • Instruction Fuzzy Hash: D7917D72408305BFC7109F64EC08A5B7BA9FF89331F141A29F962E61A1D7B1D948EF52
                                        APIs
                                        • DestroyWindow.USER32(?,?,?), ref: 00EE2CA2
                                        • DeleteObject.GDI32(00000000), ref: 00EE2CE8
                                        • DeleteObject.GDI32(00000000), ref: 00EE2CF3
                                        • DestroyIcon.USER32(00000000,?,?,?), ref: 00EE2CFE
                                        • DestroyWindow.USER32(00000000,?,?,?), ref: 00EE2D09
                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F1C5BB
                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F1C5F4
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F1CA1D
                                          • Part of subcall function 00EE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE2036,?,00000000,?,?,?,?,00EE16CB,00000000,?), ref: 00EE1B9A
                                        • SendMessageW.USER32(?,00001053), ref: 00F1CA5A
                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F1CA71
                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F1CA87
                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F1CA92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                        • String ID: 0
                                        • API String ID: 464785882-4108050209
                                        • Opcode ID: 06304829ab80d059ee98e6cc5e9e44950a6a2c404875fd8a195af170b6be1683
                                        • Instruction ID: e0e003fd42c88edbf02bb45cab1297b700cb192e11ba04e5b5fcffeca57c9489
                                        • Opcode Fuzzy Hash: 06304829ab80d059ee98e6cc5e9e44950a6a2c404875fd8a195af170b6be1683
                                        • Instruction Fuzzy Hash: 6C129C30A40245EFDB25CF24C884BA9BBE5FF04320F64556DE59ADB262C771EC81EB91
                                        APIs
                                        • DestroyWindow.USER32(00000000), ref: 00F575F3
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F576B2
                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00F576F0
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00F57702
                                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00F57748
                                        • GetClientRect.USER32(00000000,?), ref: 00F57754
                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00F57798
                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F577A7
                                        • GetStockObject.GDI32(00000011), ref: 00F577B7
                                        • SelectObject.GDI32(00000000,00000000), ref: 00F577BB
                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00F577CB
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F577D4
                                        • DeleteDC.GDI32(00000000), ref: 00F577DD
                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F57809
                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F57820
                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00F5785B
                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F5786F
                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F57880
                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00F578B0
                                        • GetStockObject.GDI32(00000011), ref: 00F578BB
                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F578C6
                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00F578D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                        • API String ID: 2910397461-517079104
                                        • Opcode ID: 526d5b5be02f6872b347ee29ae90715e2a38f26f1fbe9ed5ba609168786ec357
                                        • Instruction ID: 685d535a99c86a0393195abdf0e0c383a5fb3284a69f80364471accdf359e759
                                        • Opcode Fuzzy Hash: 526d5b5be02f6872b347ee29ae90715e2a38f26f1fbe9ed5ba609168786ec357
                                        • Instruction Fuzzy Hash: 28A182B1A40619BFEB14DFA4EC4AFAE7BB9EB45710F104114FA15A72E1C7B0AD04DB60
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 00F4ADAA
                                        • GetDriveTypeW.KERNEL32(?,00F6FAC0,?,\\.\,00F6F910), ref: 00F4AE87
                                        • SetErrorMode.KERNEL32(00000000,00F6FAC0,?,\\.\,00F6F910), ref: 00F4AFE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DriveType
                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                        • API String ID: 2907320926-4222207086
                                        • Opcode ID: 11bddf01ccce98b4207af66ee1f65161690c9fe38551e930d58e519c2b046ac3
                                        • Instruction ID: 9bf7b46b7d6286bd57cbde226300491d16ba97f9736a64dea59a8e4bd792f085
                                        • Opcode Fuzzy Hash: 11bddf01ccce98b4207af66ee1f65161690c9fe38551e930d58e519c2b046ac3
                                        • Instruction Fuzzy Hash: 0D51D9B5A84209ABDF00DF11CD8297DBBB0AB453607244016FD16A7192CB75DD0AFB83
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                        • API String ID: 1038674560-86951937
                                        • Opcode ID: 89483dc42ad1d46db41e312d8c6e7e886a31a71e2eaacf692f4f739b73bdffda
                                        • Instruction ID: 72c78c7c49b4ae8bb4ead699791ef0cc65d591792d803abaab5945016a5b116b
                                        • Opcode Fuzzy Hash: 89483dc42ad1d46db41e312d8c6e7e886a31a71e2eaacf692f4f739b73bdffda
                                        • Instruction Fuzzy Hash: 05816C70A00349BACB20AF62DC82FFE7798AF24750F045025FD49BA0C2EB64DA51F291
                                        APIs
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00F69B04
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00F69BBD
                                        • SendMessageW.USER32(?,00001102,00000002,?), ref: 00F69BD9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window
                                        • String ID: 0
                                        • API String ID: 2326795674-4108050209
                                        • Opcode ID: 82e5a82a1f78923fb793fbececf817049d3f6ab1ee1e3fa75376419e33105b49
                                        • Instruction ID: 4f9cc70ff6697dade04e72597b3d623fe5a84681647949fcb43011fcf6eff774
                                        • Opcode Fuzzy Hash: 82e5a82a1f78923fb793fbececf817049d3f6ab1ee1e3fa75376419e33105b49
                                        • Instruction Fuzzy Hash: 9902027050C305AFDB15CF24D848BAABBE8FF49320F04862DF5A5D62A1C7B5D944EB92
                                        APIs
                                        • GetSysColor.USER32(00000012), ref: 00F6A935
                                        • SetTextColor.GDI32(?,?), ref: 00F6A939
                                        • GetSysColorBrush.USER32(0000000F), ref: 00F6A94F
                                        • GetSysColor.USER32(0000000F), ref: 00F6A95A
                                        • CreateSolidBrush.GDI32(?), ref: 00F6A95F
                                        • GetSysColor.USER32(00000011), ref: 00F6A977
                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F6A985
                                        • SelectObject.GDI32(?,00000000), ref: 00F6A996
                                        • SetBkColor.GDI32(?,00000000), ref: 00F6A99F
                                        • SelectObject.GDI32(?,?), ref: 00F6A9AC
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F6A9CB
                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F6A9E2
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00F6A9F7
                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F6AA1F
                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F6AA46
                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00F6AA64
                                        • DrawFocusRect.USER32(?,?), ref: 00F6AA6F
                                        • GetSysColor.USER32(00000011), ref: 00F6AA7D
                                        • SetTextColor.GDI32(?,00000000), ref: 00F6AA85
                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00F6AA99
                                        • SelectObject.GDI32(?,00F6A62C), ref: 00F6AAB0
                                        • DeleteObject.GDI32(?), ref: 00F6AABB
                                        • SelectObject.GDI32(?,?), ref: 00F6AAC1
                                        • DeleteObject.GDI32(?), ref: 00F6AAC6
                                        • SetTextColor.GDI32(?,?), ref: 00F6AACC
                                        • SetBkColor.GDI32(?,?), ref: 00F6AAD6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 1996641542-0
                                        • Opcode ID: 6702f974d950970cc781437b550ae8c587b0f90ee97eff516fb3a2f45d75c560
                                        • Instruction ID: 04e54fddc105e00139a2f1cb610faac9ef03bc8b4d5102829d5b921847a53773
                                        • Opcode Fuzzy Hash: 6702f974d950970cc781437b550ae8c587b0f90ee97eff516fb3a2f45d75c560
                                        • Instruction Fuzzy Hash: D8514F71900208FFDB109FA4ED48EAE7B79EF08320F214625F921AB2A1D7B59D44EF50
                                        APIs
                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F68AF3
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F68B04
                                        • CharNextW.USER32(0000014E), ref: 00F68B33
                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F68B74
                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F68B8A
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F68B9B
                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00F68BB8
                                        • SetWindowTextW.USER32(?,0000014E), ref: 00F68C0A
                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00F68C20
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F68C51
                                        • _memset.LIBCMT ref: 00F68C76
                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00F68CBF
                                        • _memset.LIBCMT ref: 00F68D1E
                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F68D48
                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F68DA0
                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00F68E4D
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F68E6F
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F68EB9
                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F68EE6
                                        • DrawMenuBar.USER32(?), ref: 00F68EF5
                                        • SetWindowTextW.USER32(?,0000014E), ref: 00F68F1D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                        • String ID: 0
                                        • API String ID: 1073566785-4108050209
                                        • Opcode ID: eebb83246c18cf80ea868159fc116e2dac4adc659277ce56c9c9ffdb4ed2ab9f
                                        • Instruction ID: 247c5095df2125de486446079964e4dd3e5b79ad3af6e84b880390567cc4381c
                                        • Opcode Fuzzy Hash: eebb83246c18cf80ea868159fc116e2dac4adc659277ce56c9c9ffdb4ed2ab9f
                                        • Instruction Fuzzy Hash: CBE18571901218ABDF209F54CC84EEE7B79FF057A0F10425AF915AA191DB748986FF60
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 00F64A33
                                        • GetDesktopWindow.USER32 ref: 00F64A48
                                        • GetWindowRect.USER32(00000000), ref: 00F64A4F
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F64AB1
                                        • DestroyWindow.USER32(?), ref: 00F64ADD
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F64B06
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F64B24
                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00F64B4A
                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00F64B5F
                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00F64B72
                                        • IsWindowVisible.USER32(?), ref: 00F64B92
                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00F64BAD
                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00F64BC1
                                        • GetWindowRect.USER32(?,?), ref: 00F64BD9
                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00F64BFF
                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00F64C19
                                        • CopyRect.USER32(?,?), ref: 00F64C30
                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00F64C9B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                        • String ID: ($0$tooltips_class32
                                        • API String ID: 698492251-4156429822
                                        • Opcode ID: 2d41951c42482913119c56e552aad5951f3f3deedb82290f05d66a45ca862b3e
                                        • Instruction ID: c5e871c6ec5098bdbe7cd662792f23e83f16c9864bcccc281726d9b082b3356a
                                        • Opcode Fuzzy Hash: 2d41951c42482913119c56e552aad5951f3f3deedb82290f05d66a45ca862b3e
                                        • Instruction Fuzzy Hash: 0EB17D71604341AFDB04EF65C885B6ABBE4FF88310F00891CF599AB2A1D775EC05DB95
                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00F444ED
                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00F44513
                                        • _wcscpy.LIBCMT ref: 00F44541
                                        • _wcscmp.LIBCMT ref: 00F4454C
                                        • _wcscat.LIBCMT ref: 00F44562
                                        • _wcsstr.LIBCMT ref: 00F4456D
                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00F44589
                                        • _wcscat.LIBCMT ref: 00F445D2
                                        • _wcscat.LIBCMT ref: 00F445D9
                                        • _wcsncpy.LIBCMT ref: 00F44604
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                        • API String ID: 699586101-1459072770
                                        • Opcode ID: faba660011a84ec415d48d660dbaae0f9ab6e9a850918cabbd2b355cc22ddef9
                                        • Instruction ID: 39b0c26c734094015753a5ed6ba4779f26cea586588486ccab71965bc90adf4a
                                        • Opcode Fuzzy Hash: faba660011a84ec415d48d660dbaae0f9ab6e9a850918cabbd2b355cc22ddef9
                                        • Instruction Fuzzy Hash: EC41F872A002057AEB10AB609C47FBF7B7CDF42751F140066F904F61C2EB78E901B6A9
                                        APIs
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE28BC
                                        • GetSystemMetrics.USER32(00000007), ref: 00EE28C4
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE28EF
                                        • GetSystemMetrics.USER32(00000008), ref: 00EE28F7
                                        • GetSystemMetrics.USER32(00000004), ref: 00EE291C
                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00EE2939
                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00EE2949
                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00EE297C
                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00EE2990
                                        • GetClientRect.USER32(00000000,000000FF), ref: 00EE29AE
                                        • GetStockObject.GDI32(00000011), ref: 00EE29CA
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE29D5
                                          • Part of subcall function 00EE2344: GetCursorPos.USER32(?), ref: 00EE2357
                                          • Part of subcall function 00EE2344: ScreenToClient.USER32(00FA57B0,?), ref: 00EE2374
                                          • Part of subcall function 00EE2344: GetAsyncKeyState.USER32(00000001), ref: 00EE2399
                                          • Part of subcall function 00EE2344: GetAsyncKeyState.USER32(00000002), ref: 00EE23A7
                                        • SetTimer.USER32(00000000,00000000,00000028,00EE1256), ref: 00EE29FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                        • String ID: AutoIt v3 GUI
                                        • API String ID: 1458621304-248962490
                                        • Opcode ID: 0a0266d1e73a332c9d0056e2a601fc0e89ed74c61b05e9bb46bef183940097ac
                                        • Instruction ID: e521d5d791a3fae7307abb07abdc659d503b82776ea9237990c9d2eb55452941
                                        • Opcode Fuzzy Hash: 0a0266d1e73a332c9d0056e2a601fc0e89ed74c61b05e9bb46bef183940097ac
                                        • Instruction Fuzzy Hash: FBB14C71A4024EEFDB14DFA9DC45BED7BB8FB08714F105229FA16A72A0DB749840EB50
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00F3A885
                                        • __swprintf.LIBCMT ref: 00F3A926
                                        • _wcscmp.LIBCMT ref: 00F3A939
                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F3A98E
                                        • _wcscmp.LIBCMT ref: 00F3A9CA
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00F3AA01
                                        • GetDlgCtrlID.USER32(?), ref: 00F3AA53
                                        • GetWindowRect.USER32(?,?), ref: 00F3AA89
                                        • GetParent.USER32(?), ref: 00F3AAA7
                                        • ScreenToClient.USER32(00000000), ref: 00F3AAAE
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00F3AB28
                                        • _wcscmp.LIBCMT ref: 00F3AB3C
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00F3AB62
                                        • _wcscmp.LIBCMT ref: 00F3AB76
                                          • Part of subcall function 00F037AC: _iswctype.LIBCMT ref: 00F037B4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                        • String ID: %s%u
                                        • API String ID: 3744389584-679674701
                                        • Opcode ID: 6db6929df0418422c193414c232c2c6add5eea62189a28b11e582fd2c6945713
                                        • Instruction ID: 2c3f18630a1a957e927047d78a6129cbf71422006f6569dafc332b4db95ff4c7
                                        • Opcode Fuzzy Hash: 6db6929df0418422c193414c232c2c6add5eea62189a28b11e582fd2c6945713
                                        • Instruction Fuzzy Hash: 7BA1C072604606AFDB14DF25C884FAAF7E9FF44324F004629F9E9D2190D734E945EBA2
                                        APIs
                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00F3B1DA
                                        • _wcscmp.LIBCMT ref: 00F3B1EB
                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00F3B213
                                        • CharUpperBuffW.USER32(?,00000000), ref: 00F3B230
                                        • _wcscmp.LIBCMT ref: 00F3B24E
                                        • _wcsstr.LIBCMT ref: 00F3B25F
                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F3B297
                                        • _wcscmp.LIBCMT ref: 00F3B2A7
                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00F3B2CE
                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F3B317
                                        • _wcscmp.LIBCMT ref: 00F3B327
                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00F3B34F
                                        • GetWindowRect.USER32(00000004,?), ref: 00F3B3B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                        • String ID: @$ThumbnailClass
                                        • API String ID: 1788623398-1539354611
                                        • Opcode ID: d3c73e944943c66f24026aea62f661c6bfdb35361305bcce4fdf5059164d9f00
                                        • Instruction ID: 097c23e509ab41e78d89561e4f0f09d3693855e1be1e06eebd04dcb77ed363bb
                                        • Opcode Fuzzy Hash: d3c73e944943c66f24026aea62f661c6bfdb35361305bcce4fdf5059164d9f00
                                        • Instruction Fuzzy Hash: B481A2714083099FDB01DF14C895FAA77D8EF44334F04856AFE899A0A2DB74DD49EBA1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                        • API String ID: 1038674560-1810252412
                                        • Opcode ID: 62fdb3b621aad7130844bb5beb46b699723a950c5ba47f0149e724d25feee969
                                        • Instruction ID: 1a7cbda3f531f2b0fe22304fee8ac21b4e6799aebe01c1e941384f3c96b1a32a
                                        • Opcode Fuzzy Hash: 62fdb3b621aad7130844bb5beb46b699723a950c5ba47f0149e724d25feee969
                                        • Instruction Fuzzy Hash: 68318F71A48309A6EF28FA61CD63EAF77A89F10730F200429F555710E2EF65AF04F656
                                        APIs
                                        • LoadIconW.USER32(00000063), ref: 00F3C2D3
                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F3C2E5
                                        • SetWindowTextW.USER32(?,?), ref: 00F3C2FC
                                        • GetDlgItem.USER32(?,000003EA), ref: 00F3C311
                                        • SetWindowTextW.USER32(00000000,?), ref: 00F3C317
                                        • GetDlgItem.USER32(?,000003E9), ref: 00F3C327
                                        • SetWindowTextW.USER32(00000000,?), ref: 00F3C32D
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F3C34E
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F3C368
                                        • GetWindowRect.USER32(?,?), ref: 00F3C371
                                        • SetWindowTextW.USER32(?,?), ref: 00F3C3DC
                                        • GetDesktopWindow.USER32 ref: 00F3C3E2
                                        • GetWindowRect.USER32(00000000), ref: 00F3C3E9
                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00F3C435
                                        • GetClientRect.USER32(?,?), ref: 00F3C442
                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00F3C467
                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F3C492
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                        • String ID:
                                        • API String ID: 3869813825-0
                                        • Opcode ID: d2e4c6297fd479ec2d0d86f2e65e0ebf8da1464abe00480cf75312b1ad3dc8a2
                                        • Instruction ID: 945c50b22be217719e4e9150e1b0e4368bf901c6b52c069e0dbb9a2dc97e637a
                                        • Opcode Fuzzy Hash: d2e4c6297fd479ec2d0d86f2e65e0ebf8da1464abe00480cf75312b1ad3dc8a2
                                        • Instruction Fuzzy Hash: 83517D31900709EFDB20DFA8DD89B6EBBF5FF04714F004528E692A25A1C7B5E904EB50
                                        APIs
                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00F55129
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00F55134
                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00F5513F
                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00F5514A
                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00F55155
                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00F55160
                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00F5516B
                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00F55176
                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00F55181
                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00F5518C
                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00F55197
                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00F551A2
                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00F551AD
                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00F551B8
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00F551C3
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00F551CE
                                        • GetCursorInfo.USER32(?), ref: 00F551DE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Cursor$Load$Info
                                        • String ID:
                                        • API String ID: 2577412497-0
                                        • Opcode ID: 6133e08b480cc8464fd6eae8893e120167dd8c5419a54e661b2c231f97121e84
                                        • Instruction ID: 17ad6f94b0f22d82559f2a92c9a9f713b963cca8c8d2a863d75129f283a4c744
                                        • Opcode Fuzzy Hash: 6133e08b480cc8464fd6eae8893e120167dd8c5419a54e661b2c231f97121e84
                                        • Instruction Fuzzy Hash: A03113B0D4831D6ADF109FB69C8996FBEE8FF04760F50453AE50DE7280DA78A5048FA1
                                        APIs
                                        • _memset.LIBCMT ref: 00F6A28B
                                        • DestroyWindow.USER32(?,?), ref: 00F6A305
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F6A37F
                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F6A3A1
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F6A3B4
                                        • DestroyWindow.USER32(00000000), ref: 00F6A3D6
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00EE0000,00000000), ref: 00F6A40D
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F6A426
                                        • GetDesktopWindow.USER32 ref: 00F6A43F
                                        • GetWindowRect.USER32(00000000), ref: 00F6A446
                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F6A45E
                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F6A476
                                          • Part of subcall function 00EE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00EE25EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                        • String ID: 0$tooltips_class32
                                        • API String ID: 1297703922-3619404913
                                        • Opcode ID: 81b699151e4f5f2baf6df43fe0d27bb1caa31300ae5bfd76b95c578a59710900
                                        • Instruction ID: af15809155f12e3024e5515b22d09cd09195a15df787735ad24279852ca6280a
                                        • Opcode Fuzzy Hash: 81b699151e4f5f2baf6df43fe0d27bb1caa31300ae5bfd76b95c578a59710900
                                        • Instruction Fuzzy Hash: 1C71BB71550248AFD720CF28DC49F6A77E5FB89B10F04051CF996A72A0DBB5E905EF22
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • DragQueryPoint.SHELL32(?,?), ref: 00F6C691
                                          • Part of subcall function 00F6AB69: ClientToScreen.USER32(?,?), ref: 00F6AB92
                                          • Part of subcall function 00F6AB69: GetWindowRect.USER32(?,?), ref: 00F6AC08
                                          • Part of subcall function 00F6AB69: PtInRect.USER32(?,?,00F6C07E), ref: 00F6AC18
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F6C6FA
                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F6C705
                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F6C728
                                        • _wcscat.LIBCMT ref: 00F6C758
                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F6C76F
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F6C788
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F6C79F
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F6C7C1
                                        • DragFinish.SHELL32(?), ref: 00F6C7C8
                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F6C8BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                        • API String ID: 169749273-3440237614
                                        • Opcode ID: 82a3db75c9eb52be6d42e795393f27cdae0428418ebdc323886528d9c4b05dfc
                                        • Instruction ID: 2441c0d83c2e78b080851edd4b999d3e12a6eae1a20222919d33cc9b2ea3dba0
                                        • Opcode Fuzzy Hash: 82a3db75c9eb52be6d42e795393f27cdae0428418ebdc323886528d9c4b05dfc
                                        • Instruction Fuzzy Hash: 2D617A71108345AFC700EF61DC85DAFBBE8FF89710F00092EF5A5922A1DB709A49DB92
                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 00F6448D
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F644D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharMessageSendUpper
                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                        • API String ID: 3974292440-4258414348
                                        • Opcode ID: 20dc4aaf4873e4fb2a24f64702c8db01ffb58c02ccf5c92d642a56f0e045a035
                                        • Instruction ID: 24268dddbb2d866abf9cd74074de89a0b70d90d0861b403158767e50b621929d
                                        • Opcode Fuzzy Hash: 20dc4aaf4873e4fb2a24f64702c8db01ffb58c02ccf5c92d642a56f0e045a035
                                        • Instruction Fuzzy Hash: 8C917E302047459FDB14EF11C891A6AB7E1AF85324F14846CF8966B7A3CF75ED0AEB81
                                        APIs
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F6B8E8
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00F691F4), ref: 00F6B944
                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F6B97D
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F6B9C0
                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F6B9F7
                                        • FreeLibrary.KERNEL32(?), ref: 00F6BA03
                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F6BA13
                                        • DestroyIcon.USER32(?,?,?,?,?,00F691F4), ref: 00F6BA22
                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F6BA3F
                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F6BA4B
                                          • Part of subcall function 00F0307D: __wcsicmp_l.LIBCMT ref: 00F03106
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                        • String ID: .dll$.exe$.icl
                                        • API String ID: 1212759294-1154884017
                                        • Opcode ID: 37c1cb47db3d7458b25fc6e2a9ebc9dc7883454b272ae9cc52b605b9152e4779
                                        • Instruction ID: 64330f85831e4339e1aa354a8d2550457a479868d54f9fcbdd1a79734afcc55a
                                        • Opcode Fuzzy Hash: 37c1cb47db3d7458b25fc6e2a9ebc9dc7883454b272ae9cc52b605b9152e4779
                                        • Instruction Fuzzy Hash: F061DE71900619BAEB24DF64DC46BBE77ACFF08720F104119FD15D61D1DBB8AA84EBA0
                                        APIs
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • CharLowerBuffW.USER32(?,?), ref: 00F4A455
                                        • GetDriveTypeW.KERNEL32 ref: 00F4A4A2
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F4A4EA
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F4A521
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F4A54F
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                        • API String ID: 2698844021-4113822522
                                        • Opcode ID: 0e201f38ade5bbaa5ababf3e83379a30bc1ac19119763c8f489187343d284090
                                        • Instruction ID: 23f8697af7a9f8620c5ece7c0c353b3bd89292ae121fb30bcc81bcca877caaf3
                                        • Opcode Fuzzy Hash: 0e201f38ade5bbaa5ababf3e83379a30bc1ac19119763c8f489187343d284090
                                        • Instruction Fuzzy Hash: CC51B1711043489FD700EF21C99196AB7F4FF88718F04496DF89AA7262DB31EE0ADB42
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F1E382,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00F3FC10
                                        • LoadStringW.USER32(00000000,?,00F1E382,00000001), ref: 00F3FC19
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • GetModuleHandleW.KERNEL32(00000000,00FA5310,?,00000FFF,?,?,00F1E382,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00F3FC3B
                                        • LoadStringW.USER32(00000000,?,00F1E382,00000001), ref: 00F3FC3E
                                        • __swprintf.LIBCMT ref: 00F3FC8E
                                        • __swprintf.LIBCMT ref: 00F3FC9F
                                        • _wprintf.LIBCMT ref: 00F3FD48
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F3FD5F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                        • API String ID: 984253442-2268648507
                                        • Opcode ID: 0f081633f9b97e5e49abc548ad7e97353a2e2a2925bfa6a56608df400218b7bc
                                        • Instruction ID: 349e183d58ccd51c026f66f6894751caab6b9328a242329de0a11ac1e46f5e17
                                        • Opcode Fuzzy Hash: 0f081633f9b97e5e49abc548ad7e97353a2e2a2925bfa6a56608df400218b7bc
                                        • Instruction Fuzzy Hash: D0416172C0424DAACF14FBE1DD86DEEB7B8AF19300F501065F505720A2EA756F49DBA1
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00F69239,?,?), ref: 00F6BA8A
                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAA1
                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAAC
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAB9
                                        • GlobalLock.KERNEL32(00000000), ref: 00F6BAC2
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAD1
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F6BADA
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAE1
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00F69239,?,?,00000000,?), ref: 00F6BAF2
                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F72CAC,?), ref: 00F6BB0B
                                        • GlobalFree.KERNEL32(00000000), ref: 00F6BB1B
                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00F6BB3F
                                        • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00F6BB6A
                                        • DeleteObject.GDI32(00000000), ref: 00F6BB92
                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F6BBA8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                        • String ID:
                                        • API String ID: 3840717409-0
                                        • Opcode ID: fcf24d6d2b6b0a5ee99e860a3bb799da03f554eddff15b55031e3040335b9b27
                                        • Instruction ID: 26b9a9122fa3e5dbce1ed17bc95c8f3e5589ce328ddff275a554b06d67c2b7ef
                                        • Opcode Fuzzy Hash: fcf24d6d2b6b0a5ee99e860a3bb799da03f554eddff15b55031e3040335b9b27
                                        • Instruction Fuzzy Hash: DE413A75600209FFDB119FA5EC88EAA7BB8FF89721F104068F916D7260D7709D45EB60
                                        APIs
                                        • __wsplitpath.LIBCMT ref: 00F4DA9C
                                        • _wcscat.LIBCMT ref: 00F4DAB4
                                        • _wcscat.LIBCMT ref: 00F4DAC6
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F4DADB
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4DAEF
                                        • GetFileAttributesW.KERNEL32(?), ref: 00F4DB07
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F4DB21
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4DB33
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                        • String ID: *.*
                                        • API String ID: 34673085-438819550
                                        • Opcode ID: f1995953c82027c186adacd6fbed9b59c089586938c18c62277b431d3dbb6349
                                        • Instruction ID: d15e72f6fd68f6461849fc051ae34b604fc7ddd900923e41073b9ffce66a2797
                                        • Opcode Fuzzy Hash: f1995953c82027c186adacd6fbed9b59c089586938c18c62277b431d3dbb6349
                                        • Instruction Fuzzy Hash: E58195729182459FCB24DF64C844A6ABBE8FF89314F18482EFC89D7252D738DD44EB52
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F6C266
                                        • GetFocus.USER32 ref: 00F6C276
                                        • GetDlgCtrlID.USER32(00000000), ref: 00F6C281
                                        • _memset.LIBCMT ref: 00F6C3AC
                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00F6C3D7
                                        • GetMenuItemCount.USER32(?), ref: 00F6C3F7
                                        • GetMenuItemID.USER32(?,00000000), ref: 00F6C40A
                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00F6C43E
                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00F6C486
                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F6C4BE
                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00F6C4F3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                        • String ID: 0
                                        • API String ID: 1296962147-4108050209
                                        • Opcode ID: cf34f375c7bc5445bdaa817b93336d6939b0b49bedc6bf299205617aa483c4ca
                                        • Instruction ID: d54afb2a10b760ce539b6f8966fb45bbecc4664b6114d1a93bffbb29e9e87c20
                                        • Opcode Fuzzy Hash: cf34f375c7bc5445bdaa817b93336d6939b0b49bedc6bf299205617aa483c4ca
                                        • Instruction Fuzzy Hash: 59817A71608305AFD710DF14D895A7ABBE8FF88724F00492EF9D597291CB71D805EBA2
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00F574A4
                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00F574B0
                                        • CreateCompatibleDC.GDI32(?), ref: 00F574BC
                                        • SelectObject.GDI32(00000000,?), ref: 00F574C9
                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00F5751D
                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00F57559
                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00F5757D
                                        • SelectObject.GDI32(00000006,?), ref: 00F57585
                                        • DeleteObject.GDI32(?), ref: 00F5758E
                                        • DeleteDC.GDI32(00000006), ref: 00F57595
                                        • ReleaseDC.USER32(00000000,?), ref: 00F575A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                        • String ID: (
                                        • API String ID: 2598888154-3887548279
                                        • Opcode ID: fd724b4ae0d33a317730f686e63b6468397fd46e3d4ee8d10bcc021256bce344
                                        • Instruction ID: a5312060de8cead77118a6750dfaa847313793d69751d5486422536e7ea66f95
                                        • Opcode Fuzzy Hash: fd724b4ae0d33a317730f686e63b6468397fd46e3d4ee8d10bcc021256bce344
                                        • Instruction Fuzzy Hash: 10515971904309EFCB14CFA8DC84EAEBBB9EF48310F14842DFA9A97211D771A844DB60
                                        APIs
                                          • Part of subcall function 00F00AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00EE6C6C,?,00008000), ref: 00F00AF3
                                          • Part of subcall function 00EE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EE48A1,?,?,00EE37C0,?), ref: 00EE48CE
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00EE6D0D
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00EE6E5A
                                          • Part of subcall function 00EE59CD: _wcscpy.LIBCMT ref: 00EE5A05
                                          • Part of subcall function 00F037BD: _iswctype.LIBCMT ref: 00F037C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                        • API String ID: 537147316-1018226102
                                        • Opcode ID: 4b57f50ea1521558394be27a90605e8889b3e3d7de835a66bbf590502d30a690
                                        • Instruction ID: 618605bf834ca87abd7377cb6208725d9494ec53fc3320098034663915621edf
                                        • Opcode Fuzzy Hash: 4b57f50ea1521558394be27a90605e8889b3e3d7de835a66bbf590502d30a690
                                        • Instruction Fuzzy Hash: 5E02BF315083859FC724EF21C881AAFBBE5EF99354F04091DF8C9A32A1DB34D949EB42
                                        APIs
                                        • _memset.LIBCMT ref: 00EE45F9
                                        • GetMenuItemCount.USER32(00FA5890), ref: 00F1D6FD
                                        • GetMenuItemCount.USER32(00FA5890), ref: 00F1D7AD
                                        • GetCursorPos.USER32(?), ref: 00F1D7F1
                                        • SetForegroundWindow.USER32(00000000), ref: 00F1D7FA
                                        • TrackPopupMenuEx.USER32(00FA5890,00000000,?,00000000,00000000,00000000), ref: 00F1D80D
                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F1D819
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                        • String ID:
                                        • API String ID: 2751501086-0
                                        • Opcode ID: 2b7e2a61aea7f365b9c321829546379d6c815f064edca4a7494973bb31f4c934
                                        • Instruction ID: 34050f37e4b23b27aafe1463126e757e10dfad33e83017a59324331c75a0994c
                                        • Opcode Fuzzy Hash: 2b7e2a61aea7f365b9c321829546379d6c815f064edca4a7494973bb31f4c934
                                        • Instruction Fuzzy Hash: A271F670A0024ABEEB209F15DC45FEABF74FF05368F140216F529A61E1C7B56C50EB95
                                        APIs
                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5FE38,?,?), ref: 00F60EBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharUpper
                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                        • API String ID: 3964851224-909552448
                                        • Opcode ID: d747d3d1a116cc4f7fbe0acb0f07bf7b77befcbc5094450177e770e58afffecf
                                        • Instruction ID: 494feca0314f1d42a4569cfefc9c689d396315623296c353d1a83e66db65ea12
                                        • Opcode Fuzzy Hash: d747d3d1a116cc4f7fbe0acb0f07bf7b77befcbc5094450177e770e58afffecf
                                        • Instruction Fuzzy Hash: 94419C3150428A9BEF21EF18DC91AEE3360FF55310F188419FC511B296DF759A5AFBA0
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F1E5F9,00000010,?,Bad directive syntax error,00F6F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F3FAF3
                                        • LoadStringW.USER32(00000000,?,00F1E5F9,00000010), ref: 00F3FAFA
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • _wprintf.LIBCMT ref: 00F3FB2D
                                        • __swprintf.LIBCMT ref: 00F3FB4F
                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F3FBBE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                        • API String ID: 1506413516-4153970271
                                        • Opcode ID: 74e881380f3ea8c7f1eb66a3c159b21bbe838191954b25f270e2d4707568389b
                                        • Instruction ID: d4bcd3834f28bb006d7dff4f04cb4f639ea3463845a162614b917bc835c56309
                                        • Opcode Fuzzy Hash: 74e881380f3ea8c7f1eb66a3c159b21bbe838191954b25f270e2d4707568389b
                                        • Instruction Fuzzy Hash: CA218D72D0025EEBCF22EF90CC56EEE7779BF18300F0444AAF515620A2DA719A58EB51
                                        APIs
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                          • Part of subcall function 00EE7A84: _memmove.LIBCMT ref: 00EE7B0D
                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F453D7
                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F453ED
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F453FE
                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F45410
                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F45421
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: SendString$_memmove
                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                        • API String ID: 2279737902-1007645807
                                        • Opcode ID: 9c7641fa6cd2bfe218671cba9bd7c7a8c53bb9068a67fb56e592d1b9e143de8c
                                        • Instruction ID: f73c74eafe7fb20501f4d3ee28c48042eb1701c186257882897d46b1894b34d5
                                        • Opcode Fuzzy Hash: 9c7641fa6cd2bfe218671cba9bd7c7a8c53bb9068a67fb56e592d1b9e143de8c
                                        • Instruction Fuzzy Hash: D711C82195016D7AEB20F7A2CC59DFF7FBCEB92F80F000429B815A60D1DEA04D46D5A2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                        • String ID: 0.0.0.0
                                        • API String ID: 208665112-3771769585
                                        • Opcode ID: 994d31cd4886c1c64a08062fd0b6927ede4a192527d9594b630cab48a2874464
                                        • Instruction ID: 9900a2f08d06091c90ca70da4a37ddda9c92a24f4dfe7fe08090f9775f32f065
                                        • Opcode Fuzzy Hash: 994d31cd4886c1c64a08062fd0b6927ede4a192527d9594b630cab48a2874464
                                        • Instruction Fuzzy Hash: 8411EB31904119AFDB10A730EC4AFDA7BBCDF42725F0401B6F815A6091EFB4AA86B661
                                        APIs
                                        • timeGetTime.WINMM ref: 00F45021
                                          • Part of subcall function 00F0034A: timeGetTime.WINMM(?,75A8B400,00EF0FDB), ref: 00F0034E
                                        • Sleep.KERNEL32(0000000A), ref: 00F4504D
                                        • EnumThreadWindows.USER32(?,Function_00064FCF,00000000), ref: 00F45071
                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F45093
                                        • SetActiveWindow.USER32 ref: 00F450B2
                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F450C0
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F450DF
                                        • Sleep.KERNEL32(000000FA), ref: 00F450EA
                                        • IsWindow.USER32 ref: 00F450F6
                                        • EndDialog.USER32(00000000), ref: 00F45107
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                        • String ID: BUTTON
                                        • API String ID: 1194449130-3405671355
                                        • Opcode ID: 2e6b3be544b121216dd481d0b405f26c3a806e92e30f191ea6e1a996e8f7b257
                                        • Instruction ID: b62d8f1b116af3b9feb03e340558f7e311342c354cab84394ee4d2b8c038d498
                                        • Opcode Fuzzy Hash: 2e6b3be544b121216dd481d0b405f26c3a806e92e30f191ea6e1a996e8f7b257
                                        • Instruction Fuzzy Hash: BB2184B560460DBFE7017F20FC89F253F69EB46B95F0D1024F911C12B6DBA18D58BA62
                                        APIs
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • CoInitialize.OLE32(00000000), ref: 00F4D676
                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F4D709
                                        • SHGetDesktopFolder.SHELL32(?), ref: 00F4D71D
                                        • CoCreateInstance.OLE32(00F72D7C,00000000,00000001,00F98C1C,?), ref: 00F4D769
                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F4D7D8
                                        • CoTaskMemFree.OLE32(?,?), ref: 00F4D830
                                        • _memset.LIBCMT ref: 00F4D86D
                                        • SHBrowseForFolderW.SHELL32(?), ref: 00F4D8A9
                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F4D8CC
                                        • CoTaskMemFree.OLE32(00000000), ref: 00F4D8D3
                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00F4D90A
                                        • CoUninitialize.OLE32(00000001,00000000), ref: 00F4D90C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                        • String ID:
                                        • API String ID: 1246142700-0
                                        • Opcode ID: 06939ae97f10fbe4f8a9267b55d963978ca320b34f708c551450063a8755b442
                                        • Instruction ID: 41e8422d3cddf37d129de013ab2bc6ef38c4a90d31c3465200f87d5a63ff2975
                                        • Opcode Fuzzy Hash: 06939ae97f10fbe4f8a9267b55d963978ca320b34f708c551450063a8755b442
                                        • Instruction Fuzzy Hash: 29B1FB75A00109AFDB04DFA5C888DAEBBF9FF88314B1480A9F919EB251DB30ED45DB50
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00F403C8
                                        • SetKeyboardState.USER32(?), ref: 00F40433
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00F40453
                                        • GetKeyState.USER32(000000A0), ref: 00F4046A
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00F40499
                                        • GetKeyState.USER32(000000A1), ref: 00F404AA
                                        • GetAsyncKeyState.USER32(00000011), ref: 00F404D6
                                        • GetKeyState.USER32(00000011), ref: 00F404E4
                                        • GetAsyncKeyState.USER32(00000012), ref: 00F4050D
                                        • GetKeyState.USER32(00000012), ref: 00F4051B
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00F40544
                                        • GetKeyState.USER32(0000005B), ref: 00F40552
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: 3b9acaa7edaed5bb37e70b0e6f59675607849c99f1564ef848c53f5d6d72b197
                                        • Instruction ID: 12f27d7fc82c28e7dc0aba20fb5da5a62add651de6b0f5b2fb0f9192c5d19944
                                        • Opcode Fuzzy Hash: 3b9acaa7edaed5bb37e70b0e6f59675607849c99f1564ef848c53f5d6d72b197
                                        • Instruction Fuzzy Hash: BA518730D0878829FB35DBB088157AABFB49F11390F4885999EC2571D3DE749A8CEB61
                                        APIs
                                        • GetDlgItem.USER32(?,00000001), ref: 00F3C545
                                        • GetWindowRect.USER32(00000000,?), ref: 00F3C557
                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00F3C5B5
                                        • GetDlgItem.USER32(?,00000002), ref: 00F3C5C0
                                        • GetWindowRect.USER32(00000000,?), ref: 00F3C5D2
                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00F3C626
                                        • GetDlgItem.USER32(?,000003E9), ref: 00F3C634
                                        • GetWindowRect.USER32(00000000,?), ref: 00F3C645
                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00F3C688
                                        • GetDlgItem.USER32(?,000003EA), ref: 00F3C696
                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F3C6B3
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F3C6C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$ItemMoveRect$Invalidate
                                        • String ID:
                                        • API String ID: 3096461208-0
                                        • Opcode ID: eed9436b27e811cf4ea5a20dffa3e3ac87415dfee632ce2562bfa5565cbf62cc
                                        • Instruction ID: c32347226e71f85d0d7e94e25fa7c93f18d96e49d5d9fbc32ad6cdb942927a18
                                        • Opcode Fuzzy Hash: eed9436b27e811cf4ea5a20dffa3e3ac87415dfee632ce2562bfa5565cbf62cc
                                        • Instruction Fuzzy Hash: 9C514371F00209AFDB18CF69DD85AAEBBB5FB88320F14812DF515E72A0D7B19D049B50
                                        APIs
                                          • Part of subcall function 00EE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE2036,?,00000000,?,?,?,?,00EE16CB,00000000,?), ref: 00EE1B9A
                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00EE20D3
                                        • KillTimer.USER32(-00000001,?,?,?,?,00EE16CB,00000000,?,?,00EE1AE2,?,?), ref: 00EE216E
                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00F1BE26
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00EE16CB,00000000,?,?,00EE1AE2,?,?), ref: 00F1BE57
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00EE16CB,00000000,?,?,00EE1AE2,?,?), ref: 00F1BE6E
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00EE16CB,00000000,?,?,00EE1AE2,?,?), ref: 00F1BE8A
                                        • DeleteObject.GDI32(00000000), ref: 00F1BE9C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                        • String ID:
                                        • API String ID: 641708696-0
                                        • Opcode ID: 5088de8e5d20414d7aa50f0d3bd033bd137fb37ba3e94a52aa2c12524d281dca
                                        • Instruction ID: 7d28db60387f61c45e4b7696c4e148b0c07b71219d98c0574ce49a7a0de66fab
                                        • Opcode Fuzzy Hash: 5088de8e5d20414d7aa50f0d3bd033bd137fb37ba3e94a52aa2c12524d281dca
                                        • Instruction Fuzzy Hash: 6D61BE71500A58DFCB359F16D848BAAB7F5FF41726F10952CE252AA5B0C775A880EF80
                                        APIs
                                          • Part of subcall function 00EE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00EE25EC
                                        • GetSysColor.USER32(0000000F), ref: 00EE21D3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ColorLongWindow
                                        • String ID:
                                        • API String ID: 259745315-0
                                        • Opcode ID: 620ab84e2e2b2f93a49f6e780ebec50d449e971ed7255ab109e4d9e3269beb89
                                        • Instruction ID: 22f9fa8b8bf4e45bd603376c9bd181412e6abf4d7f054338ace46a39836e60f3
                                        • Opcode Fuzzy Hash: 620ab84e2e2b2f93a49f6e780ebec50d449e971ed7255ab109e4d9e3269beb89
                                        • Instruction Fuzzy Hash: A241B331400188DBDB255F29EC48BB93769EB0A731F184269FF659A1F5C7718C81EB61
                                        APIs
                                        • CharLowerBuffW.USER32(?,?,00F6F910), ref: 00F4A995
                                        • GetDriveTypeW.KERNEL32(00000061,00F989A0,00000061), ref: 00F4AA5F
                                        • _wcscpy.LIBCMT ref: 00F4AA89
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharDriveLowerType_wcscpy
                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                        • API String ID: 2820617543-1000479233
                                        • Opcode ID: bc5758a33f63f4dd08cecf14d75aae2a42c1e81b461fefcd324d205923d66da7
                                        • Instruction ID: 1506940844bc98069061df0aa2739724d25dff0b4a8900e3cb00e47c2c4d64a2
                                        • Opcode Fuzzy Hash: bc5758a33f63f4dd08cecf14d75aae2a42c1e81b461fefcd324d205923d66da7
                                        • Instruction Fuzzy Hash: 5351D9315483419BD710EF14C8D2AAEBBE5EF81750F40482DF896A72A2DB31DE09EA53
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __i64tow__itow__swprintf
                                        • String ID: %.15g$0x%p$False$True
                                        • API String ID: 421087845-2263619337
                                        • Opcode ID: aafd093072e14a3e2d4ea1978971a66b6d455df8066ed06aeb9d9b80b8a36178
                                        • Instruction ID: 931b43476efc992ea516f1737c227b393a3a81d604adcc0b4b32cb5ea933ed74
                                        • Opcode Fuzzy Hash: aafd093072e14a3e2d4ea1978971a66b6d455df8066ed06aeb9d9b80b8a36178
                                        • Instruction Fuzzy Hash: 4A41D771904209AFDB24AF35DC42EB677E8EF44320F24446EE549DA292EA729D42EB11
                                        APIs
                                        • _memset.LIBCMT ref: 00F6719C
                                        • CreateMenu.USER32 ref: 00F671B7
                                        • SetMenu.USER32(?,00000000), ref: 00F671C6
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F67253
                                        • IsMenu.USER32(?), ref: 00F67269
                                        • CreatePopupMenu.USER32 ref: 00F67273
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F672A0
                                        • DrawMenuBar.USER32 ref: 00F672A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                        • String ID: 0$F
                                        • API String ID: 176399719-3044882817
                                        • Opcode ID: 2e28b70d1f9c2b830053d562b2f463935ab292d259c20954c9a9d8d5f8e120c7
                                        • Instruction ID: e0607527f6121258ceeec08e117e10ef92120e6f6444bf06126e387a2804d0e2
                                        • Opcode Fuzzy Hash: 2e28b70d1f9c2b830053d562b2f463935ab292d259c20954c9a9d8d5f8e120c7
                                        • Instruction Fuzzy Hash: 374167B5A00209EFDB10EF64E894A9A7BF5FF4A714F140129F916A7360D770AD14EFA0
                                        APIs
                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F67590
                                        • CreateCompatibleDC.GDI32(00000000), ref: 00F67597
                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F675AA
                                        • SelectObject.GDI32(00000000,00000000), ref: 00F675B2
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F675BD
                                        • DeleteDC.GDI32(00000000), ref: 00F675C6
                                        • GetWindowLongW.USER32(?,000000EC), ref: 00F675D0
                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00F675E4
                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00F675F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                        • String ID: static
                                        • API String ID: 2559357485-2160076837
                                        • Opcode ID: d211274d799ec06196e93e83d674d2a2c465b3b68dea5e7e6da440c5e43750ba
                                        • Instruction ID: 017aa5e9539c55d2ddaf1788bb1e7f1d4c5e1cb9ef5d7e07ae5cbfc52c1223c0
                                        • Opcode Fuzzy Hash: d211274d799ec06196e93e83d674d2a2c465b3b68dea5e7e6da440c5e43750ba
                                        • Instruction Fuzzy Hash: 0E317C72504219BBDF12AF64EC08FDB3B69FF09764F150224FA26A61A0CB75DC14EB64
                                        APIs
                                        • _memset.LIBCMT ref: 00F06FBB
                                          • Part of subcall function 00F08CA8: __getptd_noexit.LIBCMT ref: 00F08CA8
                                        • __gmtime64_s.LIBCMT ref: 00F07054
                                        • __gmtime64_s.LIBCMT ref: 00F0708A
                                        • __gmtime64_s.LIBCMT ref: 00F070A7
                                        • __allrem.LIBCMT ref: 00F070FD
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F07119
                                        • __allrem.LIBCMT ref: 00F07130
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F0714E
                                        • __allrem.LIBCMT ref: 00F07165
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F07183
                                        • __invoke_watson.LIBCMT ref: 00F071F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                        • String ID:
                                        • API String ID: 384356119-0
                                        • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                        • Instruction ID: 15979fab991911a4fd50c08b6b6c771056394a5a908519e11537d81e62a3b1ec
                                        • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                        • Instruction Fuzzy Hash: 4A7106B2E00717ABE714AE39CC41B9AB3A9AF40364F14427AF410D72C1FB74EA50B790
                                        APIs
                                        • _memset.LIBCMT ref: 00F4283A
                                        • GetMenuItemInfoW.USER32(00FA5890,000000FF,00000000,00000030), ref: 00F4289B
                                        • SetMenuItemInfoW.USER32(00FA5890,00000004,00000000,00000030), ref: 00F428D1
                                        • Sleep.KERNEL32(000001F4), ref: 00F428E3
                                        • GetMenuItemCount.USER32(?), ref: 00F42927
                                        • GetMenuItemID.USER32(?,00000000), ref: 00F42943
                                        • GetMenuItemID.USER32(?,-00000001), ref: 00F4296D
                                        • GetMenuItemID.USER32(?,?), ref: 00F429B2
                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F429F8
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F42A0C
                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F42A2D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                        • String ID:
                                        • API String ID: 4176008265-0
                                        • Opcode ID: 11a3c0ce553ced296e68722d01276ffb788d6ec9af9f189c397880fb44461ca9
                                        • Instruction ID: 60e71aef52747eb6051c6d625f36fcea1acf9055a1d77538c2472c80b7dcc65e
                                        • Opcode Fuzzy Hash: 11a3c0ce553ced296e68722d01276ffb788d6ec9af9f189c397880fb44461ca9
                                        • Instruction Fuzzy Hash: 0961DCB1900249AFDB61CF64DC88AAEBFB8FB05314F940069FC42A7291D775AD45FB20
                                        APIs
                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F66FD7
                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F66FDA
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F66FFE
                                        • _memset.LIBCMT ref: 00F6700F
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F67021
                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F67099
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow_memset
                                        • String ID:
                                        • API String ID: 830647256-0
                                        • Opcode ID: afc1e49a4a7be06689deb1809ed05eb1906464c7075910ac9df7cd63657a8af4
                                        • Instruction ID: f8d5de4594809a4103d24a990b3d2fe452b5e28dfbe29fa401efee5e162b5dba
                                        • Opcode Fuzzy Hash: afc1e49a4a7be06689deb1809ed05eb1906464c7075910ac9df7cd63657a8af4
                                        • Instruction Fuzzy Hash: 10615B75A00248AFDB10DFA4CC81EEE77F8EB09714F10415AFA15EB2A2D774AD45EB60
                                        APIs
                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F36F15
                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00F36F6E
                                        • VariantInit.OLEAUT32(?), ref: 00F36F80
                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F36FA0
                                        • VariantCopy.OLEAUT32(?,?), ref: 00F36FF3
                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F37007
                                        • VariantClear.OLEAUT32(?), ref: 00F3701C
                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00F37029
                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F37032
                                        • VariantClear.OLEAUT32(?), ref: 00F37044
                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F3704F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                        • String ID:
                                        • API String ID: 2706829360-0
                                        • Opcode ID: 6537ac6b75066b3664f2a55213e0ffcefec88d1df46bba884282921a9e9adefb
                                        • Instruction ID: 784ef3f70045ca6bd26e6c98dc45bc5a3932466ffd5cc8c9dab28a57eaafc286
                                        • Opcode Fuzzy Hash: 6537ac6b75066b3664f2a55213e0ffcefec88d1df46bba884282921a9e9adefb
                                        • Instruction Fuzzy Hash: 5F41717590421DAFCB14EFA4EC449AEBBB9FF08324F008069E915E7261DB71A949DF90
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 00F558A9
                                        • inet_addr.WSOCK32(?,?,?), ref: 00F558EE
                                        • gethostbyname.WSOCK32(?), ref: 00F558FA
                                        • IcmpCreateFile.IPHLPAPI ref: 00F55908
                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F55978
                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F5598E
                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00F55A03
                                        • WSACleanup.WSOCK32 ref: 00F55A09
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                        • String ID: Ping
                                        • API String ID: 1028309954-2246546115
                                        • Opcode ID: 363c4df9217ac5fbdfc59028ef3e7f3ae0bc9878366e8a57cccdb9124836c42b
                                        • Instruction ID: 5e5215a66539ba7979275f5687128e9ddda93736963fda115b78252689d84a5e
                                        • Opcode Fuzzy Hash: 363c4df9217ac5fbdfc59028ef3e7f3ae0bc9878366e8a57cccdb9124836c42b
                                        • Instruction Fuzzy Hash: 8E518132604700DFD710AF25DC55B2AB7E4EF49B21F144529FA56EB2A1DB74E808EB41
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 00F4B55C
                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F4B5D2
                                        • GetLastError.KERNEL32 ref: 00F4B5DC
                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00F4B649
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Error$Mode$DiskFreeLastSpace
                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                        • API String ID: 4194297153-14809454
                                        • Opcode ID: bc53298b097b0f79c28073486641567c2cc8807d69f9e621a6f7177287b3bfad
                                        • Instruction ID: 822c74e547c2e3dc5511740724ee2bd0c9439582184550fe7bcdc340195e0414
                                        • Opcode Fuzzy Hash: bc53298b097b0f79c28073486641567c2cc8807d69f9e621a6f7177287b3bfad
                                        • Instruction Fuzzy Hash: D531B035A002099FDB00EFA9DC85EADBBB4FF45350F184066F905E7292DB71DA06EB91
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00F392D6
                                        • GetDlgCtrlID.USER32 ref: 00F392E1
                                        • GetParent.USER32 ref: 00F392FD
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F39300
                                        • GetDlgCtrlID.USER32(?), ref: 00F39309
                                        • GetParent.USER32(?), ref: 00F39325
                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F39328
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 1536045017-1403004172
                                        • Opcode ID: 9486fd789a7c053130b7a5d3ceb1d3135ffb222d7655d58d34c3f0f3308e4f4a
                                        • Instruction ID: f4d71b898e19bb3d432b1cad5a39a03cac6f0b96ea2a07d9f7021f7e8c59452e
                                        • Opcode Fuzzy Hash: 9486fd789a7c053130b7a5d3ceb1d3135ffb222d7655d58d34c3f0f3308e4f4a
                                        • Instruction Fuzzy Hash: 4D21C471E04208BBDF04AB61DC85EFEBBA8EF55320F100169F561972E1DBB59819EA20
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00F393BF
                                        • GetDlgCtrlID.USER32 ref: 00F393CA
                                        • GetParent.USER32 ref: 00F393E6
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F393E9
                                        • GetDlgCtrlID.USER32(?), ref: 00F393F2
                                        • GetParent.USER32(?), ref: 00F3940E
                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F39411
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 1536045017-1403004172
                                        • Opcode ID: 8458152bb7534d8e2a1a3558dfd9918f059cd3ce870ebf025a869829eebb9132
                                        • Instruction ID: 6bf3aaaf6f615e44f6a46a45e910642c3143bd41077b9060f72f814c72ef64b9
                                        • Opcode Fuzzy Hash: 8458152bb7534d8e2a1a3558dfd9918f059cd3ce870ebf025a869829eebb9132
                                        • Instruction Fuzzy Hash: 5121C875A042087BDF00EB65DC85EFEBBB8EF44310F104065F961971A1DBF55959EB20
                                        APIs
                                        • GetParent.USER32 ref: 00F39431
                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00F39446
                                        • _wcscmp.LIBCMT ref: 00F39458
                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F394D3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameParentSend_wcscmp
                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                        • API String ID: 1704125052-3381328864
                                        • Opcode ID: f4430d679dc7b7a314fb6002ef8f817aef56a9e0e94f3d51d43f774214d3b78f
                                        • Instruction ID: 970c1bfa6d98fb7621a2ffe99aff36cc95d53623433226b0c0fd86b6d52421cb
                                        • Opcode Fuzzy Hash: f4430d679dc7b7a314fb6002ef8f817aef56a9e0e94f3d51d43f774214d3b78f
                                        • Instruction Fuzzy Hash: B3110637A5C307BAFB206620EC06DA6339CCF05334F208026F914A40E1FAE6A852B995
                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 00F589EC
                                        • CoInitialize.OLE32(00000000), ref: 00F58A19
                                        • CoUninitialize.OLE32 ref: 00F58A23
                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00F58B23
                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F58C50
                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00F72C0C), ref: 00F58C84
                                        • CoGetObject.OLE32(?,00000000,00F72C0C,?), ref: 00F58CA7
                                        • SetErrorMode.KERNEL32(00000000), ref: 00F58CBA
                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F58D3A
                                        • VariantClear.OLEAUT32(?), ref: 00F58D4A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                        • String ID:
                                        • API String ID: 2395222682-0
                                        • Opcode ID: 63b8025cacfa73c297bfda9bcfe232e1efc3f8974a7969669029dff378132a41
                                        • Instruction ID: b4d00a8681d5eb75f77b7757f93f84f3fea84055710fd07e15461c6f57ae369f
                                        • Opcode Fuzzy Hash: 63b8025cacfa73c297bfda9bcfe232e1efc3f8974a7969669029dff378132a41
                                        • Instruction Fuzzy Hash: 16C139B1608305AFC700DF64C88492BB7E9FF89399F00495DF989AB251DB71ED0ADB52
                                        APIs
                                        • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00F47B15
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ArraySafeVartype
                                        • String ID:
                                        • API String ID: 1725837607-0
                                        • Opcode ID: ff52d0abf1ee85ab26b615dd9713c2ef471598888303124d69a5366fe6d300f3
                                        • Instruction ID: 03d2d628c7cab06a41f3241ff9802baa6ce25ec7650d6ac2d41b2d3df2533754
                                        • Opcode Fuzzy Hash: ff52d0abf1ee85ab26b615dd9713c2ef471598888303124d69a5366fe6d300f3
                                        • Instruction Fuzzy Hash: 75B19071D1431A9FDB10EF94D884BBEBBF4EF48321F214469EA10EB291D734A945EB90
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00F41521
                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F40599,?,00000001), ref: 00F41535
                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00F4153C
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F40599,?,00000001), ref: 00F4154B
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F4155D
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F40599,?,00000001), ref: 00F41576
                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F40599,?,00000001), ref: 00F41588
                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F40599,?,00000001), ref: 00F415CD
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F40599,?,00000001), ref: 00F415E2
                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F40599,?,00000001), ref: 00F415ED
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                        • String ID:
                                        • API String ID: 2156557900-0
                                        • Opcode ID: a146d227ed1166bd2e692823f124c08bab25e36b0dba74aaf404444a8dabd154
                                        • Instruction ID: 2be94f925497ef009b6917b2b126058f8f5129da50c5b82a202ceeddba989aef
                                        • Opcode Fuzzy Hash: a146d227ed1166bd2e692823f124c08bab25e36b0dba74aaf404444a8dabd154
                                        • Instruction Fuzzy Hash: A83193B1900308BFDB109F54ED44BAA7BA9FB95321F194015FD15C61A0F7B49D84BB61
                                        APIs
                                        • EnumChildWindows.USER32(?,00F3A844), ref: 00F3A782
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ChildEnumWindows
                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                        • API String ID: 3555792229-1603158881
                                        • Opcode ID: 14d7bbac58c8af452f6a881403c10851d01eeb6d0febc46b38aa62fe24b1c164
                                        • Instruction ID: c708e45ee919017f3fcd60d0bcc1cd20a12ea2a7bc1cbb668af2db9ff1f1d6db
                                        • Opcode Fuzzy Hash: 14d7bbac58c8af452f6a881403c10851d01eeb6d0febc46b38aa62fe24b1c164
                                        • Instruction Fuzzy Hash: 9C91C631A04649ABDB18EF71C8C2BE9FB74FF04324F148119E899A7191DF306959FBA1
                                        APIs
                                        • SetWindowLongW.USER32(?,000000EB), ref: 00EE2EAE
                                          • Part of subcall function 00EE1DB3: GetClientRect.USER32(?,?), ref: 00EE1DDC
                                          • Part of subcall function 00EE1DB3: GetWindowRect.USER32(?,?), ref: 00EE1E1D
                                          • Part of subcall function 00EE1DB3: ScreenToClient.USER32(?,?), ref: 00EE1E45
                                        • GetDC.USER32 ref: 00F1CEB2
                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F1CEC5
                                        • SelectObject.GDI32(00000000,00000000), ref: 00F1CED3
                                        • SelectObject.GDI32(00000000,00000000), ref: 00F1CEE8
                                        • ReleaseDC.USER32(?,00000000), ref: 00F1CEF0
                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F1CF7B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                        • String ID: U
                                        • API String ID: 4009187628-3372436214
                                        • Opcode ID: b116ed13e143f1906316661efbcbf9adfda9fe04592f4cdb3718347983c3f8c9
                                        • Instruction ID: 86171abeaf84c61e383a9c73e9b2360748ae434b8e6afb4c5882aaa8b11cdc25
                                        • Opcode Fuzzy Hash: b116ed13e143f1906316661efbcbf9adfda9fe04592f4cdb3718347983c3f8c9
                                        • Instruction Fuzzy Hash: 6271B431840249DFCF219F64CC84AEA7BB6FF49360F144269FD556A2A6C7319C81EFA0
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00F6F910), ref: 00F58E3D
                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00F6F910), ref: 00F58E71
                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F58FEB
                                        • SysFreeString.OLEAUT32(?), ref: 00F59015
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                        • String ID:
                                        • API String ID: 560350794-0
                                        • Opcode ID: 98927cb1414f1aa6acd53a40cde61a572a992c4ee7d26d39193b90b24d562793
                                        • Instruction ID: 1d979fa8ff6c5d1868e4078c99c3ec8965888ed81465de3ffeae8eeb70f7ff3f
                                        • Opcode Fuzzy Hash: 98927cb1414f1aa6acd53a40cde61a572a992c4ee7d26d39193b90b24d562793
                                        • Instruction Fuzzy Hash: 3EF16E71A00119EFCF04DF94C888EAEB7B9FF49355F108058FA15AB251CB71AE4ADB50
                                        APIs
                                        • _memset.LIBCMT ref: 00F5F7C9
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5F95C
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5F980
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5F9C0
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5F9E2
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F5FB5E
                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00F5FB90
                                        • CloseHandle.KERNEL32(?), ref: 00F5FBBF
                                        • CloseHandle.KERNEL32(?), ref: 00F5FC36
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                        • String ID:
                                        • API String ID: 4090791747-0
                                        • Opcode ID: 5721b3e646092a3a311439c658e454c522fbd43caa6cdc9d80484c6ef826e690
                                        • Instruction ID: 9945013a02d28e5d73b6fa7029a6491f441f94291b76ee10daa001a25b650ab9
                                        • Opcode Fuzzy Hash: 5721b3e646092a3a311439c658e454c522fbd43caa6cdc9d80484c6ef826e690
                                        • Instruction Fuzzy Hash: 09E1D431604341DFC714EF24C881B6ABBE0EF84361F1484ADF9899B2A2DB35DC09EB52
                                        APIs
                                          • Part of subcall function 00F446AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F436DB,?), ref: 00F446CC
                                          • Part of subcall function 00F446AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F436DB,?), ref: 00F446E5
                                          • Part of subcall function 00F44AD8: GetFileAttributesW.KERNEL32(?,00F4374F), ref: 00F44AD9
                                        • lstrcmpiW.KERNEL32(?,?), ref: 00F44DE7
                                        • _wcscmp.LIBCMT ref: 00F44E01
                                        • MoveFileW.KERNEL32(?,?), ref: 00F44E1C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                        • String ID:
                                        • API String ID: 793581249-0
                                        • Opcode ID: aee63fec8e37bc38b1890b81a2a24f10d410dd5f6cc22ad1e195790e53698337
                                        • Instruction ID: 65776b3d53ffb4d88419f1beaebdfb05e0e16b6f94b2c390428b39c1d3d0436a
                                        • Opcode Fuzzy Hash: aee63fec8e37bc38b1890b81a2a24f10d410dd5f6cc22ad1e195790e53698337
                                        • Instruction Fuzzy Hash: 265142B24083859BC724DB90DC81ADFB7ECAF85310F00092EB589E3151EE74B68C9766
                                        APIs
                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F68731
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InvalidateRect
                                        • String ID:
                                        • API String ID: 634782764-0
                                        • Opcode ID: f69c82abe513706b19029555da652d522463f47784b343045f7b53d4c8513fa6
                                        • Instruction ID: 413a18df6de156c82292ccf7094a8f7c6690db965b0f235ac86c8cd5fe57bae8
                                        • Opcode Fuzzy Hash: f69c82abe513706b19029555da652d522463f47784b343045f7b53d4c8513fa6
                                        • Instruction Fuzzy Hash: BE51A370900249BFDF209F29DC85B993BA4EB053A4F604619FA15EB1E1CF72AD81FB50
                                        APIs
                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F1C477
                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F1C499
                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F1C4B1
                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F1C4CF
                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F1C4F0
                                        • DestroyIcon.USER32(00000000), ref: 00F1C4FF
                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F1C51C
                                        • DestroyIcon.USER32(?), ref: 00F1C52B
                                          • Part of subcall function 00F6A4E1: DeleteObject.GDI32(00000000), ref: 00F6A51A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                        • String ID:
                                        • API String ID: 2819616528-0
                                        • Opcode ID: 39d2795046e7fbbdb7884ee8b4aeb234c24a4514764fd8db5185d7f0de59e5f6
                                        • Instruction ID: b69f600ccdc986a5b3e914dc930daa714efb2c0cc9b50b40ab1014702f49087c
                                        • Opcode Fuzzy Hash: 39d2795046e7fbbdb7884ee8b4aeb234c24a4514764fd8db5185d7f0de59e5f6
                                        • Instruction Fuzzy Hash: 65515B70A50249AFDB20DF25DC45FAA77B9FB58720F10452CF952A72A0D7B0AD90EB90
                                        APIs
                                          • Part of subcall function 00F3AC37: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3AC57
                                          • Part of subcall function 00F3AC37: GetCurrentThreadId.KERNEL32 ref: 00F3AC5E
                                          • Part of subcall function 00F3AC37: AttachThreadInput.USER32(00000000,?,00F39945,?,00000001), ref: 00F3AC65
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F39950
                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F3996D
                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00F39970
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F39979
                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F39997
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F3999A
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F399A3
                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F399BA
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F399BD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                        • String ID:
                                        • API String ID: 2014098862-0
                                        • Opcode ID: 456daff69740186a4761c3890e8541d479967733310d56363011e44d03056931
                                        • Instruction ID: eba0e16b2a2e9b3b0c2bb6c1c3547a1dd054f604fe91698eba2b9b4f03c66bb9
                                        • Opcode Fuzzy Hash: 456daff69740186a4761c3890e8541d479967733310d56363011e44d03056931
                                        • Instruction Fuzzy Hash: 5E11217151060CBFF6106B20EC89F6A3B2CEB4D7A0F100029F264AB0E1C9F35C00EAA0
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00F38864,00000B00,?,?), ref: 00F38BEC
                                        • HeapAlloc.KERNEL32(00000000,?,00F38864,00000B00,?,?), ref: 00F38BF3
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F38864,00000B00,?,?), ref: 00F38C08
                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00F38864,00000B00,?,?), ref: 00F38C10
                                        • DuplicateHandle.KERNEL32(00000000,?,00F38864,00000B00,?,?), ref: 00F38C13
                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00F38864,00000B00,?,?), ref: 00F38C23
                                        • GetCurrentProcess.KERNEL32(00F38864,00000000,?,00F38864,00000B00,?,?), ref: 00F38C2B
                                        • DuplicateHandle.KERNEL32(00000000,?,00F38864,00000B00,?,?), ref: 00F38C2E
                                        • CreateThread.KERNEL32(00000000,00000000,00F38C54,00000000,00000000,00000000), ref: 00F38C48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                        • String ID:
                                        • API String ID: 1957940570-0
                                        • Opcode ID: 5f49d491da4b25016044936881ad4604caf414a11dc69c6bcd80cd20537b3349
                                        • Instruction ID: ce8eb3de67159a8d580f949801b54ec0f450bed975dc0b9d597466818aabd7e1
                                        • Opcode Fuzzy Hash: 5f49d491da4b25016044936881ad4604caf414a11dc69c6bcd80cd20537b3349
                                        • Instruction Fuzzy Hash: D601BBB5240348FFE710ABA5EC4DF6B3BACEB89751F004421FA15DB1A1CAB59804EB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$ClearInit$_memset
                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                        • API String ID: 2862541840-625585964
                                        • Opcode ID: 0d8d41f4c59ecca600a12206ae121ca9ba9ec4f85c192ea2f444c28b52ff0cf6
                                        • Instruction ID: 1ac7b9298f50d7f1c694eaad93ebc098cf0bbc81388302c4f0d69d2ff6ceea0f
                                        • Opcode Fuzzy Hash: 0d8d41f4c59ecca600a12206ae121ca9ba9ec4f85c192ea2f444c28b52ff0cf6
                                        • Instruction Fuzzy Hash: D791B371E04219EBDF28DFA5C844FAE77B8EF45321F108159FA05AB280D7B09D09DBA0
                                        APIs
                                          • Part of subcall function 00F37432: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?,?,00F3777D), ref: 00F3744F
                                          • Part of subcall function 00F37432: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?), ref: 00F3746A
                                          • Part of subcall function 00F37432: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?), ref: 00F37478
                                          • Part of subcall function 00F37432: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?), ref: 00F37488
                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00F5991B
                                        • _memset.LIBCMT ref: 00F59928
                                        • _memset.LIBCMT ref: 00F59A6B
                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00F59A97
                                        • CoTaskMemFree.OLE32(?), ref: 00F59AA2
                                        Strings
                                        • NULL Pointer assignment, xrefs: 00F59AF0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                        • String ID: NULL Pointer assignment
                                        • API String ID: 1300414916-2785691316
                                        • Opcode ID: 1a79a5e36576a3da33d612463f3986e55c2fd449f827587c560060a6e711d4aa
                                        • Instruction ID: 1334415e15042545ccdf757e228e96c57e30436abe5286fd08da1c9d3c76b651
                                        • Opcode Fuzzy Hash: 1a79a5e36576a3da33d612463f3986e55c2fd449f827587c560060a6e711d4aa
                                        • Instruction Fuzzy Hash: EF912871D0021DEBDB14DFA5DC85ADEBBB8EF08710F10416AF919A7281DBB09A45DFA0
                                        APIs
                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F66E56
                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00F66E6A
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F66E84
                                        • _wcscat.LIBCMT ref: 00F66EDF
                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F66EF6
                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F66F24
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window_wcscat
                                        • String ID: SysListView32
                                        • API String ID: 307300125-78025650
                                        • Opcode ID: ba946f198ad97c129deacb331653c1b0e609f877c11a023a93a10bf6fb8eb4b1
                                        • Instruction ID: 4e547b232734717affd8d8413bd55639f6f62a0fda09fa94ca19bf20986f1967
                                        • Opcode Fuzzy Hash: ba946f198ad97c129deacb331653c1b0e609f877c11a023a93a10bf6fb8eb4b1
                                        • Instruction Fuzzy Hash: D741A171A00308ABEF21DF64DC85BEE77E8EF08360F10046AF555E7192D7769D84AB64
                                        APIs
                                          • Part of subcall function 00F43C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00F43CBE
                                          • Part of subcall function 00F43C99: Process32FirstW.KERNEL32(00000000,?), ref: 00F43CCC
                                          • Part of subcall function 00F43C99: CloseHandle.KERNEL32(00000000), ref: 00F43D96
                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5EAB8
                                        • GetLastError.KERNEL32 ref: 00F5EACB
                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5EAFA
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F5EB77
                                        • GetLastError.KERNEL32(00000000), ref: 00F5EB82
                                        • CloseHandle.KERNEL32(00000000), ref: 00F5EBB7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                        • String ID: SeDebugPrivilege
                                        • API String ID: 2533919879-2896544425
                                        • Opcode ID: 76824cce8120c0263a263a5e4436e700b6fcdd14afc0f43e2705c56a2d186379
                                        • Instruction ID: 9d6154fe6c65480e5f0736b2feafa7a34a25f51c788f9dd52397898a6acfa907
                                        • Opcode Fuzzy Hash: 76824cce8120c0263a263a5e4436e700b6fcdd14afc0f43e2705c56a2d186379
                                        • Instruction Fuzzy Hash: 7141B171600205AFDB18EF14CC95F6DB7E5AF84325F088058F9469B3D3CBB9A908EB85
                                        APIs
                                        • LoadIconW.USER32(00000000,00007F03), ref: 00F430CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconLoad
                                        • String ID: blank$info$question$stop$warning
                                        • API String ID: 2457776203-404129466
                                        • Opcode ID: de2593359f17fc09998b49cd90b24a9a859501029d44dada10206e3e47bcbda9
                                        • Instruction ID: 5b8c2d8cafe861a47a25eb74b6677ed3d4ca90d8fd34f9e46d4954de29d8436e
                                        • Opcode Fuzzy Hash: de2593359f17fc09998b49cd90b24a9a859501029d44dada10206e3e47bcbda9
                                        • Instruction Fuzzy Hash: 6711EB36A0D347BAE7349A58DC42D6A7B9C9F05378F10012AFD00961C1EAB5AF4175A1
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F44353
                                        • LoadStringW.USER32(00000000), ref: 00F4435A
                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F44370
                                        • LoadStringW.USER32(00000000), ref: 00F44377
                                        • _wprintf.LIBCMT ref: 00F4439D
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F443BB
                                        Strings
                                        • %s (%d) : ==> %s: %s %s, xrefs: 00F44398
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString$Message_wprintf
                                        • String ID: %s (%d) : ==> %s: %s %s
                                        • API String ID: 3648134473-3128320259
                                        • Opcode ID: c050ba7e16a340c4fa74044c4748ba4313ae6c835a10cd2567e53e990b7620f4
                                        • Instruction ID: f185961cb7d0a1f300c2cb6d65d8f3a101b5d7852b205a186c4866faa99108df
                                        • Opcode Fuzzy Hash: c050ba7e16a340c4fa74044c4748ba4313ae6c835a10cd2567e53e990b7620f4
                                        • Instruction Fuzzy Hash: 0E018FF280020CBFE7109BA0ED89EF6776CE709301F4005A1FB15E2051EAB59E896B70
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • GetSystemMetrics.USER32(0000000F), ref: 00F6D4E6
                                        • GetSystemMetrics.USER32(0000000F), ref: 00F6D506
                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F6D741
                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F6D75F
                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F6D780
                                        • ShowWindow.USER32(00000003,00000000), ref: 00F6D79F
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F6D7C4
                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F6D7E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                        • String ID:
                                        • API String ID: 1211466189-0
                                        • Opcode ID: 3a992ed2e1d9ddc701983a67e4947cdbe1eeaaa849ce83f5e858f39936e1621a
                                        • Instruction ID: 6bf1c342fbd61cd20075f8910a6d35f993bd26e8f1b58f4bccccdd0229d507d2
                                        • Opcode Fuzzy Hash: 3a992ed2e1d9ddc701983a67e4947cdbe1eeaaa849ce83f5e858f39936e1621a
                                        • Instruction Fuzzy Hash: 55B1A971A00229EFDF18CF28C9C57AE7BB1BF04720F088169EC589A295D735AD50EB60
                                        APIs
                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F1C347,00000004,00000000,00000000,00000000), ref: 00EE2ACF
                                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F1C347,00000004,00000000,00000000,00000000,000000FF), ref: 00EE2B17
                                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F1C347,00000004,00000000,00000000,00000000), ref: 00F1C39A
                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F1C347,00000004,00000000,00000000,00000000), ref: 00F1C406
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ShowWindow
                                        • String ID:
                                        • API String ID: 1268545403-0
                                        • Opcode ID: ccfca72641be3b88091f7cd9dab54e824f60f5ed257db2960b7f2dc825247b14
                                        • Instruction ID: 5a425b0e910681683eb597c037eef27c6132a6364f41ad627776afb0436ca399
                                        • Opcode Fuzzy Hash: ccfca72641be3b88091f7cd9dab54e824f60f5ed257db2960b7f2dc825247b14
                                        • Instruction Fuzzy Hash: 3F4168316086CC9AC7358F2ADC8CBBB3B9ABB45314F18D83DE25BA6160C67198C5F711
                                        APIs
                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F47186
                                          • Part of subcall function 00F00F36: std::exception::exception.LIBCMT ref: 00F00F6C
                                          • Part of subcall function 00F00F36: __CxxThrowException@8.LIBCMT ref: 00F00F81
                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00F471BD
                                        • EnterCriticalSection.KERNEL32(?), ref: 00F471D9
                                        • _memmove.LIBCMT ref: 00F47227
                                        • _memmove.LIBCMT ref: 00F47244
                                        • LeaveCriticalSection.KERNEL32(?), ref: 00F47253
                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00F47268
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F47287
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                        • String ID:
                                        • API String ID: 256516436-0
                                        • Opcode ID: 0bc3c13a78fef2ca833362f76a7d06ba83cea7c73f6d13c81c7f3c39942c2df3
                                        • Instruction ID: 67e2938ac2647fe0e13e8b5894b91d785047b33c0b4ca521f8d5bc4cf878214b
                                        • Opcode Fuzzy Hash: 0bc3c13a78fef2ca833362f76a7d06ba83cea7c73f6d13c81c7f3c39942c2df3
                                        • Instruction Fuzzy Hash: 9B31907190420AEBCB10EF64DD85AAABB78FF45310F1441A5F9049B286DB709E14FBA0
                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 00F6621D
                                        • GetDC.USER32(00000000), ref: 00F66225
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F66230
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00F6623C
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F66278
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F66289
                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F6905C,?,?,000000FF,00000000,?,000000FF,?), ref: 00F662C3
                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F662E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                        • String ID:
                                        • API String ID: 3864802216-0
                                        • Opcode ID: dbeec72a0da2a8a05126c7946b258a776cf7c181c751e7aab249a4b2eeb94cb7
                                        • Instruction ID: 3e4cce4903b6e0950a02e11e989c5c752766c81fd0035fc6043f2a0909c1be03
                                        • Opcode Fuzzy Hash: dbeec72a0da2a8a05126c7946b258a776cf7c181c751e7aab249a4b2eeb94cb7
                                        • Instruction Fuzzy Hash: 89316D72601214BFEF118F50DC4AFEA3BA9EF09761F040065FE18DA1A1C6B59C55DB74
                                        APIs
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                          • Part of subcall function 00EFFE06: _wcscpy.LIBCMT ref: 00EFFE29
                                        • _wcstok.LIBCMT ref: 00F4ED20
                                        • _wcscpy.LIBCMT ref: 00F4EDAF
                                        • _memset.LIBCMT ref: 00F4EDE2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                        • String ID: X
                                        • API String ID: 774024439-3081909835
                                        • Opcode ID: e93de03d9f6a6dee132d85e9249d93caacb682ef7ccb75613018439f6237d4f4
                                        • Instruction ID: 98af422e8c1c03e732213a3cbdf463de938fb8c1cecff4c721b77b2ffbb62ea3
                                        • Opcode Fuzzy Hash: e93de03d9f6a6dee132d85e9249d93caacb682ef7ccb75613018439f6237d4f4
                                        • Instruction Fuzzy Hash: 8FC191719083459FD724EF24C881A5EBBE4FF85320F10492DF8999B2A2DB70ED45DB82
                                        APIs
                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F56D16
                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F56D37
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56D4A
                                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00F56E00
                                        • inet_ntoa.WSOCK32(?), ref: 00F56DBD
                                          • Part of subcall function 00F3ABF4: _strlen.LIBCMT ref: 00F3ABFE
                                          • Part of subcall function 00F3ABF4: _memmove.LIBCMT ref: 00F3AC20
                                        • _strlen.LIBCMT ref: 00F56E5A
                                        • _memmove.LIBCMT ref: 00F56EC3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                        • String ID:
                                        • API String ID: 3619996494-0
                                        • Opcode ID: 5ad9015928112bab92f122d9d7edc246cb07e2d4294aed702cdfc2e0507aae54
                                        • Instruction ID: 57eb1d1fd59596ecfe7b35d77ef01f164c6524b01fbf2d606d9f3722fed83713
                                        • Opcode Fuzzy Hash: 5ad9015928112bab92f122d9d7edc246cb07e2d4294aed702cdfc2e0507aae54
                                        • Instruction Fuzzy Hash: 7E81E072504304ABD710EF25CC86F6BB3E9EF84724F50491CFA69AB2A2DA709D08D791
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f443742ab57a9a72a6ab5ecd924d1dc1fa69510d2bfaee9113567d3eb10ab09c
                                        • Instruction ID: b14f13a1618903a08a4f59626076f161ae822bf495fd8c6c8aa93bd119901f14
                                        • Opcode Fuzzy Hash: f443742ab57a9a72a6ab5ecd924d1dc1fa69510d2bfaee9113567d3eb10ab09c
                                        • Instruction Fuzzy Hash: A5715C3090015DEFCB148F99CC48EEEBB79FF85324F148199F925AA291D730AA91DB60
                                        APIs
                                        • IsWindow.USER32(01575730), ref: 00F6B41F
                                        • IsWindowEnabled.USER32(01575730), ref: 00F6B42B
                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00F6B50F
                                        • SendMessageW.USER32(01575730,000000B0,?,?), ref: 00F6B546
                                        • IsDlgButtonChecked.USER32(?,?), ref: 00F6B583
                                        • GetWindowLongW.USER32(01575730,000000EC), ref: 00F6B5A5
                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F6B5BD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                        • String ID:
                                        • API String ID: 4072528602-0
                                        • Opcode ID: 06a13cf9aaac9ba9cbb1ba3f4361cc73b211363c9dc617d827272bd7f972ade2
                                        • Instruction ID: 2609feb72fcdcca3fca96764c6d842d8a59de5a13d5b8a171a77517e4d523579
                                        • Opcode Fuzzy Hash: 06a13cf9aaac9ba9cbb1ba3f4361cc73b211363c9dc617d827272bd7f972ade2
                                        • Instruction Fuzzy Hash: 44719074A45208AFDB20DF55C895FBA7BB9FF49320F144069F956D7262CB32AC81EB10
                                        APIs
                                        • _memset.LIBCMT ref: 00F5F55C
                                        • _memset.LIBCMT ref: 00F5F625
                                        • ShellExecuteExW.SHELL32(?), ref: 00F5F66A
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                          • Part of subcall function 00EFFE06: _wcscpy.LIBCMT ref: 00EFFE29
                                        • GetProcessId.KERNEL32(00000000), ref: 00F5F6E1
                                        • CloseHandle.KERNEL32(00000000), ref: 00F5F710
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                        • String ID: @
                                        • API String ID: 3522835683-2766056989
                                        • Opcode ID: 076448f7050ba7a7a359396e527646fbacf3cabeac488e66f3dd03761bb52b6e
                                        • Instruction ID: a52844eaf27be4023b1a2d813fce724486d8277650cd9075dceaf7b83aae32ec
                                        • Opcode Fuzzy Hash: 076448f7050ba7a7a359396e527646fbacf3cabeac488e66f3dd03761bb52b6e
                                        • Instruction Fuzzy Hash: B761C175A006199FCF14EF55C8819ADBBF4FF48310F1484A9E84ABB352CB30AD49DB90
                                        APIs
                                        • GetParent.USER32(?), ref: 00F412BD
                                        • GetKeyboardState.USER32(?), ref: 00F412D2
                                        • SetKeyboardState.USER32(?), ref: 00F41333
                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F41361
                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F41380
                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F413C6
                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F413E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: 205f0e62a905321c796a216c4520b35bab4833edcb0e2ec5b7f1ccc1563a1db0
                                        • Instruction ID: 548a9bee4d02c2d3d7cd585970bfdb5e273a85e4d306804e894d31e9c235c83a
                                        • Opcode Fuzzy Hash: 205f0e62a905321c796a216c4520b35bab4833edcb0e2ec5b7f1ccc1563a1db0
                                        • Instruction Fuzzy Hash: 6A5103A0E087D53DFB328634CC45BBA7EA97F06314F084589E8D5868D2D6D8ACC8F750
                                        APIs
                                        • GetParent.USER32(00000000), ref: 00F410D6
                                        • GetKeyboardState.USER32(?), ref: 00F410EB
                                        • SetKeyboardState.USER32(?), ref: 00F4114C
                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F41178
                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F41195
                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F411D9
                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F411FA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: d705bca4460591bbea47646ef3cf108bf99cb4e61a328b288e104e583470140e
                                        • Instruction ID: 30fc8dc73e8ef386210b412cc6c1063f66e01d840b663c963395d7c1e7195c43
                                        • Opcode Fuzzy Hash: d705bca4460591bbea47646ef3cf108bf99cb4e61a328b288e104e583470140e
                                        • Instruction Fuzzy Hash: 855125A0A447D63DFB3683248C41BBABEAD7F46310F0C8589E9D5868C2D694EDC8F750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcsncpy$LocalTime
                                        • String ID:
                                        • API String ID: 2945705084-0
                                        • Opcode ID: 9290382f4cf264532f97f29e82b0ee2aaadb200d698d415e3ff15f75996656cb
                                        • Instruction ID: b0e91b086071787e02056910aa3cee6c137defe737c8f40e29159b055579341f
                                        • Opcode Fuzzy Hash: 9290382f4cf264532f97f29e82b0ee2aaadb200d698d415e3ff15f75996656cb
                                        • Instruction Fuzzy Hash: DF41C4A5C20618B6CB11FBB49C869CFB7BC9F05710F108466F918E3162FA38A704E3E5
                                        APIs
                                          • Part of subcall function 00F446AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F436DB,?), ref: 00F446CC
                                          • Part of subcall function 00F446AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F436DB,?), ref: 00F446E5
                                        • lstrcmpiW.KERNEL32(?,?), ref: 00F436FB
                                        • _wcscmp.LIBCMT ref: 00F43717
                                        • MoveFileW.KERNEL32(?,?), ref: 00F4372F
                                        • _wcscat.LIBCMT ref: 00F43777
                                        • SHFileOperationW.SHELL32(?), ref: 00F437E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                        • String ID: \*.*
                                        • API String ID: 1377345388-1173974218
                                        • Opcode ID: ff84cc3ab48fdc98be5d8dd9c513b6f46b020e91d307af710a3aa043d9989ae3
                                        • Instruction ID: 2634df56e3fe329a8f512779e495fe230c50f770835fae4ab77efff97ba5732b
                                        • Opcode Fuzzy Hash: ff84cc3ab48fdc98be5d8dd9c513b6f46b020e91d307af710a3aa043d9989ae3
                                        • Instruction Fuzzy Hash: 3F417EB250C3859AC751EF64D841ADBBBE8EF89390F00092EB8D9D3151EA38D688D756
                                        APIs
                                        • _memset.LIBCMT ref: 00F672DC
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F67383
                                        • IsMenu.USER32(?), ref: 00F6739B
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F673E3
                                        • DrawMenuBar.USER32 ref: 00F673F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                        • String ID: 0
                                        • API String ID: 3866635326-4108050209
                                        • Opcode ID: 878cc1176845d8306fccf4c659c991cca9794a2328f64ece24e8ef3774f09c93
                                        • Instruction ID: 46f10c7326d834b33f2b212c7de0e50d8d50f0b322257564806b12fbbc7638cc
                                        • Opcode Fuzzy Hash: 878cc1176845d8306fccf4c659c991cca9794a2328f64ece24e8ef3774f09c93
                                        • Instruction Fuzzy Hash: A6410875A04309EFDB20EF50D888A9ABBF8FB05368F048129ED5597260D770AD55EB90
                                        APIs
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00F6105C
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F61086
                                        • FreeLibrary.KERNEL32(00000000), ref: 00F6113D
                                          • Part of subcall function 00F6102D: RegCloseKey.ADVAPI32(?), ref: 00F610A3
                                          • Part of subcall function 00F6102D: FreeLibrary.KERNEL32(?), ref: 00F610F5
                                          • Part of subcall function 00F6102D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00F61118
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F610E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                        • String ID:
                                        • API String ID: 395352322-0
                                        • Opcode ID: e1f064b981ae8097e64fc3ae8b95081347e9a7301ab92b932fd32d2103b87d2a
                                        • Instruction ID: 45e363ebd0f0a0cfc93e623472fcaa3a91ece07f5f6c9ca327110ddade9da382
                                        • Opcode Fuzzy Hash: e1f064b981ae8097e64fc3ae8b95081347e9a7301ab92b932fd32d2103b87d2a
                                        • Instruction Fuzzy Hash: 18310BB1D01119BFDB15DB90EC89AFFB7BCEF09350F040169E511A2151EA749E89ABA0
                                        APIs
                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F6631E
                                        • GetWindowLongW.USER32(01575730,000000F0), ref: 00F66351
                                        • GetWindowLongW.USER32(01575730,000000F0), ref: 00F66386
                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00F663B8
                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00F663E2
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00F663F3
                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F6640D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LongWindow$MessageSend
                                        • String ID:
                                        • API String ID: 2178440468-0
                                        • Opcode ID: 54c937cf760c538a0dd244ca6248bd7114bb5dc97713833a303a598a80538706
                                        • Instruction ID: b002e4a5c0a1b808da9b67e14d235474efbb623f5614dd985abf0a29282b5497
                                        • Opcode Fuzzy Hash: 54c937cf760c538a0dd244ca6248bd7114bb5dc97713833a303a598a80538706
                                        • Instruction Fuzzy Hash: 4F31C231A042549FEB21CF18EC85F5937E1FB4AB20F1941A4F525DF3B2CB62AC44AB51
                                        APIs
                                          • Part of subcall function 00F57EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00F57ECB
                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F562DC
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F562EB
                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F56324
                                        • connect.WSOCK32(00000000,?,00000010), ref: 00F5632D
                                        • WSAGetLastError.WSOCK32 ref: 00F56337
                                        • closesocket.WSOCK32(00000000), ref: 00F56360
                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F56379
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                        • String ID:
                                        • API String ID: 910771015-0
                                        • Opcode ID: 0da5de66b49bb3d8fd1deac45c87a42bcfcded1a3681812ab7021cd82f91b19a
                                        • Instruction ID: d5c29dfd523e04f1bc05f2e92eff47ba33314cf62d33164f114e1117611b2fd5
                                        • Opcode Fuzzy Hash: 0da5de66b49bb3d8fd1deac45c87a42bcfcded1a3681812ab7021cd82f91b19a
                                        • Instruction Fuzzy Hash: AC31E431600218AFDB10AF60DC85BBE7BF9EF44321F404069FE15E7291DB74AC08ABA1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                        • API String ID: 1038674560-2734436370
                                        • Opcode ID: f4fc0a72db56003d830b369c799e970366ad851bdaa12704e93c4418e4be364d
                                        • Instruction ID: 806861167cccd5fc4c988e8bd696b661671cc9be9bae83eb5977907146416a86
                                        • Opcode Fuzzy Hash: f4fc0a72db56003d830b369c799e970366ad851bdaa12704e93c4418e4be364d
                                        • Instruction Fuzzy Hash: 45216B33D0921576D730EA259C02FB773D8DF55330F544037F88A86181EB989E46F2A2
                                        APIs
                                          • Part of subcall function 00EE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00EE1D73
                                          • Part of subcall function 00EE1D35: GetStockObject.GDI32(00000011), ref: 00EE1D87
                                          • Part of subcall function 00EE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE1D91
                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F67664
                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F67671
                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F6767C
                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F6768B
                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F67697
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$CreateObjectStockWindow
                                        • String ID: Msctls_Progress32
                                        • API String ID: 1025951953-3636473452
                                        • Opcode ID: 8e8460756bc87a20be12282146027c766c49675d02cd89ff2f1c528250b2768c
                                        • Instruction ID: a75925fde9d8097af58372deccf7a3371a0a92707b4addc68ebc5c356d02aa2e
                                        • Opcode Fuzzy Hash: 8e8460756bc87a20be12282146027c766c49675d02cd89ff2f1c528250b2768c
                                        • Instruction Fuzzy Hash: 5A11B2B251021DBFEF119F64CC85EE77F6DEF08768F014115BA04A20A0C672AC21EBA0
                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00F041D2,?), ref: 00F04123
                                        • GetProcAddress.KERNEL32(00000000), ref: 00F0412A
                                        • EncodePointer.KERNEL32(00000000), ref: 00F04136
                                        • DecodePointer.KERNEL32(00000001,00F041D2,?), ref: 00F04153
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoInitialize$combase.dll
                                        • API String ID: 3489934621-340411864
                                        • Opcode ID: 45672abab150ee3886d74707411c656722615e9e3bf29d17c677a28d87d64698
                                        • Instruction ID: a3c9a53c2b7a2bebacd6f9a1a7258d5558688743ae386562464833b3f43e61d5
                                        • Opcode Fuzzy Hash: 45672abab150ee3886d74707411c656722615e9e3bf29d17c677a28d87d64698
                                        • Instruction Fuzzy Hash: F3E0E5B0A90348AAEB205B70EC09B043AA5A757B82F108425F525D51E0CAF59189BE01
                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00F040F8), ref: 00F041F8
                                        • GetProcAddress.KERNEL32(00000000), ref: 00F041FF
                                        • EncodePointer.KERNEL32(00000000), ref: 00F0420A
                                        • DecodePointer.KERNEL32(00F040F8), ref: 00F04225
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoUninitialize$combase.dll
                                        • API String ID: 3489934621-2819208100
                                        • Opcode ID: c9c5c28f82beb0b1b998d06ec32e3bdedbc94e8a6d62e7b0049a29d8261ae76c
                                        • Instruction ID: cda50ebc781a1028f4c05609a4f06d42bd844a52959071b5f83013cdb9cd83bc
                                        • Opcode Fuzzy Hash: c9c5c28f82beb0b1b998d06ec32e3bdedbc94e8a6d62e7b0049a29d8261ae76c
                                        • Instruction Fuzzy Hash: A8E0B6F0E81308AFEB509B61FD0EB147AA4B716B42F204025F125E11A0CBB69608FA11
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove$__itow__swprintf
                                        • String ID:
                                        • API String ID: 3253778849-0
                                        • Opcode ID: 816739762f22c61dd1eac28b8b0fca2c1ad7aba257a2a36d8171e5a3a2347d18
                                        • Instruction ID: 90c83bea50f52f52e763116175f3cb32d45f02ecff4824aec6592646bfe510b4
                                        • Opcode Fuzzy Hash: 816739762f22c61dd1eac28b8b0fca2c1ad7aba257a2a36d8171e5a3a2347d18
                                        • Instruction Fuzzy Hash: 47619B3150069AABCF11EF20CC82EFE7BA4AF45318F054519FC59AB192DF39AD05EB51
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F60EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5FE38,?,?), ref: 00F60EBC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F60348
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F60388
                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00F603AB
                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F603D4
                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F60417
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F60424
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                        • String ID:
                                        • API String ID: 4046560759-0
                                        • Opcode ID: a7a06170d208e5b9580ab371cacfe48fe481b798f730b241c759fd9a58c0c0e4
                                        • Instruction ID: fe06af198e6423052073a2a765b02c6f36ebd63108f789a8ddedb11ca54da654
                                        • Opcode Fuzzy Hash: a7a06170d208e5b9580ab371cacfe48fe481b798f730b241c759fd9a58c0c0e4
                                        • Instruction Fuzzy Hash: 57517731608244AFC714EF64D885E6FBBE8FF88314F14482DF599972A2DB71E904EB52
                                        APIs
                                        • GetMenu.USER32(?), ref: 00F65864
                                        • GetMenuItemCount.USER32(00000000), ref: 00F6589B
                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F658C3
                                        • GetMenuItemID.USER32(?,?), ref: 00F65932
                                        • GetSubMenu.USER32(?,?), ref: 00F65940
                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00F65991
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountMessagePostString
                                        • String ID:
                                        • API String ID: 650687236-0
                                        • Opcode ID: 546caf7d2fae60519eb8a4f1cce96d9a1f38f3b3fb2a973e2407ee58440e5d94
                                        • Instruction ID: 71e64ffce3d1c637da16b336b507ae023d1f44558dc546316c201e948c47cfe8
                                        • Opcode Fuzzy Hash: 546caf7d2fae60519eb8a4f1cce96d9a1f38f3b3fb2a973e2407ee58440e5d94
                                        • Instruction Fuzzy Hash: 10518E72E00619EFCF11EFA4C845AAEB7B5EF48720F104069E855BB351CB75AE41EB90
                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 00F3F218
                                        • VariantClear.OLEAUT32(00000013), ref: 00F3F28A
                                        • VariantClear.OLEAUT32(00000000), ref: 00F3F2E5
                                        • _memmove.LIBCMT ref: 00F3F30F
                                        • VariantClear.OLEAUT32(?), ref: 00F3F35C
                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F3F38A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$Clear$ChangeInitType_memmove
                                        • String ID:
                                        • API String ID: 1101466143-0
                                        • Opcode ID: 98fab753a5c7584f812a749a51ee625a50b0a5cf23681993b65a569a1031f752
                                        • Instruction ID: 5eb6d57268ef39216d144b15f5ddeafc12f8be70bd8d9622880d57570112e04c
                                        • Opcode Fuzzy Hash: 98fab753a5c7584f812a749a51ee625a50b0a5cf23681993b65a569a1031f752
                                        • Instruction Fuzzy Hash: AE5138B5A00209EFDB14CF58D884AAAB7B8FF4C324F158569E959DB341D730E915CFA0
                                        APIs
                                        • _memset.LIBCMT ref: 00F42550
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F4259B
                                        • IsMenu.USER32(00000000), ref: 00F425BB
                                        • CreatePopupMenu.USER32 ref: 00F425EF
                                        • GetMenuItemCount.USER32(000000FF), ref: 00F4264D
                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00F4267E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                        • String ID:
                                        • API String ID: 3311875123-0
                                        • Opcode ID: 08ae0f17073fcbe68f00e357d06e199378523ebb9eeed078b3480a9d0f372b0c
                                        • Instruction ID: 894154c2289b0367bb4405a84bed074c245939c86553756d810bf9cdbc883b2d
                                        • Opcode Fuzzy Hash: 08ae0f17073fcbe68f00e357d06e199378523ebb9eeed078b3480a9d0f372b0c
                                        • Instruction Fuzzy Hash: 15519A70A00209EBDF60CF68D898BAEBFF5BF45324F554169FC119B290EBB09944EB51
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 00EE179A
                                        • GetWindowRect.USER32(?,?), ref: 00EE17FE
                                        • ScreenToClient.USER32(?,?), ref: 00EE181B
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00EE182C
                                        • EndPaint.USER32(?,?), ref: 00EE1876
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                        • String ID:
                                        • API String ID: 1827037458-0
                                        • Opcode ID: a980e27a8a50cd391dc0d83cb34c132cde6b732bde822542ec42c633d6cfa3f3
                                        • Instruction ID: 187b7419e25e822a382fbc40e21a294903bf33656c485e8f6686f35d3563c3a2
                                        • Opcode Fuzzy Hash: a980e27a8a50cd391dc0d83cb34c132cde6b732bde822542ec42c633d6cfa3f3
                                        • Instruction Fuzzy Hash: 9C41C270500348EFC710DF25DC84FBA7BE8FB4A724F040269F6A4972A1C7719885EB61
                                        APIs
                                        • ShowWindow.USER32(00FA57B0,00000000,01575730,?,?,00FA57B0,?,00F6B5DC,?,?), ref: 00F6B746
                                        • EnableWindow.USER32(00000000,00000000), ref: 00F6B76A
                                        • ShowWindow.USER32(00FA57B0,00000000,01575730,?,?,00FA57B0,?,00F6B5DC,?,?), ref: 00F6B7CA
                                        • ShowWindow.USER32(00000000,00000004,?,00F6B5DC,?,?), ref: 00F6B7DC
                                        • EnableWindow.USER32(00000000,00000001), ref: 00F6B800
                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00F6B823
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Show$Enable$MessageSend
                                        • String ID:
                                        • API String ID: 642888154-0
                                        • Opcode ID: 4a04f3dfd81d64e8ac5163ea9315c3a2d3aaf5774dbdee4ff5369f45d5db83f3
                                        • Instruction ID: 40b938bb545f4ccd9f65be298d6e4b79a0ce0646cff7774b65288175efec623d
                                        • Opcode Fuzzy Hash: 4a04f3dfd81d64e8ac5163ea9315c3a2d3aaf5774dbdee4ff5369f45d5db83f3
                                        • Instruction Fuzzy Hash: A0418034A00144EFDB22CF24D489B947BE1FF45321F1841B9E958CF2A2C772A886EB91
                                        APIs
                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00F54F57,?,?,00000000,00000001), ref: 00F571C1
                                          • Part of subcall function 00F53AB6: GetWindowRect.USER32(?,?), ref: 00F53AC9
                                        • GetDesktopWindow.USER32 ref: 00F571EB
                                        • GetWindowRect.USER32(00000000), ref: 00F571F2
                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00F57224
                                          • Part of subcall function 00F452EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F45363
                                        • GetCursorPos.USER32(?), ref: 00F57250
                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F572AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                        • String ID:
                                        • API String ID: 4137160315-0
                                        • Opcode ID: 7b5c149f1b36ab808ea49593bd7d3fd3def6028e53d0065ad9949e9e9ca0531b
                                        • Instruction ID: 3e5fa7259e2e26b02f192c9a88682e1904fad444a9b61f94009a6ac5a05a8f33
                                        • Opcode Fuzzy Hash: 7b5c149f1b36ab808ea49593bd7d3fd3def6028e53d0065ad9949e9e9ca0531b
                                        • Instruction Fuzzy Hash: 9C31D472509309ABD710EF14DC49B5BBBA9FF88314F000919F99597191C775EA08DB92
                                        APIs
                                          • Part of subcall function 00F383D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F383E8
                                          • Part of subcall function 00F383D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F383F2
                                          • Part of subcall function 00F383D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F38401
                                          • Part of subcall function 00F383D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F38408
                                          • Part of subcall function 00F383D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F3841E
                                        • GetLengthSid.ADVAPI32(?,00000000,00F38757), ref: 00F38B8C
                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F38B98
                                        • HeapAlloc.KERNEL32(00000000), ref: 00F38B9F
                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F38BB8
                                        • GetProcessHeap.KERNEL32(00000000,00000000,00F38757), ref: 00F38BCC
                                        • HeapFree.KERNEL32(00000000), ref: 00F38BD3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                        • String ID:
                                        • API String ID: 3008561057-0
                                        • Opcode ID: 3f7e0116f051432d47f8ba4bab44da1f5d3b4d134a55c0b8d1551eab98939c6b
                                        • Instruction ID: 2db88d8b4f34c6d97335426985c13a649507b39e2a3be6d3bb1ffb0f0d7a86a9
                                        • Opcode Fuzzy Hash: 3f7e0116f051432d47f8ba4bab44da1f5d3b4d134a55c0b8d1551eab98939c6b
                                        • Instruction Fuzzy Hash: 5611A271900309FFDB109F54DC09BAEB778FB853B5F104018F85697150CB799A09EB60
                                        APIs
                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F3890A
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00F38911
                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F38920
                                        • CloseHandle.KERNEL32(00000004), ref: 00F3892B
                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F3895A
                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F3896E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                        • String ID:
                                        • API String ID: 1413079979-0
                                        • Opcode ID: f0306dbe4ad176a3e26df8ddf8bea7ff39729974ed032f70c69a350cfb9b331e
                                        • Instruction ID: b767ec99bcaaaf54512ed166ee2678a8205f4729090a78291a122d0febd1c772
                                        • Opcode Fuzzy Hash: f0306dbe4ad176a3e26df8ddf8bea7ff39729974ed032f70c69a350cfb9b331e
                                        • Instruction Fuzzy Hash: B7115C7250120DEBDF018FA4ED49BEE7BA9EF08768F044064FE04A2160C7B58D65AB61
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00F3BA77
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F3BA88
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F3BA8F
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00F3BA97
                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F3BAAE
                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00F3BAC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: a59d9a01f9fe5b2b9fb19885baefa45f8c5396b62a7891a748e7bcb69c51c538
                                        • Instruction ID: 05908999422d481796b3f7d0fc48d4e4011ca0788d7f38c54a176745424ff92a
                                        • Opcode Fuzzy Hash: a59d9a01f9fe5b2b9fb19885baefa45f8c5396b62a7891a748e7bcb69c51c538
                                        • Instruction Fuzzy Hash: E00171B5E00318BBEF109BA59D45A5EBFA8EB48761F004065FA04A7291D6719900DF90
                                        APIs
                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F00313
                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F0031B
                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F00326
                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F00331
                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F00339
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F00341
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Virtual
                                        • String ID:
                                        • API String ID: 4278518827-0
                                        • Opcode ID: 9a1cd249ea6b78497dbe4fd0efa69144246ed6945068ccd3abac48d35b843542
                                        • Instruction ID: ad7bce91a1c3dfed5a9f837cc8bf6ce390385f7673230e0b1792d4b06deb739e
                                        • Opcode Fuzzy Hash: 9a1cd249ea6b78497dbe4fd0efa69144246ed6945068ccd3abac48d35b843542
                                        • Instruction Fuzzy Hash: F3016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BE15C47941C7F5A868CBE5
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F454A0
                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F454B6
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00F454C5
                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F454D4
                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F454DE
                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F454E5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                        • String ID:
                                        • API String ID: 839392675-0
                                        • Opcode ID: ba6802b3620d15c30e85554ff6b3faef275de388f855d68905258d978e30b267
                                        • Instruction ID: 79c89587bd96181d7f6f1e7f5a7eaa18b0e1674f74bd7ec3e7d9ed7adaca2ba4
                                        • Opcode Fuzzy Hash: ba6802b3620d15c30e85554ff6b3faef275de388f855d68905258d978e30b267
                                        • Instruction Fuzzy Hash: 9BF06D3224011CBBE3215BA2EC0EEAB7E7CEBCAB11F000169FA10D10A196E11A05A6B5
                                        APIs
                                        • InterlockedExchange.KERNEL32(?,?), ref: 00F472EC
                                        • EnterCriticalSection.KERNEL32(?,?,00EF1044,?,?), ref: 00F472FD
                                        • TerminateThread.KERNEL32(00000000,000001F6,?,00EF1044,?,?), ref: 00F4730A
                                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00EF1044,?,?), ref: 00F47317
                                          • Part of subcall function 00F46CDE: CloseHandle.KERNEL32(00000000,?,00F47324,?,00EF1044,?,?), ref: 00F46CE8
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F4732A
                                        • LeaveCriticalSection.KERNEL32(?,?,00EF1044,?,?), ref: 00F47331
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                        • String ID:
                                        • API String ID: 3495660284-0
                                        • Opcode ID: e7e56854c7707a9dc4fc7da3a90d1dda96b94c417c5799776055443a2d2a52e7
                                        • Instruction ID: 7ba2c19099460261fe9adf9e2b2e146388417748554f20340211b022c4e52e1e
                                        • Opcode Fuzzy Hash: e7e56854c7707a9dc4fc7da3a90d1dda96b94c417c5799776055443a2d2a52e7
                                        • Instruction Fuzzy Hash: C4F05E36544716EBE7112B64FD9C9EA7B2AFF4A312B000531FA12910A0CBB55815FFA0
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F38C5F
                                        • UnloadUserProfile.USERENV(?,?), ref: 00F38C6B
                                        • CloseHandle.KERNEL32(?), ref: 00F38C74
                                        • CloseHandle.KERNEL32(?), ref: 00F38C7C
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00F38C85
                                        • HeapFree.KERNEL32(00000000), ref: 00F38C8C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                        • String ID:
                                        • API String ID: 146765662-0
                                        • Opcode ID: a2dd3e03ef27e7eb7ff2bad6393ff92a6f0bdb00e72fdb2c3f67f9e8dd014aca
                                        • Instruction ID: aa4c2a058a767c17f51b2c1fb629df8a10729c39c9e33fe53c9570e20f9edf35
                                        • Opcode Fuzzy Hash: a2dd3e03ef27e7eb7ff2bad6393ff92a6f0bdb00e72fdb2c3f67f9e8dd014aca
                                        • Instruction Fuzzy Hash: CAE0C236004009FBDA011FE1FC0C90ABB69FB8A362B108230F22981170CBB29428EB50
                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 00F58728
                                        • CharUpperBuffW.USER32(?,?), ref: 00F58837
                                        • VariantClear.OLEAUT32(?), ref: 00F589AF
                                          • Part of subcall function 00F4760B: VariantInit.OLEAUT32(00000000), ref: 00F4764B
                                          • Part of subcall function 00F4760B: VariantCopy.OLEAUT32(00000000,?), ref: 00F47654
                                          • Part of subcall function 00F4760B: VariantClear.OLEAUT32(00000000), ref: 00F47660
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                        • API String ID: 4237274167-1221869570
                                        • Opcode ID: eb87742d78a5b32af80cff05345a9b72e6654ac57585c89f0f4286a59dfb1c00
                                        • Instruction ID: b3bdbb1158a9969f9d4ca35389af0ccf1254ae679fc148e03d735ddefc9da279
                                        • Opcode Fuzzy Hash: eb87742d78a5b32af80cff05345a9b72e6654ac57585c89f0f4286a59dfb1c00
                                        • Instruction Fuzzy Hash: A391C131608341DFC700DF24C48096ABBF4EF89754F14892EF98A9B362DB31E90ADB52
                                        APIs
                                          • Part of subcall function 00EFFE06: _wcscpy.LIBCMT ref: 00EFFE29
                                        • _memset.LIBCMT ref: 00F42E7F
                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F42EAE
                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F42F61
                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F42F8F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                        • String ID: 0
                                        • API String ID: 4152858687-4108050209
                                        • Opcode ID: f63c038cfff353b611ad38b8556c0c38762d0a587b40cdd71a7e3c316868bf92
                                        • Instruction ID: 0f23bd4b558be31db113f4edaf584fb1107c38ef3d686a14173fe9efc21f2f21
                                        • Opcode Fuzzy Hash: f63c038cfff353b611ad38b8556c0c38762d0a587b40cdd71a7e3c316868bf92
                                        • Instruction Fuzzy Hash: 1951AC71A083019ED7A49F28D84476BBBF4AB85330F840A3DFC95D3191DB64CD48B792
                                        APIs
                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F3D8E3
                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F3D919
                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F3D92A
                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F3D9AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                        • String ID: DllGetClassObject
                                        • API String ID: 753597075-1075368562
                                        • Opcode ID: e4bb1ead1c8625e4d06378e303afb51c1a7b38f02780c1c677eacf5eb86f6b41
                                        • Instruction ID: a862639dc490fc4e175cf3e06a551b56cdfa36be10dac41e8be01863fd2553d6
                                        • Opcode Fuzzy Hash: e4bb1ead1c8625e4d06378e303afb51c1a7b38f02780c1c677eacf5eb86f6b41
                                        • Instruction Fuzzy Hash: 3C41A172601204EFDB05DF55E884B9ABBB9EF45324F1180A9EC099F246D7B4DD44EBA0
                                        APIs
                                        • _memset.LIBCMT ref: 00F42AB8
                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F42AD4
                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00F42B1A
                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FA5890,00000000), ref: 00F42B63
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$InfoItem_memset
                                        • String ID: 0
                                        • API String ID: 1173514356-4108050209
                                        • Opcode ID: 32dc8ddfbd83160bdb06e949853035f924777845c03ccb411b966b80872fa346
                                        • Instruction ID: e1a3034c8593865cc817dead3733c8c2e43cdd25f2478ae6e9d3ff6447b6d9c2
                                        • Opcode Fuzzy Hash: 32dc8ddfbd83160bdb06e949853035f924777845c03ccb411b966b80872fa346
                                        • Instruction Fuzzy Hash: 3641CE716043029FD720DF24DC85B2ABBE8EF85320F54462EFCA6972A1D774E904DB62
                                        APIs
                                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F5D8D9
                                          • Part of subcall function 00EE79AB: _memmove.LIBCMT ref: 00EE79F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharLower_memmove
                                        • String ID: cdecl$none$stdcall$winapi
                                        • API String ID: 3425801089-567219261
                                        • Opcode ID: c55ba67395d7397c8a6a2cc885b74ff1b7ee3d937f4c251d9496bd8c0baf1aee
                                        • Instruction ID: 1ab95692ba54e05386282a8d577b0c555c4e8a69efea5aa01254dc296a060000
                                        • Opcode Fuzzy Hash: c55ba67395d7397c8a6a2cc885b74ff1b7ee3d937f4c251d9496bd8c0baf1aee
                                        • Instruction Fuzzy Hash: 8631A371904619AFDF10EF55CC919EEB3B4FF05320F10862AE965A76D1CB71AE09EB80
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F391D6
                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F391E9
                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F39219
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$_memmove$ClassName
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 365058703-1403004172
                                        • Opcode ID: ba7fc03852013a9b198ace40858a257ac058118ac7f0e18e5f6f35d8b4a0ba19
                                        • Instruction ID: 9056efbf6f2b09d60b513f187691227f71ba3fc3cfb0ad0b96ef3b56be8c6640
                                        • Opcode Fuzzy Hash: ba7fc03852013a9b198ace40858a257ac058118ac7f0e18e5f6f35d8b4a0ba19
                                        • Instruction Fuzzy Hash: CE21F6729081087ADB14AB75DC85DFFB7B8DF45370F104129F865A72E0DBB94D4AB620
                                        APIs
                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F51962
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F51988
                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F519B8
                                        • InternetCloseHandle.WININET(00000000), ref: 00F519FF
                                          • Part of subcall function 00F52599: GetLastError.KERNEL32(?,?,00F5192D,00000000,00000000,00000001), ref: 00F525AE
                                          • Part of subcall function 00F52599: SetEvent.KERNEL32(?,?,00F5192D,00000000,00000000,00000001), ref: 00F525C3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                        • String ID:
                                        • API String ID: 3113390036-3916222277
                                        • Opcode ID: 3126fb2f18f7f40e7e3137d89f708425f35aa773f26de773187b6fb0b1a70197
                                        • Instruction ID: 2e81b254a14fcafe7ac66d4e30ba8fb8525288b8a58ddf82067942f58f9d854e
                                        • Opcode Fuzzy Hash: 3126fb2f18f7f40e7e3137d89f708425f35aa773f26de773187b6fb0b1a70197
                                        • Instruction Fuzzy Hash: F421C5B2500209BFEB119F60DC95FBF77ACFB49756F10021AFA0596140EB64AE09B7A1
                                        APIs
                                          • Part of subcall function 00EE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00EE1D73
                                          • Part of subcall function 00EE1D35: GetStockObject.GDI32(00000011), ref: 00EE1D87
                                          • Part of subcall function 00EE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE1D91
                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F66493
                                        • LoadLibraryW.KERNEL32(?), ref: 00F6649A
                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F664AF
                                        • DestroyWindow.USER32(?), ref: 00F664B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                        • String ID: SysAnimate32
                                        • API String ID: 4146253029-1011021900
                                        • Opcode ID: 4995f232b31cc8b51b013146d286ebedf6df1e95da69e06185f7f63a53443710
                                        • Instruction ID: 7b2c42fae09fb63878bf996ef4426b617f0b1612e9de15c6b04c7fb8f99ce88b
                                        • Opcode Fuzzy Hash: 4995f232b31cc8b51b013146d286ebedf6df1e95da69e06185f7f63a53443710
                                        • Instruction Fuzzy Hash: E6219D71A00209ABEF108E65EC80EBB37ADEF49374F108629FA14D2190CB72DC51B760
                                        APIs
                                        • GetStdHandle.KERNEL32(0000000C), ref: 00F46E65
                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F46E98
                                        • GetStdHandle.KERNEL32(0000000C), ref: 00F46EAA
                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00F46EE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateHandle$FilePipe
                                        • String ID: nul
                                        • API String ID: 4209266947-2873401336
                                        • Opcode ID: d405e8fad11e4eedc332eb5ba9d434e03c3cde910ecab00ba2b05f938ee4949e
                                        • Instruction ID: ac27f02beb572f18ff7b375f366d14aea73629d5817a05d7dd60550d40f8ce28
                                        • Opcode Fuzzy Hash: d405e8fad11e4eedc332eb5ba9d434e03c3cde910ecab00ba2b05f938ee4949e
                                        • Instruction Fuzzy Hash: EF21A179A00209ABDF209F29DC04A9A7FF4AF46731F204629FDA0D72D0DB709C54EB56
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 00F46F32
                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F46F64
                                        • GetStdHandle.KERNEL32(000000F6), ref: 00F46F75
                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00F46FAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateHandle$FilePipe
                                        • String ID: nul
                                        • API String ID: 4209266947-2873401336
                                        • Opcode ID: 1e09e41b19f0db0f7e498baa3181090a499345b062433d49f4cb0a6e95ec8385
                                        • Instruction ID: db13d2fc8d53bb20830da6314528b68860c769460cbcbd9f85d1c427d8d5446c
                                        • Opcode Fuzzy Hash: 1e09e41b19f0db0f7e498baa3181090a499345b062433d49f4cb0a6e95ec8385
                                        • Instruction Fuzzy Hash: A021B371A00305ABDB209F69AC04A997BF8AF56734F204659FCF0D72D0E7709889AB52
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 00F4ACDE
                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F4AD32
                                        • __swprintf.LIBCMT ref: 00F4AD4B
                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00F6F910), ref: 00F4AD89
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume__swprintf
                                        • String ID: %lu
                                        • API String ID: 3164766367-685833217
                                        • Opcode ID: 3322b00cfe204b560dfac2fde07009169feb62d14b3447df369b27e441b99526
                                        • Instruction ID: ddaada8a337a9d036569d0b1df17c11f0041066f63c84a1b79c699b87ae91a50
                                        • Opcode Fuzzy Hash: 3322b00cfe204b560dfac2fde07009169feb62d14b3447df369b27e441b99526
                                        • Instruction Fuzzy Hash: F7216031A0010DAFCB10DF65DD85EAE7BF8EF89714B004069F909AB252DA71EA45DB61
                                        APIs
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                          • Part of subcall function 00F3A15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00F3A179
                                          • Part of subcall function 00F3A15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3A18C
                                          • Part of subcall function 00F3A15C: GetCurrentThreadId.KERNEL32 ref: 00F3A193
                                          • Part of subcall function 00F3A15C: AttachThreadInput.USER32(00000000), ref: 00F3A19A
                                        • GetFocus.USER32 ref: 00F3A334
                                          • Part of subcall function 00F3A1A5: GetParent.USER32(?), ref: 00F3A1B3
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00F3A37D
                                        • EnumChildWindows.USER32(?,00F3A3F5), ref: 00F3A3A5
                                        • __swprintf.LIBCMT ref: 00F3A3BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                        • String ID: %s%d
                                        • API String ID: 1941087503-1110647743
                                        • Opcode ID: 5cc71319f13416af5457215a78abb06e5962603abcdcfd069da28c23be5d9bce
                                        • Instruction ID: 4a27dc76efbac2d3c9451a392da2d7c5d970ff42725c3ac3a14fc619b6b230ce
                                        • Opcode Fuzzy Hash: 5cc71319f13416af5457215a78abb06e5962603abcdcfd069da28c23be5d9bce
                                        • Instruction Fuzzy Hash: 3E11D6716002097BDF11BF61DC85FEA37BCEF45720F004075FD58AA252CA755949AB72
                                        APIs
                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F5ED1B
                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F5ED4B
                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00F5EE7E
                                        • CloseHandle.KERNEL32(?), ref: 00F5EEFF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                        • String ID:
                                        • API String ID: 2364364464-0
                                        • Opcode ID: 89a751c063be59049c3881814e75581688c8a83e607bb892df30a642a64924d8
                                        • Instruction ID: 7436dcbf059eab7b03d1b7b8df48de3d7e10ad2311baa0043045fb241a4b49d1
                                        • Opcode Fuzzy Hash: 89a751c063be59049c3881814e75581688c8a83e607bb892df30a642a64924d8
                                        • Instruction Fuzzy Hash: 868194B16043009FD724EF25DC86F2AB7E5AF48720F14881DF999EB392DB70AD048B51
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F60EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5FE38,?,?), ref: 00F60EBC
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F60188
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F601C7
                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F6020E
                                        • RegCloseKey.ADVAPI32(?,?), ref: 00F6023A
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F60247
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                        • String ID:
                                        • API String ID: 3440857362-0
                                        • Opcode ID: d79c480e8974e4dbc6ec7a58b8aac15882679c8766925b4f7dfabc9de5102eb9
                                        • Instruction ID: 5c4bf6afc50fa0f84df98caaa16111962220e823e08d53a33e640f694ff500c2
                                        • Opcode Fuzzy Hash: d79c480e8974e4dbc6ec7a58b8aac15882679c8766925b4f7dfabc9de5102eb9
                                        • Instruction Fuzzy Hash: A6515931208244AFD704EBA4DC85F6BB7E8FF88314F14892EF59997292DB70E904DB52
                                        APIs
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F5DA3B
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F5DABE
                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F5DADA
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F5DB1B
                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F5DB35
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F4793F,?,?,00000000), ref: 00EE5B8C
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F4793F,?,?,00000000,?,?), ref: 00EE5BB0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                        • String ID:
                                        • API String ID: 327935632-0
                                        • Opcode ID: 36a49215792ea397c4efc24f2acfb6f7c3921480dcc815acda10fe893854cd8b
                                        • Instruction ID: 12801b038c7a0925aec9235f376f32a77e7b3da32a04ba188a6a072c48132fdd
                                        • Opcode Fuzzy Hash: 36a49215792ea397c4efc24f2acfb6f7c3921480dcc815acda10fe893854cd8b
                                        • Instruction Fuzzy Hash: EB514A35A05209DFCB10EFA8C4849AEF7F5FF49324B158069E919AB312DB34ED49DB90
                                        APIs
                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F4E6AB
                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00F4E6D4
                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F4E713
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F4E738
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F4E740
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                        • String ID:
                                        • API String ID: 1389676194-0
                                        • Opcode ID: cf2a5141e9ca54412f55c58c00a1f2fd9dee903323c5634816e9f65436f89fc0
                                        • Instruction ID: 3f12bfe43be80bedb7c77658700f7458065741c22c00b654a304b700535b75b9
                                        • Opcode Fuzzy Hash: cf2a5141e9ca54412f55c58c00a1f2fd9dee903323c5634816e9f65436f89fc0
                                        • Instruction Fuzzy Hash: F5510A75A00209DFCB01EF65C981AADBBF5FF48314F1480A9E849AB362CB31ED11EB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f96dc5b9ad0832a8dd5779f64e840a27cd4d2e60e5b4bebb13ac2dd6e94de44
                                        • Instruction ID: 3bfff716d0f2e998fc6e4ac8a2aea47daef1b4a913f2e6308d06628924c26182
                                        • Opcode Fuzzy Hash: 3f96dc5b9ad0832a8dd5779f64e840a27cd4d2e60e5b4bebb13ac2dd6e94de44
                                        • Instruction Fuzzy Hash: 9841C136D00648AFDB10DF28CC45FA9BBA8EB0B360F150265E926B72E1C770AD41FE51
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 00EE2357
                                        • ScreenToClient.USER32(00FA57B0,?), ref: 00EE2374
                                        • GetAsyncKeyState.USER32(00000001), ref: 00EE2399
                                        • GetAsyncKeyState.USER32(00000002), ref: 00EE23A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AsyncState$ClientCursorScreen
                                        • String ID:
                                        • API String ID: 4210589936-0
                                        • Opcode ID: b40c89481a367325ea41e27706cbfbf787d8a7645473c1c4630e27149308c781
                                        • Instruction ID: 0ccba08e85ff3a5d734bcd78ef45a04ef9feb994e7392ceb9fb85a7094d5aaa7
                                        • Opcode Fuzzy Hash: b40c89481a367325ea41e27706cbfbf787d8a7645473c1c4630e27149308c781
                                        • Instruction Fuzzy Hash: D241B33594410AFBCF159F69CC44AEDBB78FB05324F20432AF929A22A1C7356D94EF91
                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F3673D
                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00F36789
                                        • TranslateMessage.USER32(?), ref: 00F367B2
                                        • DispatchMessageW.USER32(?), ref: 00F367BC
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F367CB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                                        • String ID:
                                        • API String ID: 2108273632-0
                                        • Opcode ID: 9d57049cc2808905a12b17859b8c00b507e29489dd2dfc4e7d804cdc8238acf9
                                        • Instruction ID: f35eb3a61b19bb93e52583c6a6e69b300d3ee6736aeec69f56dba33574687697
                                        • Opcode Fuzzy Hash: 9d57049cc2808905a12b17859b8c00b507e29489dd2dfc4e7d804cdc8238acf9
                                        • Instruction Fuzzy Hash: F631C671D0050ABFDB208F74DC44FB67BE8AF06738F548165E421D71A1EB65A449F750
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00F38CF2
                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00F38D9C
                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00F38DA4
                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00F38DB2
                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00F38DBA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessagePostSleep$RectWindow
                                        • String ID:
                                        • API String ID: 3382505437-0
                                        • Opcode ID: 32ffbb2494be061f4c4355ccaf59016b0210dded14bf618b3d475a81adaccc98
                                        • Instruction ID: 5dccbdf380b8b800f2b3d8bdfc43bcf934b94fae0df416d5e8b8b6a3f3b00eb7
                                        • Opcode Fuzzy Hash: 32ffbb2494be061f4c4355ccaf59016b0210dded14bf618b3d475a81adaccc98
                                        • Instruction Fuzzy Hash: DF31EE72900319EBDF00CF68ED4CA9E3BB5FB14365F104229F925EA2D1C7B49915EB90
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00F3B4C6
                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F3B4E3
                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F3B51B
                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F3B541
                                        • _wcsstr.LIBCMT ref: 00F3B54B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                        • String ID:
                                        • API String ID: 3902887630-0
                                        • Opcode ID: 2f0e15cd1640b2eda32c2ce1efbea5896a708fe7118eda32a39141a747c80621
                                        • Instruction ID: 58db0ee1561f2eee3d17a76352530f592d80f05c0a8b599807a1023dec33c054
                                        • Opcode Fuzzy Hash: 2f0e15cd1640b2eda32c2ce1efbea5896a708fe7118eda32a39141a747c80621
                                        • Instruction Fuzzy Hash: BE21C872604105BAEB259B39DC19B7B7B98DB45770F044039F905CA1A1EFA5DC40B7A0
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F6B1C6
                                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00F6B1EB
                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F6B203
                                        • GetSystemMetrics.USER32(00000004), ref: 00F6B22C
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00F50FA5,00000000), ref: 00F6B24A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Long$MetricsSystem
                                        • String ID:
                                        • API String ID: 2294984445-0
                                        • Opcode ID: b2940f0a0095afedc6f0a2d492e15ad431558611143bbe31ccff8a2b7e74bcae
                                        • Instruction ID: 7c2474c01b05b37fd6a0921c756697199253e2c4c5cd0fab9abf758f4bbcf780
                                        • Opcode Fuzzy Hash: b2940f0a0095afedc6f0a2d492e15ad431558611143bbe31ccff8a2b7e74bcae
                                        • Instruction Fuzzy Hash: 30216D72914619AFCB119F38DC18B6A37A4FB06731F154729F936D61E0E7309C94EB90
                                        APIs
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F395E2
                                          • Part of subcall function 00EE7D2C: _memmove.LIBCMT ref: 00EE7D66
                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F39614
                                        • __itow.LIBCMT ref: 00F3962C
                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F39654
                                        • __itow.LIBCMT ref: 00F39665
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$__itow$_memmove
                                        • String ID:
                                        • API String ID: 2983881199-0
                                        • Opcode ID: f37a0d2d1109c3e3fef18c36e923fbfc884d0efd9afd80c38ee1ce54437be3c0
                                        • Instruction ID: 242cda62bdfe946e69bfc491234f0812324bd0802d75ba55481c72a4b67e8d80
                                        • Opcode Fuzzy Hash: f37a0d2d1109c3e3fef18c36e923fbfc884d0efd9afd80c38ee1ce54437be3c0
                                        • Instruction Fuzzy Hash: 2921D731B09258BBDB10AB65DC8AEAE7BACDF59730F040029F904E7291D6F18D45A7A1
                                        APIs
                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE134D
                                        • SelectObject.GDI32(?,00000000), ref: 00EE135C
                                        • BeginPath.GDI32(?), ref: 00EE1373
                                        • SelectObject.GDI32(?,00000000), ref: 00EE139C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ObjectSelect$BeginCreatePath
                                        • String ID:
                                        • API String ID: 3225163088-0
                                        • Opcode ID: 3c604cb9e259366939a7dd6994b1271abf0087378a7d0f226406fc99c2546f22
                                        • Instruction ID: 90221f3574f52f7c645d85e29f3c64a0b9fbe39074591779c5d6944d6a9e707c
                                        • Opcode Fuzzy Hash: 3c604cb9e259366939a7dd6994b1271abf0087378a7d0f226406fc99c2546f22
                                        • Instruction Fuzzy Hash: E72159B080064CEBDB108F26EC087AD7BB8EB01B25F14426AE810A65B0D3B598D5EF90
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00F44B61
                                        • __beginthreadex.LIBCMT ref: 00F44B7F
                                        • MessageBoxW.USER32(?,?,?,?), ref: 00F44B94
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F44BAA
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F44BB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                        • String ID:
                                        • API String ID: 3824534824-0
                                        • Opcode ID: c7a4752acddab44ec055d9bd926690a787f19a2c5aaad81dd230935bdfdb141d
                                        • Instruction ID: f392f7b185cb410b86a315c883904bb52e89e6b91edcfca3b8f1c38f2147258f
                                        • Opcode Fuzzy Hash: c7a4752acddab44ec055d9bd926690a787f19a2c5aaad81dd230935bdfdb141d
                                        • Instruction Fuzzy Hash: 641108B690564CBBCB019BA8DC04B9A7FECEB46320F144269FC24E3251D6B1D904A7A1
                                        APIs
                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F38546
                                        • GetLastError.KERNEL32(?,00F3800A,?,?,?), ref: 00F38550
                                        • GetProcessHeap.KERNEL32(00000008,?,?,00F3800A,?,?,?), ref: 00F3855F
                                        • HeapAlloc.KERNEL32(00000000,?,00F3800A,?,?,?), ref: 00F38566
                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3857D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 842720411-0
                                        • Opcode ID: 73f29324f5f3e2803e5a9a1966761fb4f1cc77df4ed97d39a01ffeb903d1f987
                                        • Instruction ID: 84377f23c0e59629d14d4fecb96a59ea9e1db148b27b3033475b428d775717ba
                                        • Opcode Fuzzy Hash: 73f29324f5f3e2803e5a9a1966761fb4f1cc77df4ed97d39a01ffeb903d1f987
                                        • Instruction Fuzzy Hash: 60016271700208FFDB114FA6EC48D6B7F6CFF463B5B140529F819C2220DA728D15EA60
                                        APIs
                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F45307
                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F45315
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F4531D
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F45327
                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F45363
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                        • String ID:
                                        • API String ID: 2833360925-0
                                        • Opcode ID: d4e23d14105960d2e68ea089ceee0dea6f6108eb0686afc0d62ef066a7dce5a5
                                        • Instruction ID: 9aed45f3840a7172e4b1a92e2e907f37a31fcc5bb5a4428fc4f5b4be94b12bce
                                        • Opcode Fuzzy Hash: d4e23d14105960d2e68ea089ceee0dea6f6108eb0686afc0d62ef066a7dce5a5
                                        • Instruction Fuzzy Hash: 8D016D32C01A1DDBDF10EFA4EC886EDBB79FB09B51F05045AE851F2241CBB09554A7A1
                                        APIs
                                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?,?,00F3777D), ref: 00F3744F
                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?), ref: 00F3746A
                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?), ref: 00F37478
                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?), ref: 00F37488
                                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F3736C,80070057,?,?), ref: 00F37494
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                        • String ID:
                                        • API String ID: 3897988419-0
                                        • Opcode ID: 1c7d044f751ab1da388070f0e149a8111913fcad405c0c7e198a92b80e58c8b8
                                        • Instruction ID: e80ec9ebfe2fb55ac0ffe5ec9a06ba43f58c26203dae3f6d53c153c72687e2c2
                                        • Opcode Fuzzy Hash: 1c7d044f751ab1da388070f0e149a8111913fcad405c0c7e198a92b80e58c8b8
                                        • Instruction Fuzzy Hash: 8B015EB2605308FBDB20AF64EC44AAA7FADEB45762F144064F908D2220D771ED44AAA0
                                        APIs
                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F383E8
                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F383F2
                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F38401
                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F38408
                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F3841E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 44706859-0
                                        • Opcode ID: 47bb84bbc3aaab419376c99d1d870ec7df56c5d81939e59537e6141d3bdb7594
                                        • Instruction ID: 02201f77ad1bef8cd4ce22b34935a9b14a2e37bfcd75b6d5d39fa38cdc5ac4cb
                                        • Opcode Fuzzy Hash: 47bb84bbc3aaab419376c99d1d870ec7df56c5d81939e59537e6141d3bdb7594
                                        • Instruction Fuzzy Hash: B6F04431604309BFD7105F65EC89EA73BACEF8A7A4F000425F955C6150CAA59C45FA60
                                        APIs
                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F38449
                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F38453
                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F38462
                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F38469
                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3847F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 44706859-0
                                        • Opcode ID: c91c81c7b324bb153dff5d7a46231b4cbbd7cc1856d95a04082ef6dac8260f3e
                                        • Instruction ID: 4a893675a5fadf8892e000ae54e9aaf128970ac925dc1e8aca5851134f99b370
                                        • Opcode Fuzzy Hash: c91c81c7b324bb153dff5d7a46231b4cbbd7cc1856d95a04082ef6dac8260f3e
                                        • Instruction Fuzzy Hash: 62F04F31200309BFEB115FA5EC88E673BACEF4A7A4F044125F955C7150CAA69945FA60
                                        APIs
                                        • GetDlgItem.USER32(?,000003E9), ref: 00F3C4B9
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F3C4D0
                                        • MessageBeep.USER32(00000000), ref: 00F3C4E8
                                        • KillTimer.USER32(?,0000040A), ref: 00F3C504
                                        • EndDialog.USER32(?,00000001), ref: 00F3C51E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                        • String ID:
                                        • API String ID: 3741023627-0
                                        • Opcode ID: 080c84671c259ae426bdb46edd63be870ae17cf237bf4eeb20796dbaf1cc9db0
                                        • Instruction ID: 5614543aad6e3d276f117a9e297f7f3e6a0dac3c27fcb3be3c4926a231e319ab
                                        • Opcode Fuzzy Hash: 080c84671c259ae426bdb46edd63be870ae17cf237bf4eeb20796dbaf1cc9db0
                                        • Instruction Fuzzy Hash: 31018630900708ABEB209B24ED4EFA677B8FF00716F040669F593B10E1DBF16958AB91
                                        APIs
                                        • EndPath.GDI32(?), ref: 00EE13BF
                                        • StrokeAndFillPath.GDI32(?,?,00F1BA08,00000000,?), ref: 00EE13DB
                                        • SelectObject.GDI32(?,00000000), ref: 00EE13EE
                                        • DeleteObject.GDI32 ref: 00EE1401
                                        • StrokePath.GDI32(?), ref: 00EE141C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                        • String ID:
                                        • API String ID: 2625713937-0
                                        • Opcode ID: 6b2b75bef23842834cd8bb3fca12c1a6ad6e06dc2d31cf6668d0669dc40a4cda
                                        • Instruction ID: 24633e671e82a5bea2e13abe87ff4c13f480f48f7cd21559342bb26eeba5e676
                                        • Opcode Fuzzy Hash: 6b2b75bef23842834cd8bb3fca12c1a6ad6e06dc2d31cf6668d0669dc40a4cda
                                        • Instruction Fuzzy Hash: 46F0EC70004B4CEBDB115F66EC4C7583FA4AB02B26F089264E43A595F2C7794999EF51
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 00F4C4BE
                                        • CoCreateInstance.OLE32(00F72D6C,00000000,00000001,00F72BDC,?), ref: 00F4C4D6
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        • CoUninitialize.OLE32 ref: 00F4C743
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                        • String ID: .lnk
                                        • API String ID: 2683427295-24824748
                                        • Opcode ID: 8eab746b51cbccf73382876c3a499057cddc2270045a8fdadbd20175baa56c9c
                                        • Instruction ID: 460f939160cf505bffde325d3a5d2f835856a5ab89581145fc12915e0a3d0a9b
                                        • Opcode Fuzzy Hash: 8eab746b51cbccf73382876c3a499057cddc2270045a8fdadbd20175baa56c9c
                                        • Instruction Fuzzy Hash: B8A14D71104349AFD300EF64C891EABB7E8EF94304F00592DF55AA7192EB70EE49CB92
                                        APIs
                                          • Part of subcall function 00F00F36: std::exception::exception.LIBCMT ref: 00F00F6C
                                          • Part of subcall function 00F00F36: __CxxThrowException@8.LIBCMT ref: 00F00F81
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00EE7BB1: _memmove.LIBCMT ref: 00EE7C0B
                                        • __swprintf.LIBCMT ref: 00EF302D
                                        Strings
                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00EF2EC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                        • API String ID: 1943609520-557222456
                                        • Opcode ID: c87cd04fdcfe60794d7c7b9cacf525650075bfb4fef4eb0918f5a51ceef1022a
                                        • Instruction ID: e9265f8ab60835691342656419603893124cee2c6df4300198fd757de2f17065
                                        • Opcode Fuzzy Hash: c87cd04fdcfe60794d7c7b9cacf525650075bfb4fef4eb0918f5a51ceef1022a
                                        • Instruction Fuzzy Hash: 5E918B725086499FC714EF24D895D7EB7E4EF85310F00592EF586AB2A2EF20EE04DB52
                                        APIs
                                          • Part of subcall function 00EE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EE48A1,?,?,00EE37C0,?), ref: 00EE48CE
                                        • CoInitialize.OLE32(00000000), ref: 00F4BA47
                                        • CoCreateInstance.OLE32(00F72D6C,00000000,00000001,00F72BDC,?), ref: 00F4BA60
                                        • CoUninitialize.OLE32 ref: 00F4BA7D
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                        • String ID: .lnk
                                        • API String ID: 2126378814-24824748
                                        • Opcode ID: 294a381c6e39576a267bd310f60facdd17795d0fcd59a1b8231e80339d206a14
                                        • Instruction ID: 466097e37f8033e26e53b5fd4a13125db8bea2caa7d714b27ceb4055b6efad40
                                        • Opcode Fuzzy Hash: 294a381c6e39576a267bd310f60facdd17795d0fcd59a1b8231e80339d206a14
                                        • Instruction Fuzzy Hash: 73A158756043459FCB10DF15C494D1ABBE5FF88324F148998F899AB3A2CB31ED45CB92
                                        APIs
                                        • __startOneArgErrorHandling.LIBCMT ref: 00F0521D
                                          • Part of subcall function 00F10270: __87except.LIBCMT ref: 00F102AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorHandling__87except__start
                                        • String ID: pow
                                        • API String ID: 2905807303-2276729525
                                        • Opcode ID: b2d2c41bf05d68e867a799b71b9e6cdf66924c16044098320f086849111d4402
                                        • Instruction ID: fa171c19fb8f163317912b601fe2c3f5e9fcb902f74a6a86cedd105d46b8394c
                                        • Opcode Fuzzy Hash: b2d2c41bf05d68e867a799b71b9e6cdf66924c16044098320f086849111d4402
                                        • Instruction Fuzzy Hash: 39512371E1C60597DB11B714CD413AB3B94AF40B60F248958F0A5862E9EEF88DC8BE46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #$+
                                        • API String ID: 0-2552117581
                                        • Opcode ID: 80ac67d65af6e8a2e3827790602e5b15bf466c340444f1ffe90c3377ff214af6
                                        • Instruction ID: 9185fa920b44877ce6f89b217afcc199ffb0add4faa63ad91bbb428413bccb2a
                                        • Opcode Fuzzy Hash: 80ac67d65af6e8a2e3827790602e5b15bf466c340444f1ffe90c3377ff214af6
                                        • Instruction Fuzzy Hash: 0C51333590428A9FCF25DF28C884BFAB7A4EF95730F144055EC919B2E0CB349C42E760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove$_free
                                        • String ID: Oa
                                        • API String ID: 2620147621-3945284152
                                        • Opcode ID: c3d169a4a0cfcf37673b2b133a6143c03f6ce097424d7a3da9684a38108b0890
                                        • Instruction ID: 4d4276afa23b438feb1d7fa9d07e942ffe5ccf9cf9f15f7609193cda437cac80
                                        • Opcode Fuzzy Hash: c3d169a4a0cfcf37673b2b133a6143c03f6ce097424d7a3da9684a38108b0890
                                        • Instruction Fuzzy Hash: E5515AB1A083059FDB24CF28D881B2ABBE1FF85314F45592DEA89D7351DB31DA01DB52
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memset$_memmove
                                        • String ID: ERCP
                                        • API String ID: 2532777613-1384759551
                                        • Opcode ID: 54d59984f8e851a8efb2d7053453c743d134e79f0d688e86ef73a0ff43cf303b
                                        • Instruction ID: 5bcf0ca71c5d2f67f49a916654b00d7918bf9c265e81f75aaf8500c50f28b4c4
                                        • Opcode Fuzzy Hash: 54d59984f8e851a8efb2d7053453c743d134e79f0d688e86ef73a0ff43cf303b
                                        • Instruction Fuzzy Hash: F551D171900309DBDB24DF65C8817BAB7F4FF44318F20856EE95ADB281E770AA84DB90
                                        APIs
                                          • Part of subcall function 00F417ED: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F39558,?,?,00000034,00000800,?,00000034), ref: 00F41817
                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F39B01
                                          • Part of subcall function 00F417B8: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F39587,?,?,00000800,?,00001073,00000000,?,?), ref: 00F417E2
                                          • Part of subcall function 00F4170F: GetWindowThreadProcessId.USER32(?,?), ref: 00F4173A
                                          • Part of subcall function 00F4170F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F3951C,00000034,?,?,00001004,00000000,00000000), ref: 00F4174A
                                          • Part of subcall function 00F4170F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F3951C,00000034,?,?,00001004,00000000,00000000), ref: 00F41760
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F39B6E
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F39BBB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                        • String ID: @
                                        • API String ID: 4150878124-2766056989
                                        • Opcode ID: a5faa42a7381d3d38e6caf47e41f62ebfdc949c089b9f07fd7ee7302dacf19fe
                                        • Instruction ID: ea4f4b02c71fceeb07594a47adf49e3e54791fd176eb0d92614fa389ace2dd8d
                                        • Opcode Fuzzy Hash: a5faa42a7381d3d38e6caf47e41f62ebfdc949c089b9f07fd7ee7302dacf19fe
                                        • Instruction Fuzzy Hash: 42414D76D0021CAFDB10DFA4CC81ADEBBB8EB49310F104095FA55B7190DAB56E85DB60
                                        APIs
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F6F910,00000000,?,?,?,?), ref: 00F67A11
                                        • GetWindowLongW.USER32 ref: 00F67A2E
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F67A3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$Long
                                        • String ID: SysTreeView32
                                        • API String ID: 847901565-1698111956
                                        • Opcode ID: 328d76c44514eb2b027e0b94c39141496953bff9722a8e1540cdcd6e2c6ab74b
                                        • Instruction ID: 476c5cec96c4c01ac864f334fe0f4cdf8c404dffaf507ff4636971df94adf3df
                                        • Opcode Fuzzy Hash: 328d76c44514eb2b027e0b94c39141496953bff9722a8e1540cdcd6e2c6ab74b
                                        • Instruction Fuzzy Hash: 1031CF3160460AABDB119F78DC41BEA77A9EB45338F244725F875E32E0C735ED50AB50
                                        APIs
                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F67493
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F674A7
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F674CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window
                                        • String ID: SysMonthCal32
                                        • API String ID: 2326795674-1439706946
                                        • Opcode ID: 94f4cb0822d758e02e498c96dc091074ab2693dfdae4572e8770219a1b516985
                                        • Instruction ID: 818d263a1e2a3530ce45b13fca88edb1514cbc5d7fe9767a87a35bbf5133ea6e
                                        • Opcode Fuzzy Hash: 94f4cb0822d758e02e498c96dc091074ab2693dfdae4572e8770219a1b516985
                                        • Instruction Fuzzy Hash: 8621D132604219BBDF21DF94DC46FEA3B69EF48724F110214FE146B190DAB5A894EBA0
                                        APIs
                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F67C7C
                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F67C8A
                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F67C91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$DestroyWindow
                                        • String ID: msctls_updown32
                                        • API String ID: 4014797782-2298589950
                                        • Opcode ID: 5322dfc07ae6d84a31edec4f6cacec9783075a12717f7f29fdcd41d643f56e14
                                        • Instruction ID: 822b9483094dae33496fdcb3f47bdd050fec72ceda9853c668e966b7b07c9c69
                                        • Opcode Fuzzy Hash: 5322dfc07ae6d84a31edec4f6cacec9783075a12717f7f29fdcd41d643f56e14
                                        • Instruction Fuzzy Hash: 9B2162B5604209AFDB00DF14DC81DB737EDEF4A768B050559FA119B2A1CB71EC51EBA0
                                        APIs
                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F66D6D
                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F66D7D
                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F66DA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend$MoveWindow
                                        • String ID: Listbox
                                        • API String ID: 3315199576-2633736733
                                        • Opcode ID: fce9fe749d20ba0658c519689e85395962e259011824fd96bd1c7e83709bf4e9
                                        • Instruction ID: 4600456e2997eddb23d38563e45c0e57f0219a7e82898a50e52bb694984d17dd
                                        • Opcode Fuzzy Hash: fce9fe749d20ba0658c519689e85395962e259011824fd96bd1c7e83709bf4e9
                                        • Instruction Fuzzy Hash: 94218172B10118BFEF118F54DC85FBB3BAAEF89764F118128F915DB1A0C671AC51A7A0
                                        APIs
                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F677A4
                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F677B9
                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F677C6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: msctls_trackbar32
                                        • API String ID: 3850602802-1010561917
                                        • Opcode ID: bc412ea1907f43dff87396de46e169ee92cf6af017caf3e299a9b1497c63c06c
                                        • Instruction ID: 10e0d68f38251c47892419d47917f451d22076cca859af14926142338f49221e
                                        • Opcode Fuzzy Hash: bc412ea1907f43dff87396de46e169ee92cf6af017caf3e299a9b1497c63c06c
                                        • Instruction Fuzzy Hash: 7F11E772654308BAEF106F64CC45FE737A9EF89B28F010218F651A60E0D672E851EB20
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00EE4C2E), ref: 00EE4CA3
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00EE4CB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                        • API String ID: 2574300362-192647395
                                        • Opcode ID: 897dcc255c33e8aa7af93b964e80ceea64a60038bb351cb49af551146acbaf19
                                        • Instruction ID: c84f08e757e50614e0d55bcb61ebce6f252bec68d4c66d8819965372e85b0485
                                        • Opcode Fuzzy Hash: 897dcc255c33e8aa7af93b964e80ceea64a60038bb351cb49af551146acbaf19
                                        • Instruction Fuzzy Hash: 6DD05B7051072BCFD7209F31ED18606B6D5AF05799B31DC3ED895D7190E7B0D484D651
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00EE4CE1,?), ref: 00EE4DA2
                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00EE4DB4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-1355242751
                                        • Opcode ID: 594ab8d621418a7c5a42a7a2100f2c1657a6d86fb33a018180000185027d5fae
                                        • Instruction ID: 8dba433dd6f0b2f0a26cc0d80102a463b3362edc21d68941066961f466dae18f
                                        • Opcode Fuzzy Hash: 594ab8d621418a7c5a42a7a2100f2c1657a6d86fb33a018180000185027d5fae
                                        • Instruction Fuzzy Hash: 86D0C770900717CFDB208F32EC08A8272E4AF0238CB11883AD8D2E61A0E7B0C880DA10
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00EE4D2E,?,00EE4F4F,?,00FA52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00EE4D6F
                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00EE4D81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-3689287502
                                        • Opcode ID: 3174f3e9defe903a132f868efed0a5e414511c2749afe180a0ea7033f711de4d
                                        • Instruction ID: 8492355481c4df14e8ce8c55c94fba2de96035a4b8d42bc6076ff107e4b6f070
                                        • Opcode Fuzzy Hash: 3174f3e9defe903a132f868efed0a5e414511c2749afe180a0ea7033f711de4d
                                        • Instruction Fuzzy Hash: 14D02E70900717CFDB208F32EC0824672E8BF0A38AB01C83ED492E26A0E7B0C880DB11
                                        APIs
                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00F610C1), ref: 00F60E80
                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F60E92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                        • API String ID: 2574300362-4033151799
                                        • Opcode ID: fc8dc6284367dc514c9f27cd652a086bb26ace75365fd2a6038df1b1f6b24de6
                                        • Instruction ID: 3fa53fd7cf428aa2395981537321456fc90e68e5cb4013002757b9c56ad75297
                                        • Opcode Fuzzy Hash: fc8dc6284367dc514c9f27cd652a086bb26ace75365fd2a6038df1b1f6b24de6
                                        • Instruction Fuzzy Hash: E5D01270910723CFE7205F35D90854776D4AF15391B168C3EE495D2150DAB0C480E651
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00F58E09,?,00F6F910), ref: 00F59203
                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F59215
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetModuleHandleExW$kernel32.dll
                                        • API String ID: 2574300362-199464113
                                        • Opcode ID: 56424c31a248a8a535cba6b1b79939240544361aa46716025a292ed5eb48ed5c
                                        • Instruction ID: de8714ccbf310d54c06d6a97927973384fa76ee6ef029917df16ca089e12aecb
                                        • Opcode Fuzzy Hash: 56424c31a248a8a535cba6b1b79939240544361aa46716025a292ed5eb48ed5c
                                        • Instruction Fuzzy Hash: 21D01730958717DFDB209F31ED0860676E5AF063AAF11883AD996D6590EBB0C888EA51
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LocalTime__swprintf
                                        • String ID: %.3d$WIN_XPe
                                        • API String ID: 2070861257-2409531811
                                        • Opcode ID: 55e1a77f67dc40485027208f8fb44383dfdb318322ebf84c2777c7d9281f31d0
                                        • Instruction ID: 6ba6933429723d25bee5903e2824d98c22011d05b318096c4529435fd7283a4c
                                        • Opcode Fuzzy Hash: 55e1a77f67dc40485027208f8fb44383dfdb318322ebf84c2777c7d9281f31d0
                                        • Instruction Fuzzy Hash: A1D0127380912DEACB149BD1AC85AFE737CF718300F145052F402E1040E269CB84FE29
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fcd28ed7a5227497791821d0dab9fc95158a798503f5c951c80e22840e54eddf
                                        • Instruction ID: 8c0bd2bf865eda573919839b754dfdccc460f88b9d64c4b7131bc367a446b17f
                                        • Opcode Fuzzy Hash: fcd28ed7a5227497791821d0dab9fc95158a798503f5c951c80e22840e54eddf
                                        • Instruction Fuzzy Hash: C8C17EB5A04216EFCB24DF98C894EAEB7B5FF48724F144598E805EB251D730ED81EB90
                                        APIs
                                        • CharLowerBuffW.USER32(?,?), ref: 00F5E1D2
                                        • CharLowerBuffW.USER32(?,?), ref: 00F5E215
                                          • Part of subcall function 00F5D8B9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F5D8D9
                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00F5E415
                                        • _memmove.LIBCMT ref: 00F5E428
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                        • String ID:
                                        • API String ID: 3659485706-0
                                        • Opcode ID: 484dbfd3d507e46bfd14bc11e553070ea282caaa0609265a5d31508b87b5475f
                                        • Instruction ID: 822998a0571963c084507ee66f545faf123d1e6dae6c5f0352b676d55f2407a6
                                        • Opcode Fuzzy Hash: 484dbfd3d507e46bfd14bc11e553070ea282caaa0609265a5d31508b87b5475f
                                        • Instruction Fuzzy Hash: 94C16C71A083419FC714DF24C480A6ABBE4FF88314F14896DF9999B352D731EA49DB82
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 00F581D8
                                        • CoUninitialize.OLE32 ref: 00F581E3
                                          • Part of subcall function 00F3D87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F3D8E3
                                        • VariantInit.OLEAUT32(?), ref: 00F581EE
                                        • VariantClear.OLEAUT32(?), ref: 00F584BF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                        • String ID:
                                        • API String ID: 780911581-0
                                        • Opcode ID: 657c5fa595e1465b845d4a4aff7913fb32e870400a889a379becd2f31d960209
                                        • Instruction ID: faf06bb0387eef7ae0542fa372b574ad1762b835bbafc8a0cd0a0b1c0133cb56
                                        • Opcode Fuzzy Hash: 657c5fa595e1465b845d4a4aff7913fb32e870400a889a379becd2f31d960209
                                        • Instruction Fuzzy Hash: 25A16B756047459FCB10DF15C881B2ABBE4BF88361F14845CFA9AAB3A2CB34ED09DB41
                                        APIs
                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F72C7C,?), ref: 00F37A12
                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F72C7C,?), ref: 00F37A2A
                                        • CLSIDFromProgID.OLE32(?,?,00000000,00F6FB80,000000FF,?,00000000,00000800,00000000,?,00F72C7C,?), ref: 00F37A4F
                                        • _memcmp.LIBCMT ref: 00F37A70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FromProg$FreeTask_memcmp
                                        • String ID:
                                        • API String ID: 314563124-0
                                        • Opcode ID: dbecbc4f63dae8c656f3e4b8e1e11a3d5120fc0562fbeb1e2cb8ccb7a7708310
                                        • Instruction ID: f4aea7897d63813395736295c669f3acb084d50cadaee7addb59367066f50478
                                        • Opcode Fuzzy Hash: dbecbc4f63dae8c656f3e4b8e1e11a3d5120fc0562fbeb1e2cb8ccb7a7708310
                                        • Instruction Fuzzy Hash: B5812C71A00209EFCF14DF94C984EEEB7B9FF89325F204199E515AB260DB71AE05DB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Variant$AllocClearCopyInitString
                                        • String ID:
                                        • API String ID: 2808897238-0
                                        • Opcode ID: c192e2d96cc7c3c7e1a049938e182e5e580e5650d55334cc738b3ebc387e6c96
                                        • Instruction ID: f7b5993a74dce61d3de4681287b96414365752ed78d67d857461aacbb1cc79ab
                                        • Opcode Fuzzy Hash: c192e2d96cc7c3c7e1a049938e182e5e580e5650d55334cc738b3ebc387e6c96
                                        • Instruction Fuzzy Hash: EE51C331704306BBDB20AF65D891B29F3E5EF48330F20D82FE596DB691DB748880AB15
                                        APIs
                                        • GetWindowRect.USER32(0157E888,?), ref: 00F69895
                                        • ScreenToClient.USER32(00000002,00000002), ref: 00F698C8
                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00F69935
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$ClientMoveRectScreen
                                        • String ID:
                                        • API String ID: 3880355969-0
                                        • Opcode ID: 5cdf2f7cef58bcf66c3ffe0f929187885bac15c08de15e5c9b9601531ec8ec59
                                        • Instruction ID: 96e91273819bb2e4f6a17961961de595b0ee8f1ed73e215831894a21cf7161e7
                                        • Opcode Fuzzy Hash: 5cdf2f7cef58bcf66c3ffe0f929187885bac15c08de15e5c9b9601531ec8ec59
                                        • Instruction Fuzzy Hash: 23518134A04208EFCF10DF64D9809AE7BB9FF85330F148159F8659B2A1D771AD41EB90
                                        APIs
                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00F56AE7
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56AF7
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F56B5B
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F56B67
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ErrorLast$__itow__swprintfsocket
                                        • String ID:
                                        • API String ID: 2214342067-0
                                        • Opcode ID: c3cfdb7cc428b16a02c01f33b5a5ad206304c0d836219ec25fa7ae5723d3c5ad
                                        • Instruction ID: ee5cdecfd4c7a3c3d543938a11941dd51445f4d4dcf3141a11ddf44de5ed6618
                                        • Opcode Fuzzy Hash: c3cfdb7cc428b16a02c01f33b5a5ad206304c0d836219ec25fa7ae5723d3c5ad
                                        • Instruction Fuzzy Hash: E841B475740204AFEB20AF25DC86F3A77E9AF44B20F448058FA59EB3D3DA709C019791
                                        APIs
                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00F6F910), ref: 00F565BD
                                        • _strlen.LIBCMT ref: 00F565EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _strlen
                                        • String ID:
                                        • API String ID: 4218353326-0
                                        • Opcode ID: 6ed4fc670d5f182582979a01589f2bb4f9c228403bc6e54c4f4e316548bb67b3
                                        • Instruction ID: 03106639abcc247f74f88c94a97033c4f446e4be483c90b74a2c7e2f59075519
                                        • Opcode Fuzzy Hash: 6ed4fc670d5f182582979a01589f2bb4f9c228403bc6e54c4f4e316548bb67b3
                                        • Instruction Fuzzy Hash: DA41B631900108ABCB14EB65EDD1FAEB3E9EF44314F548155F929EB292DF30AD04EB51
                                        APIs
                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F4B92A
                                        • GetLastError.KERNEL32(?,00000000), ref: 00F4B950
                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F4B975
                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F4B9A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                        • String ID:
                                        • API String ID: 3321077145-0
                                        • Opcode ID: 7d42c1bd40eddb11346978e253c50719f123145238eef630aed80e9c6ad3f5cb
                                        • Instruction ID: 9a90ba4a87caf105f888960ef864db30ad82bf4ec93eaef866c9c2a27e78be24
                                        • Opcode Fuzzy Hash: 7d42c1bd40eddb11346978e253c50719f123145238eef630aed80e9c6ad3f5cb
                                        • Instruction Fuzzy Hash: 2B413839600658DFCB10EF16C484A19BBF1EF89320B199098ED5AAB363CB35FD00DB91
                                        APIs
                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F68910
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InvalidateRect
                                        • String ID:
                                        • API String ID: 634782764-0
                                        • Opcode ID: de822283e8c9b9f450cc2e88af067bf76d7f1d21163e2b361aaa3386951cdfe3
                                        • Instruction ID: b1d66880bd65929fad06810985cc4325111771b0b3d60509f6fba81e767e354e
                                        • Opcode Fuzzy Hash: de822283e8c9b9f450cc2e88af067bf76d7f1d21163e2b361aaa3386951cdfe3
                                        • Instruction Fuzzy Hash: D831D230A01108BFEF209E64DC45BBD37A5EB06BA0F544619FA51E72E1CF319982FA52
                                        APIs
                                        • ClientToScreen.USER32(?,?), ref: 00F6AB92
                                        • GetWindowRect.USER32(?,?), ref: 00F6AC08
                                        • PtInRect.USER32(?,?,00F6C07E), ref: 00F6AC18
                                        • MessageBeep.USER32(00000000), ref: 00F6AC89
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Rect$BeepClientMessageScreenWindow
                                        • String ID:
                                        • API String ID: 1352109105-0
                                        • Opcode ID: afa88980d26d427df085e0e6be7cfbff426e1e911ff17b137ea96fda1852a30e
                                        • Instruction ID: 6eed84b34574e1cbc10c3beaf23402037fed6d36ea6210ffd14a882be2fdb0ff
                                        • Opcode Fuzzy Hash: afa88980d26d427df085e0e6be7cfbff426e1e911ff17b137ea96fda1852a30e
                                        • Instruction Fuzzy Hash: 65419E70A00219DFCF11CF58C884B697BF5FF49710F1880A9E824AB261D735E815EF92
                                        APIs
                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00F40E58
                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00F40E74
                                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00F40EDA
                                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00F40F2C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: KeyboardState$InputMessagePostSend
                                        • String ID:
                                        • API String ID: 432972143-0
                                        • Opcode ID: 807f47c9d6d87591acb26c2073b52ba3510ec3315d17981b1b157a46cf4b5a06
                                        • Instruction ID: 8058f181b879651ae8c9656f8a4087e92f38dac5c016a851140c8f888405f4ee
                                        • Opcode Fuzzy Hash: 807f47c9d6d87591acb26c2073b52ba3510ec3315d17981b1b157a46cf4b5a06
                                        • Instruction Fuzzy Hash: BD313731D4420CAEFB308A248C05BFA7F65EB48330F18461AFA91521D2CBB58DA5B795
                                        APIs
                                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00F40F97
                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F40FB3
                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F41012
                                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00F41064
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: KeyboardState$InputMessagePostSend
                                        • String ID:
                                        • API String ID: 432972143-0
                                        • Opcode ID: 9a1b24b69e33a4ce32ce7e7a732d261c2d448cdfc893ea37cb076871a6b67e2a
                                        • Instruction ID: 3dba803747dbc43a94f277e722db646ca1af3c6385c5c4b645653e248ef4b225
                                        • Opcode Fuzzy Hash: 9a1b24b69e33a4ce32ce7e7a732d261c2d448cdfc893ea37cb076871a6b67e2a
                                        • Instruction Fuzzy Hash: BF313A30D40688DEFF348A299C08BFABF65BB45331F08421AEC95521D1C7798DD5B7A1
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F1637B
                                        • __isleadbyte_l.LIBCMT ref: 00F163A9
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F163D7
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F1640D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: c0f91bb3f94766fc962e415d76e1dda973fdbc2a4aea645f6a422391c9719a47
                                        • Instruction ID: 834f8601d64b46204e91465d1447728f2e6d02b483b84efbed2bd76ff19dada7
                                        • Opcode Fuzzy Hash: c0f91bb3f94766fc962e415d76e1dda973fdbc2a4aea645f6a422391c9719a47
                                        • Instruction Fuzzy Hash: 8B318E31A00246AFDB21CF65CC44BBA7BA9FF41360F154129E865C7291E731E990FBA0
                                        APIs
                                        • GetForegroundWindow.USER32 ref: 00F64F6B
                                          • Part of subcall function 00F43685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F4369F
                                          • Part of subcall function 00F43685: GetCurrentThreadId.KERNEL32 ref: 00F436A6
                                          • Part of subcall function 00F43685: AttachThreadInput.USER32(00000000,?,00F450AC), ref: 00F436AD
                                        • GetCaretPos.USER32(?), ref: 00F64F7C
                                        • ClientToScreen.USER32(00000000,?), ref: 00F64FB7
                                        • GetForegroundWindow.USER32 ref: 00F64FBD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                        • String ID:
                                        • API String ID: 2759813231-0
                                        • Opcode ID: e22bd7f9fcda8fd367279e164e61d95a254cb46493941e71a6c7827d6f41c98c
                                        • Instruction ID: 9917128d84a837c4f5fbd7491461356e6a1c8012fe572ad051dd7a2f3d8f991a
                                        • Opcode Fuzzy Hash: e22bd7f9fcda8fd367279e164e61d95a254cb46493941e71a6c7827d6f41c98c
                                        • Instruction Fuzzy Hash: AB312FB2900108AFDB00EFA5CC859EFB7F9EF88300F11506AE515E7242EA759E05CBA0
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • GetCursorPos.USER32(?), ref: 00F6C53C
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F1BB2B,?,?,?,?,?), ref: 00F6C551
                                        • GetCursorPos.USER32(?), ref: 00F6C59E
                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F1BB2B,?,?,?), ref: 00F6C5D8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                        • String ID:
                                        • API String ID: 2864067406-0
                                        • Opcode ID: babc8a47f7f024e1155febbb5634783b926287327c7664dc9bc7432db8d6ce13
                                        • Instruction ID: 8b59fa7b8755c0ba1ec75e8bc9be192108437d3e932ce67ccce82b9b391ab22d
                                        • Opcode Fuzzy Hash: babc8a47f7f024e1155febbb5634783b926287327c7664dc9bc7432db8d6ce13
                                        • Instruction Fuzzy Hash: F9319376600458AFCB158F54CC58EBA7BF9EB49720F48406AF9868B261D731AD50EBA0
                                        APIs
                                          • Part of subcall function 00F38432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F38449
                                          • Part of subcall function 00F38432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F38453
                                          • Part of subcall function 00F38432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F38462
                                          • Part of subcall function 00F38432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F38469
                                          • Part of subcall function 00F38432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3847F
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F389CB
                                        • _memcmp.LIBCMT ref: 00F389EE
                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F38A24
                                        • HeapFree.KERNEL32(00000000), ref: 00F38A2B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                        • String ID:
                                        • API String ID: 1592001646-0
                                        • Opcode ID: d53fd2c05d3423898f9bc2072940e138d7d6f6fc100632f598104afe89d8f394
                                        • Instruction ID: 77bfbe773aa1354d0c78cf05d093c3d7329d2f7f9caa4eeecf3c8aad0245e486
                                        • Opcode Fuzzy Hash: d53fd2c05d3423898f9bc2072940e138d7d6f6fc100632f598104afe89d8f394
                                        • Instruction Fuzzy Hash: 2A219A31E41209FFCF10CFA4C945BEEBBB8EF403A1F04405AE854A7240DB78AA06EB51
                                        APIs
                                        • __setmode.LIBCMT ref: 00F00B2E
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F4793F,?,?,00000000), ref: 00EE5B8C
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F4793F,?,?,00000000,?,?), ref: 00EE5BB0
                                        • _fprintf.LIBCMT ref: 00F00B65
                                        • OutputDebugStringW.KERNEL32(?), ref: 00F36111
                                          • Part of subcall function 00F04C1A: _flsall.LIBCMT ref: 00F04C33
                                        • __setmode.LIBCMT ref: 00F00B9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                        • String ID:
                                        • API String ID: 521402451-0
                                        • Opcode ID: 46e76c8fc2a9a44ea7862d2223c02427dce851e7d5333b0b61927c70805f1d42
                                        • Instruction ID: 679b6947446812b22a58e7300356f868e19663289c137cbe25de7b925070cb15
                                        • Opcode Fuzzy Hash: 46e76c8fc2a9a44ea7862d2223c02427dce851e7d5333b0b61927c70805f1d42
                                        • Instruction Fuzzy Hash: 5C1150B29045087EDB0477B49C43EBD7BAD9F81320F14412AF218A71D2EE6558457795
                                        APIs
                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F518B9
                                          • Part of subcall function 00F51943: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F51962
                                          • Part of subcall function 00F51943: InternetCloseHandle.WININET(00000000), ref: 00F519FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Internet$CloseConnectHandleOpen
                                        • String ID:
                                        • API String ID: 1463438336-0
                                        • Opcode ID: 038ee64889fa3471cb9b4f06adeadb2059353fef44149983cea70ac551a6e9d7
                                        • Instruction ID: 74704760e221411b07cf7fccd8bc6a965690feb3d780928e86833d0f96d2abea
                                        • Opcode Fuzzy Hash: 038ee64889fa3471cb9b4f06adeadb2059353fef44149983cea70ac551a6e9d7
                                        • Instruction Fuzzy Hash: 13210132200A05BFEB119F608C10F7ABBA9FF49712F00002AFF2196250DB71E819B790
                                        APIs
                                        • GetFileAttributesW.KERNEL32(?,00F6FAC0), ref: 00F43AA8
                                        • GetLastError.KERNEL32 ref: 00F43AB7
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F43AC6
                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F6FAC0), ref: 00F43B23
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                        • String ID:
                                        • API String ID: 2267087916-0
                                        • Opcode ID: cb613b01d9ce2b910cd3efa9386a0a68a9ee22cb50eedc441e9ef540f2d36d9e
                                        • Instruction ID: dbe05dcd24c27bb06c2efb3ae20591095b8bcdc123f9b127c11d4895be58d11f
                                        • Opcode Fuzzy Hash: cb613b01d9ce2b910cd3efa9386a0a68a9ee22cb50eedc441e9ef540f2d36d9e
                                        • Instruction Fuzzy Hash: 6C21A3759083059F8300DF29D88195FBBE8EF55764F144A2EF8A9C72A1D730DE49DB82
                                        APIs
                                        • _free.LIBCMT ref: 00F15281
                                          • Part of subcall function 00F0588C: __FF_MSGBANNER.LIBCMT ref: 00F058A3
                                          • Part of subcall function 00F0588C: __NMSG_WRITE.LIBCMT ref: 00F058AA
                                          • Part of subcall function 00F0588C: RtlAllocateHeap.NTDLL(01560000,00000000,00000001,00000000,?,?,?,00F00F53,?), ref: 00F058CF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: AllocateHeap_free
                                        • String ID:
                                        • API String ID: 614378929-0
                                        • Opcode ID: 56cd19eacda754e9fa852abc5d5fd493cf3d53c528f699b541e3e15a7998a4d9
                                        • Instruction ID: b891fb9a41cde02d831fdd7d7f9f2b2a72027f9309ddedaf577faeeadcf2c0f3
                                        • Opcode Fuzzy Hash: 56cd19eacda754e9fa852abc5d5fd493cf3d53c528f699b541e3e15a7998a4d9
                                        • Instruction Fuzzy Hash: CB11C633901A55EFDB202F70BC057AE3798AF95BB0F204539F9449A290DE788D81B7A1
                                        APIs
                                        • _memset.LIBCMT ref: 00EE4560
                                          • Part of subcall function 00EE410D: _memset.LIBCMT ref: 00EE418D
                                          • Part of subcall function 00EE410D: _wcscpy.LIBCMT ref: 00EE41E1
                                          • Part of subcall function 00EE410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EE41F1
                                        • KillTimer.USER32(?,00000001,?,?), ref: 00EE45B5
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EE45C4
                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F1D5FE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                        • String ID:
                                        • API String ID: 1378193009-0
                                        • Opcode ID: ee508347f93cb6239c60c4281d0ae342df890d14f5c6bb3fd67e2cde278f5166
                                        • Instruction ID: 0b74f626074995487b0f48b65b01ba00e72c9a03f30ff65dcd85f75abfa357bf
                                        • Opcode Fuzzy Hash: ee508347f93cb6239c60c4281d0ae342df890d14f5c6bb3fd67e2cde278f5166
                                        • Instruction Fuzzy Hash: 9C21FCB19047889FEB328B24DC55BE7BBFD9F0131CF08009DE69966181D77419C8EB51
                                        APIs
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F4793F,?,?,00000000), ref: 00EE5B8C
                                          • Part of subcall function 00EE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F4793F,?,?,00000000,?,?), ref: 00EE5BB0
                                        • gethostbyname.WSOCK32(?,?,?), ref: 00F564AF
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F564BA
                                        • _memmove.LIBCMT ref: 00F564E7
                                        • inet_ntoa.WSOCK32(?), ref: 00F564F2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                        • String ID:
                                        • API String ID: 1504782959-0
                                        • Opcode ID: a19f859edbcbf3c8015c05199e9fe1016b7da968d8c32d520202de9b461f27ed
                                        • Instruction ID: 5886e695ec52566b204917db9749aec8f32663e64e66ac3bc1bc0add7d5d119d
                                        • Opcode Fuzzy Hash: a19f859edbcbf3c8015c05199e9fe1016b7da968d8c32d520202de9b461f27ed
                                        • Instruction Fuzzy Hash: 10115132900109AFCB04EBA5ED86DEEB7F8AF44311B144065F506B71A2DF71AE18EB51
                                        APIs
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F38E23
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F38E35
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F38E4B
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F38E66
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 8ca62ea2c289bb88ad62b43121999c62c1e1c3ac701c86a44105e76a7d8c1f09
                                        • Instruction ID: 145a69bbb7a570c54ec7c934083360ffc24766f47df85715358f7ef05243f5cd
                                        • Opcode Fuzzy Hash: 8ca62ea2c289bb88ad62b43121999c62c1e1c3ac701c86a44105e76a7d8c1f09
                                        • Instruction Fuzzy Hash: 0D114C79900218FFDB10DFA5CC84E9DBB74FB08750F204095F910B7250DA716E51EB90
                                        APIs
                                          • Part of subcall function 00EE2612: GetWindowLongW.USER32(?,000000EB), ref: 00EE2623
                                        • DefDlgProcW.USER32(?,00000020,?), ref: 00EE12D8
                                        • GetClientRect.USER32(?,?), ref: 00F1B77B
                                        • GetCursorPos.USER32(?), ref: 00F1B785
                                        • ScreenToClient.USER32(?,?), ref: 00F1B790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Client$CursorLongProcRectScreenWindow
                                        • String ID:
                                        • API String ID: 4127811313-0
                                        • Opcode ID: 8f5e4af15b79ef6135343fa9641ca2eebee3d76241d17e12f5371361628535f1
                                        • Instruction ID: ce45cf42c079cc9834995c2baf3616492c1e1eb8512efe111659753835c50b02
                                        • Opcode Fuzzy Hash: 8f5e4af15b79ef6135343fa9641ca2eebee3d76241d17e12f5371361628535f1
                                        • Instruction Fuzzy Hash: 77112835A0005DEBCB10DFA5DC859EE77B8FB09300F400495FA12E7260C770BA95ABA5
                                        APIs
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F4001E,?,00F41071,?,00008000), ref: 00F41490
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00F4001E,?,00F41071,?,00008000), ref: 00F414B5
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F4001E,?,00F41071,?,00008000), ref: 00F414BF
                                        • Sleep.KERNEL32(?,?,?,?,?,?,?,00F4001E,?,00F41071,?,00008000), ref: 00F414F2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CounterPerformanceQuerySleep
                                        • String ID:
                                        • API String ID: 2875609808-0
                                        • Opcode ID: a32833431594c7611373e3b2b07125aac1981da6625f19e048774a8837f0e6dc
                                        • Instruction ID: 1456ebc0bbeeb4516b39304bea4a67728d29df6a8867dcecc0a35321c8be7c07
                                        • Opcode Fuzzy Hash: a32833431594c7611373e3b2b07125aac1981da6625f19e048774a8837f0e6dc
                                        • Instruction Fuzzy Hash: 06114832D0052DDBCF00DFA5E948AEEBF78FB0A751F014155ED50B6290DB749590EBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                        • String ID:
                                        • API String ID: 3016257755-0
                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                        • Instruction ID: 6fde88a9cf2aece9a194275657120722b55714b2b2b3514fdf47173f9aaa11eb
                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                        • Instruction Fuzzy Hash: 5A014B3244824ABBCF126E84DC058EE3F36BF18394B598415FE5C69131D336C9B1BB81
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00F6B318
                                        • ScreenToClient.USER32(?,?), ref: 00F6B330
                                        • ScreenToClient.USER32(?,?), ref: 00F6B354
                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F6B36F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClientRectScreen$InvalidateWindow
                                        • String ID:
                                        • API String ID: 357397906-0
                                        • Opcode ID: 73a817bb37679ba79bb93eb9733faaae8302f070208d9e7284ebccc26978c8ce
                                        • Instruction ID: a9e8095971cd521d8c02e7f486ac79ffe8ae16dc1e5f64bd87dfcbf8caff2d45
                                        • Opcode Fuzzy Hash: 73a817bb37679ba79bb93eb9733faaae8302f070208d9e7284ebccc26978c8ce
                                        • Instruction Fuzzy Hash: 9E114675D0020DEFDB41CF98D4449EEBBB5FB08310F104166E924E3220D775AA559F50
                                        APIs
                                        • _memset.LIBCMT ref: 00F6B678
                                        • _memset.LIBCMT ref: 00F6B687
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00FA6F20,00FA6F64), ref: 00F6B6B6
                                        • CloseHandle.KERNEL32 ref: 00F6B6C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memset$CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3277943733-0
                                        • Opcode ID: 561303e55a89d0224200214a04bf2a0989bdea7f24ceb6ad9575b479d9243ace
                                        • Instruction ID: e5dfd7fbfadd1e606e53caf5141d336e5088fb6285d7017ae5e6110ef810168c
                                        • Opcode Fuzzy Hash: 561303e55a89d0224200214a04bf2a0989bdea7f24ceb6ad9575b479d9243ace
                                        • Instruction Fuzzy Hash: 64F0F4F56403087EE2106765BC0AF777A5CEB06755F044025FA18D5192F7755C10B7B8
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 00F46C8F
                                          • Part of subcall function 00F4776D: _memset.LIBCMT ref: 00F477A2
                                        • _memmove.LIBCMT ref: 00F46CB2
                                        • _memset.LIBCMT ref: 00F46CBF
                                        • LeaveCriticalSection.KERNEL32(?), ref: 00F46CCF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CriticalSection_memset$EnterLeave_memmove
                                        • String ID:
                                        • API String ID: 48991266-0
                                        • Opcode ID: 59b670860f08ffeb8fac17f12ddc191028cd1e3c624d2a6747afad38d5225ad9
                                        • Instruction ID: 9f0cace0972bf305c89ad2c51fe92bbb7741cdb127fa7f9587c2d0da9ea6d016
                                        • Opcode Fuzzy Hash: 59b670860f08ffeb8fac17f12ddc191028cd1e3c624d2a6747afad38d5225ad9
                                        • Instruction Fuzzy Hash: D9F0543A204104ABCF016F55EC85E4ABB29FF45361F04C065FE085E25ACB75A811FBB4
                                        APIs
                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00F3A179
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3A18C
                                        • GetCurrentThreadId.KERNEL32 ref: 00F3A193
                                        • AttachThreadInput.USER32(00000000), ref: 00F3A19A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                        • String ID:
                                        • API String ID: 2710830443-0
                                        • Opcode ID: 358b9561ea43f091ad7636392053d0c9f215cf6f878bc418ecc3d5953b9b6b64
                                        • Instruction ID: eecdf8f8b23bd7c2bb49462cf25f50ee022f00049dee31b98b9a8a110639fe3f
                                        • Opcode Fuzzy Hash: 358b9561ea43f091ad7636392053d0c9f215cf6f878bc418ecc3d5953b9b6b64
                                        • Instruction Fuzzy Hash: 16E0C93254522CBADB206BA2EC0DED77F5CEF267B1F408025F55995060C6B28544EBA1
                                        APIs
                                        • GetSysColor.USER32(00000008), ref: 00EE2231
                                        • SetTextColor.GDI32(?,000000FF), ref: 00EE223B
                                        • SetBkMode.GDI32(?,00000001), ref: 00EE2250
                                        • GetStockObject.GDI32(00000005), ref: 00EE2258
                                        • GetWindowDC.USER32(?,00000000), ref: 00F1C003
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F1C010
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00F1C029
                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00F1C042
                                        • GetPixel.GDI32(00000000,?,?), ref: 00F1C062
                                        • ReleaseDC.USER32(?,00000000), ref: 00F1C06D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                        • String ID:
                                        • API String ID: 1946975507-0
                                        • Opcode ID: 0a7460b3a4e746b3937ce7ad10d011990ae159f78d85a189b5a076a37dcf6e50
                                        • Instruction ID: c6b12c31799d1857869b25290cc67a157f1dfe8bac839e1e8bf69dd11dba4b64
                                        • Opcode Fuzzy Hash: 0a7460b3a4e746b3937ce7ad10d011990ae159f78d85a189b5a076a37dcf6e50
                                        • Instruction Fuzzy Hash: EDE03032904148EBDB215FA5FC0D7D83B10EB06336F048366FA79980E187B14994EB11
                                        APIs
                                        • GetCurrentThread.KERNEL32 ref: 00F38A43
                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F3860E), ref: 00F38A4A
                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F3860E), ref: 00F38A57
                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F3860E), ref: 00F38A5E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CurrentOpenProcessThreadToken
                                        • String ID:
                                        • API String ID: 3974789173-0
                                        • Opcode ID: 05a5055108809f38c29570af9889a7f8ded329545c13da6072c884707855eb37
                                        • Instruction ID: 53a995182525f7a5cc2d96df2825448137fea70b278ddfe48e02dc80323b4eba
                                        • Opcode Fuzzy Hash: 05a5055108809f38c29570af9889a7f8ded329545c13da6072c884707855eb37
                                        • Instruction Fuzzy Hash: 9FE04F36A05315BFDB205FB07D0DB563BA8AF50BA2F144828F245C9040DA68944AAB50
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00F220B6
                                        • GetDC.USER32(00000000), ref: 00F220C0
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F220E0
                                        • ReleaseDC.USER32(?), ref: 00F22101
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 599fcf7bbe0c895a2221d758f16fb1297a7db158c2f6d500995e1e93ec016b00
                                        • Instruction ID: 3af0995f031c5e6cfcfe3f027849fbda497c9dc3dae9a1b1aabd81025bc1478a
                                        • Opcode Fuzzy Hash: 599fcf7bbe0c895a2221d758f16fb1297a7db158c2f6d500995e1e93ec016b00
                                        • Instruction Fuzzy Hash: 81E0E5B5800208EFCB019FA1E90869D7BF1FB4C351F108025F86AE7221CBB98185AF40
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00F220CA
                                        • GetDC.USER32(00000000), ref: 00F220D4
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F220E0
                                        • ReleaseDC.USER32(?), ref: 00F22101
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 4cd18a5478675221b036ec2616ab7b6c7bc52d137a8020e4bccdf3e20424127c
                                        • Instruction ID: fc7632fecfa3038e2edeaa91dc6cf014b72600eea3e49c5f86fb45044a4085e7
                                        • Opcode Fuzzy Hash: 4cd18a5478675221b036ec2616ab7b6c7bc52d137a8020e4bccdf3e20424127c
                                        • Instruction Fuzzy Hash: 07E012B5800208AFCB019FB1E90869D7BF1FF4C351F108029F96AE7220CBB99146AF40
                                        APIs
                                        • OleSetContainedObject.OLE32(?,00000001), ref: 00F3B780
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ContainedObject
                                        • String ID: AutoIt3GUI$Container
                                        • API String ID: 3565006973-3941886329
                                        • Opcode ID: 8f3e7c7c566fa76889a267b821e0607bc5c4ad491122ebab7b6778b1d21827a7
                                        • Instruction ID: 6ae398e25ab9ca6d852cc43d9cd5c8e57e63b2478a1381619bcc3779505a1dbe
                                        • Opcode Fuzzy Hash: 8f3e7c7c566fa76889a267b821e0607bc5c4ad491122ebab7b6778b1d21827a7
                                        • Instruction Fuzzy Hash: 75914871600701AFDB14DF64C8A5B6ABBF8FF48720F14856DEA0ACB291DBB0E841DB50
                                        APIs
                                          • Part of subcall function 00EFFE06: _wcscpy.LIBCMT ref: 00EFFE29
                                          • Part of subcall function 00EE9997: __itow.LIBCMT ref: 00EE99C2
                                          • Part of subcall function 00EE9997: __swprintf.LIBCMT ref: 00EE9A0C
                                        • __wcsnicmp.LIBCMT ref: 00F4B0B9
                                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00F4B182
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                        • String ID: LPT
                                        • API String ID: 3222508074-1350329615
                                        • Opcode ID: 558d0746a33607880f299b12f530b3548ecdd012e878ac2fda6db3001531fecb
                                        • Instruction ID: 6d92b60c9de6cefbf43e9d2ce8c1a1b5a1765c48b3213d765e6581be71cf42b3
                                        • Opcode Fuzzy Hash: 558d0746a33607880f299b12f530b3548ecdd012e878ac2fda6db3001531fecb
                                        • Instruction Fuzzy Hash: 95617376E00219AFCB14DF94C895EAEBBF4EF48310F144069F956AB292DB70EE40DB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: Oa
                                        • API String ID: 4104443479-3945284152
                                        • Opcode ID: e5aca61fa76280d8379818ec08a78310740abeb5a12b79fa8d5603e90283cd0b
                                        • Instruction ID: 2f7770cffaa84f1c8b7a3e429765782552b2a2644483a2398b3662518080a394
                                        • Opcode Fuzzy Hash: e5aca61fa76280d8379818ec08a78310740abeb5a12b79fa8d5603e90283cd0b
                                        • Instruction Fuzzy Hash: 02515070E01619DFDB24CF68D880ABEBBF1FF44314F248519E85AE7240EB31A996DB51
                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 00EF2AC8
                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00EF2AE1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: GlobalMemorySleepStatus
                                        • String ID: @
                                        • API String ID: 2783356886-2766056989
                                        • Opcode ID: 9a46bcde028fc218602e892e545c0427d1723339b640d775bdeadf0d1de510d7
                                        • Instruction ID: 0c4c73ca3fb457ec486710d2457c4b989ba60cc5f5f5310b71cf5e6facf10536
                                        • Opcode Fuzzy Hash: 9a46bcde028fc218602e892e545c0427d1723339b640d775bdeadf0d1de510d7
                                        • Instruction Fuzzy Hash: D7514CB14187889BD320AF11DC85BAFB7F8FF84314F82485DF1D9511A2DB709929CB56
                                        APIs
                                          • Part of subcall function 00EE506B: __fread_nolock.LIBCMT ref: 00EE5089
                                        • _wcscmp.LIBCMT ref: 00F498CD
                                        • _wcscmp.LIBCMT ref: 00F498E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: _wcscmp$__fread_nolock
                                        • String ID: FILE
                                        • API String ID: 4029003684-3121273764
                                        • Opcode ID: 35f85bcaeab1823d864c8b3f798b01c81631a4294daf8bac2eda99386ffb4f7e
                                        • Instruction ID: 7afbe6ccb6a43f9cb46e61166c47650e962d55e6717d8c832760d3ee9a911f31
                                        • Opcode Fuzzy Hash: 35f85bcaeab1823d864c8b3f798b01c81631a4294daf8bac2eda99386ffb4f7e
                                        • Instruction Fuzzy Hash: 4B41F872A0464EBADF209AA1CC85FEF7BFDDF45714F00046AF900B7180DAB59D0597A1
                                        APIs
                                        • _memset.LIBCMT ref: 00F526B4
                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F526EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CrackInternet_memset
                                        • String ID: |
                                        • API String ID: 1413715105-2343686810
                                        • Opcode ID: b4bfb6aee2f133ccf6c6040d2b47afef541036be823aa160d9307cadaec82392
                                        • Instruction ID: 3e5eb4252b29a31e79fc0e072f32831a023316a10842a368a28d5f4853889f57
                                        • Opcode Fuzzy Hash: b4bfb6aee2f133ccf6c6040d2b47afef541036be823aa160d9307cadaec82392
                                        • Instruction Fuzzy Hash: 5E313771800119AFCF45EFA1DC85EEEBFB9FF18310F100169F914A6166EB315A46EB60
                                        APIs
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00F67B93
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F67BA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: '
                                        • API String ID: 3850602802-1997036262
                                        • Opcode ID: 68735ae91372aedc7e71145b10485c53af0ec3db48ed72ebac889bd3da21db40
                                        • Instruction ID: 87a14e3eeaa30b403ce8ac2ad40331bbd80e51e3d9cb85b9477516735aba1d3d
                                        • Opcode Fuzzy Hash: 68735ae91372aedc7e71145b10485c53af0ec3db48ed72ebac889bd3da21db40
                                        • Instruction Fuzzy Hash: AF412774A043099FDB14DFA9C880BDABBB9FF49704F10016AE914AB395D770A941EFA0
                                        APIs
                                        • DestroyWindow.USER32(?,?,?,?), ref: 00F66B49
                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F66B85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$DestroyMove
                                        • String ID: static
                                        • API String ID: 2139405536-2160076837
                                        • Opcode ID: a13bffd2dab149a1438e7e5204aceb1907899350487e460d57bbaf2b023c001b
                                        • Instruction ID: a5e780052a771a839668314824ff36ff23cc72622176c1d65c34ddffb49ad7f8
                                        • Opcode Fuzzy Hash: a13bffd2dab149a1438e7e5204aceb1907899350487e460d57bbaf2b023c001b
                                        • Instruction Fuzzy Hash: 90318F71500608AEEB10DF74DC81AFB73A9FF88724F109619F9A9D7190DB35AC81E760
                                        APIs
                                        • _memset.LIBCMT ref: 00F42C09
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F42C44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu_memset
                                        • String ID: 0
                                        • API String ID: 2223754486-4108050209
                                        • Opcode ID: b70e0c5b3d8ceab2017c63326bdd33e4f67d97e52e6fbc4aea318bc2bf1979cb
                                        • Instruction ID: dbe30ef16bed0174203c1ca4c1c2f308b5d2f2d66807df48cbc114cdcf158eaa
                                        • Opcode Fuzzy Hash: b70e0c5b3d8ceab2017c63326bdd33e4f67d97e52e6fbc4aea318bc2bf1979cb
                                        • Instruction Fuzzy Hash: CB31D171A002099BEB648F48D9C5BAEBFB8FF45370F544039FE85A61A0D7709A40EB10
                                        APIs
                                        • __snwprintf.LIBCMT ref: 00F53B7C
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: __snwprintf_memmove
                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                        • API String ID: 3506404897-2584243854
                                        • Opcode ID: 67c51a7b0d5591b6cd69aafef550ca3ea393a69942a2426c8061e33c2fce9302
                                        • Instruction ID: e164a0b8bc488c09d9e6d06567e76c270cde39eb60fb04eb04d54282f61de7c6
                                        • Opcode Fuzzy Hash: 67c51a7b0d5591b6cd69aafef550ca3ea393a69942a2426c8061e33c2fce9302
                                        • Instruction Fuzzy Hash: 4E216131600259ABCF14EF69DC92EAD77A4BF45740F404498F905BB281DA34EA46EBA2
                                        APIs
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F66793
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F6679E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Combobox
                                        • API String ID: 3850602802-2096851135
                                        • Opcode ID: c4ad44f81acf9baaa29dc493db50c29cfab15d4a9f47665c97f9d741bd660089
                                        • Instruction ID: 71506fb5079ff053a75fb3de873eb818c2375dbcc40cee1ce2bd83f5854f7340
                                        • Opcode Fuzzy Hash: c4ad44f81acf9baaa29dc493db50c29cfab15d4a9f47665c97f9d741bd660089
                                        • Instruction Fuzzy Hash: 3D1194757002087FEF21DF24DC80EBB376AEB89378F114129F914D7290DA759C51A7A0
                                        APIs
                                          • Part of subcall function 00EE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00EE1D73
                                          • Part of subcall function 00EE1D35: GetStockObject.GDI32(00000011), ref: 00EE1D87
                                          • Part of subcall function 00EE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE1D91
                                        • GetWindowRect.USER32(00000000,?), ref: 00F66CA3
                                        • GetSysColor.USER32(00000012), ref: 00F66CBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                        • String ID: static
                                        • API String ID: 1983116058-2160076837
                                        • Opcode ID: afd1194db23145384249346202ab10473bcde1d41675b48c93e13b435af0540a
                                        • Instruction ID: 4cfa7c7e43edd64aebdc030bf34d8309480b5631a9683e74c2c701b2c8b413ed
                                        • Opcode Fuzzy Hash: afd1194db23145384249346202ab10473bcde1d41675b48c93e13b435af0540a
                                        • Instruction Fuzzy Hash: 2E213A72A1020AAFDB04DFA8DC45AFA7BB8FB08315F044629FD55E3250D775E850EB50
                                        APIs
                                        • GetWindowTextLengthW.USER32(00000000), ref: 00F669D4
                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F669E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: LengthMessageSendTextWindow
                                        • String ID: edit
                                        • API String ID: 2978978980-2167791130
                                        • Opcode ID: dbd915e3f769aeadf880e0248f34309e463665f819093fdaa0bd75cb2742d6ba
                                        • Instruction ID: 283d46bce0a0cdfaf84929b43dfcccbb4ca3ccb0c6e2d0ed97ee05ec764eccc6
                                        • Opcode Fuzzy Hash: dbd915e3f769aeadf880e0248f34309e463665f819093fdaa0bd75cb2742d6ba
                                        • Instruction Fuzzy Hash: 6C113D71900108ABEB105F74DC44AAB3B69EB05374F514724F9A5D71E0C676DC91BB60
                                        APIs
                                        • _memset.LIBCMT ref: 00F42D1A
                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00F42D39
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu_memset
                                        • String ID: 0
                                        • API String ID: 2223754486-4108050209
                                        • Opcode ID: 551f5da91741a017b8e56639937b01d013c4b3db6e64c548d8d2ebde840dc5fc
                                        • Instruction ID: 887c4df4c16fc3e81270eaa8c1b85d9b5c41926387c03b9985cff713a41f7352
                                        • Opcode Fuzzy Hash: 551f5da91741a017b8e56639937b01d013c4b3db6e64c548d8d2ebde840dc5fc
                                        • Instruction Fuzzy Hash: 87112272E01118ABCB60DB98DC84B9D7BB9AF02320F440131FD11AB2A0D730AE05F790
                                        APIs
                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F52342
                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F5236B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: Internet$OpenOption
                                        • String ID: <local>
                                        • API String ID: 942729171-4266983199
                                        • Opcode ID: 72daf4e229d5f1a86817faf16e614c5a3b6a2bf8d004764ba0176c41c373faf6
                                        • Instruction ID: fcdb9ccbfa773be5fb695c849d1940ed5a27e22ec45d8ebce5c6a84e962dab5b
                                        • Opcode Fuzzy Hash: 72daf4e229d5f1a86817faf16e614c5a3b6a2bf8d004764ba0176c41c373faf6
                                        • Instruction Fuzzy Hash: AA11E371501625BADB248F11CC88FBBFF68FF07362F10422AFE5552000D2746949E6F0
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F39135
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: f917ab6c910feac2a7d486501309029adbf9aae3b036ad95c05d3f1d1db5d7e8
                                        • Instruction ID: 381e62c31304b20df57ed15b6132df46c260b8df6aabec72460585747bb65fb7
                                        • Opcode Fuzzy Hash: f917ab6c910feac2a7d486501309029adbf9aae3b036ad95c05d3f1d1db5d7e8
                                        • Instruction Fuzzy Hash: CA012872A09319ABDF04FB65CC958FE73A9EF06330F100619F876672D1EAB55808E650
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F3902D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: 96a6fac4e358d6ec4ae7031c8b28dcea0f19b2bf707c4f1998fea01a17ef971f
                                        • Instruction ID: 358fcae8b09334a9b084bc799291df9adacafacc3cd67608f198085bc0ed6ebd
                                        • Opcode Fuzzy Hash: 96a6fac4e358d6ec4ae7031c8b28dcea0f19b2bf707c4f1998fea01a17ef971f
                                        • Instruction Fuzzy Hash: A701F772B452086BDF14E7B1CC92EFE73A8DF05350F24002AB85673281EEA55E08E271
                                        APIs
                                          • Part of subcall function 00EE7F41: _memmove.LIBCMT ref: 00EE7F82
                                          • Part of subcall function 00F3AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00F3AEC7
                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F390B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassMessageNameSend_memmove
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 372448540-1403004172
                                        • Opcode ID: f2a6a1665d7ba2a52c3ed4a64c6eda4a5c82992ea2a9bac65840008183655760
                                        • Instruction ID: 93e708a31c5d249f2fe23ab65e4c1374b6e5ebe9affb0363f55dd395fbaaf7c4
                                        • Opcode Fuzzy Hash: f2a6a1665d7ba2a52c3ed4a64c6eda4a5c82992ea2a9bac65840008183655760
                                        • Instruction Fuzzy Hash: 7C01DBB2B4520867DF14F7B5CD82EFE73AC9F15320F241015785673292EAA59E0CA272
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: ClassName_wcscmp
                                        • String ID: #32770
                                        • API String ID: 2292705959-463685578
                                        • Opcode ID: 1f65b82280b2ffcd2edd99b28a4971c8fb0ad6c08d3d88d424f588b3f19c7a0b
                                        • Instruction ID: a09fa2915287eddae4047e69ba4e05d4b1d688c804f3008697cabc4e6db2faf8
                                        • Opcode Fuzzy Hash: 1f65b82280b2ffcd2edd99b28a4971c8fb0ad6c08d3d88d424f588b3f19c7a0b
                                        • Instruction Fuzzy Hash: 07E0D17290422D2BD710A759AC05FA7F7ACEB45770F050057FD04D3151D5619A4597D1
                                        APIs
                                          • Part of subcall function 00F1B494: _memset.LIBCMT ref: 00F1B4A1
                                          • Part of subcall function 00F00AC0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F1B470,?,?,?,00EE100A), ref: 00F00AC5
                                        • IsDebuggerPresent.KERNEL32(?,?,?,00EE100A), ref: 00F1B474
                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00EE100A), ref: 00F1B483
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F1B47E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 3158253471-631824599
                                        • Opcode ID: a45c90b99aa6cee02e017f00383c6fb004a06c79971fee471307537987ab2c73
                                        • Instruction ID: 605570f4a4dba85004da7273f3c7507d1280124eb64797fa903ae1c22af7a42d
                                        • Opcode Fuzzy Hash: a45c90b99aa6cee02e017f00383c6fb004a06c79971fee471307537987ab2c73
                                        • Instruction Fuzzy Hash: A2E06D74200745CBD360EF65E8047827BE0AB04704F01892CE456C2742EBB8E488EBA1
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F659D7
                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F659EA
                                          • Part of subcall function 00F452EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F45363
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: c630b9a46656482706928ec4f1a8ec43717bbd50f60ac0701af653f688947d78
                                        • Instruction ID: cf7fa0b766cfc495cabb0265426036f4fb0a69e8288a318b6ca571af97cbc91b
                                        • Opcode Fuzzy Hash: c630b9a46656482706928ec4f1a8ec43717bbd50f60ac0701af653f688947d78
                                        • Instruction Fuzzy Hash: 83D0C931384315B7E664BB70AC0BF967A14AB01B50F05182AB666AA1D1C9E4AC059654
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F65A17
                                        • PostMessageW.USER32(00000000), ref: 00F65A1E
                                          • Part of subcall function 00F452EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F45363
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2112134819.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                        • Associated: 00000000.00000002.2112115699.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112187656.0000000000F94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112236099.0000000000F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2112258235.0000000000FA7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ee0000_PARATRANSFARI REMINDER.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: fa2c830eb8f36024c8e3b83f6ea551f3778d0d736625e15c1877c26c13ca14a5
                                        • Instruction ID: b063224ca5e89f041a8a15f524ec108bf062cce91b15bf6890ee9acb119288e6
                                        • Opcode Fuzzy Hash: fa2c830eb8f36024c8e3b83f6ea551f3778d0d736625e15c1877c26c13ca14a5
                                        • Instruction Fuzzy Hash: 29D0C9313803157BE664BB70AC0BF967A14AB05B50F05182AB666AA1D1C9E4AC059654